Geeky Banker Caiib It Module D Complete
Geeky Banker Caiib It Module D Complete
Geeky Bankers
CAIIB (IT)
Module –D
Computer Security
Unit – 14
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Intrusion detection?
Access control?
Network security?
OBJECTIVE
The number of computer networks is growing rapidly and also the number of
intrusions. With increasing economic importance of computer networks, the extent of
criminal activities is also growing, Banks have to take precautions to protect from the
risks. The objective of this unit is to make the reader understand different computer
security environments and security mechanisms.
PHYSICAL SECURITY
Disturbance sensors: These are perimeter detection sensors, commonly are fence
mounted.
Barrier detectors: These detection devices send forth a continuous beam of energy a
break in which indicates intruder penetration.
LOGICAL SECURITY
(a) Multiple types of access control- At user level, terminal level, menu level, file
level and application level.
(b) Internal access controls - Based on information such as date, time, terminal
location, and user identification.
(c) Limiting the number of unsuccessful tries and locking out the requester and
simultaneous broadcasting such event to all users.
Access Controls
Passwords
Passwords are 'a set of characters which may be allocated to a person, a terminal or a
facility which are required to be keyed into the system before further access is
permitted'. Passwords can be applied to data files as well as program files.
Password Guidelines
PINS
In some systems, the user might have a special PIN (Personal Identification Number)
which identifies him or her to the system. According to what the user's PIN is, the user
will be allowed access to certain part of the system, but forbidden access to other
parts. An example of authorization systems with PINS is, cards for banks' cash
Join GEEKY BANKER on YouTube
dispensers. The cash dispenser checks the PIN code on the magnetic strip ofthe card
against the code number keyed in by the cardholder, and the two codes must match
before the cardholder is allowed to withdraw any cash.
Note: -
One important difference between an online password and PIN is that the PIN is tied to
the specific device on which it was set up. That PIN is useless to anyone without that
specific hardware.
When data is transmitted over a telecommunications link or network, there are two
main security dangers:
Encryption is the only secure way to prevent Eavesdropping (since eavesdroppers can
get passwords by the data at one end of the line, transmitting the scrambled data, and
unscrambling it at the receiver's end tapping the line or by experimenting with various
likely passwords). Encryption involves scrambling of the line.
When data is transmitted over a telecommunications link or network, there are two
main security dangers unauthorized access by an eavesdropper, and direct
intervention by someone who sends false message down the line, claiming to be
someone else- so that the recipient of the message will think that it has come from an
authorized source.
Encryption is the only secure way to prevent eavesdropping (since eavesdroppers can
get passwords by the data at one end of the line, transmitting the scrambled data, and
unscrambling it at the receiver's end of the line.
Join GEEKY BANKER on YouTube
Authentication is a technique of making sure that a message has come from an
authorized sender. Authentication involves adding an extra field to a record, with the
contents of this field derived from the remainder of the record by applying an algorithm
that has previously been agreed between the senders and the recipients of data.
NETWORK SECURITY
(i) Physical Intrusion: If an intruders have physical access to a machine (i.e. they can
use the keyboard or take apart the system), they will be able to get in. Techniques
range from special privileges the console has, to the ability to physically take apart the
system and remove the disk drive (and read/write it on another machine).
(ii) System Intrusion: This type of hacking assumes that the intruder already has a
low-privilege user account on the system. If the system doesn't have the latest security
patches, there is a good chance the intruder will be able to use a known exploit in
order to gain additional administrative privileges.
(iii) Remote Intrusion: This type of hacking involves an intruder who attempts to
penetrate a system remotely across the network. The intruder begins with no special
privileges. There are several forms of this hacking. For example, an intruder has a
much more difficult time if there is a firewall between him/her and the victim machine.
1. Impersonation
2. Eavesdropping
3. Data alteration
4. Denial of Service.
Impersonation: It refers to the possibility of someone sending a message, which
appears to have been sent from someone else. This can threaten contractual
messages, such as orders and invoices. In a network environment, impersonation can
take forms such as-forging the 'sender' field in an e-mail message falsifying the source
IP address for establishing a network connection or hijacking an existing connection
between two computers.
Join GEEKY BANKER on YouTube
Eavesdropping: It refers to the possibility of data being read by someone other than
the intended recipients. For example, a competitor may intercept your proposal to a bid
or your department plans Generally, eavesdropping is simpler for an attacker to
accomplish than impersonation, and is harder to detect.
Data Alteration: It refers to the risk of interception that results in tampering with data,
that is, the possibility of data being changed in such a way that it appears legitimate,
but no longer represents the originator's intention. For example, the intruder may
change a 'buy' order to 'sell', or adding zeros to a bid.
Denial of service (DOS) attacks: Where the intruder attempts to crash a service for
the machine), overload network links, overloaded the CPU, or fill up the disk.
So that actual user will not be able to use the system. An Intrusion Detection System
(IDS) is a system for detecting such intrusions.
Intrusion Detection System can be broken down into the following categories:
(a) Network intrusion detection systems (NIDS), monitors packets on the network
wire and attempts to discover if a hacker/cracker is attempting to break into a system
or cause a denial of service attack.
(b) System integrity verifiers (SIV), monitors system files to find when an intruder
changes them, thereby leaving behind a backdoor. One such famous system is
"Tripwire". A SIV may watch other components as well, such as the Windows registry
and configuration, in order to find well-known signatures. It may also detect when a
normal user somehow acquires root/administrator level privileges.
(e) Log file monitors (LFM), monitor log files generated by network services. In a
similar manner to NIDS, these systems look for patterns in the log files that suggest an
intruder is attacking. A typical example would be a parser for HTTP server log files that
looking for intruders who try well-known security holes.
(a) Anomaly detection: The most common way people approach network intrusion
detection is to detect statistical anomalies. The idea behind this approach is to
measure a "baseline" of such stats as CPU utilization, disk activity, user logins, file
activity, and so forth. Then, the system can trigger when there is a deviation from this
baseline. The benefit of this approach is that it can detect the anomalies without having
to understand the underlying cause behind the anomalies.
(b) Signature recognition: This means that for every hacker technique, the engineers
code something into the system for that technique. This can be as simple as a pattern
match. The classic example is, every packet on the wire for the pattern
VPNs (Virtual Private Networks): VPN creates a secure connection over the Internet
for remote access (e.g. for telecommuters).
Lures/honey pots: Programs that pretend to be a service, but which do not advertise
themselves. It can be something as simple as one of the many Back office emulators,
or as complex as an entire subnet of bogus systems installed for intruder detection
purpose.
1. Signature Recognition
2. Fingerprint Recognition
3. Palm print Recognition
4. Hand-geometry Recognition
5. Voiceprint Recognition
6. Eye Retina Pattern Recognition
Join GEEKY BANKER on YouTube
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
Communication Security
Unit – 15
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Cryptography
Digital Signature?
Different Algorithm?
Certification authority?
Cryptography
Cryptography is the art and science of keeping files and messages secure. In
cryptographic terminology, the message is called plaintext or clear text. Encoding the
contents of the message in such a way that hides its contents from outsiders is called
encryption. The encrypted message is called the cipher text. The process of retrieving
the plaintext from the cipher text is called decryption. Encryption and decryption
usually make use of a key, and the coding method is such that decryption can be
performed only by knowing the proper key.
Join GEEKY BANKER on YouTube
What is key in cryptography?
Symmetric key Cryptography ->Same Key is used for encryption and Decryption.
Asymmetric key Cryptography -> Private Key is used for encryption and public key is used for
Decryption.
Crypto Algorithm
A crypto algorithm is a procedure that takes the plaintext data and transforms it into
cipher text in a reversible way. A good algorithm produces cipher text that yields as
few clues as possible about either the key or the plaintext that produced it.
Secret-key - A secret key algorithm is symmetric; that is, it uses the same key for
encryption and decryption.
Public key- Public key algorithms use different keys for encryption and decryption.
One key, the private key, must be kept secret by its owner and in general is never
shared with anyone else. The other key, the public key, may be shared with anyone. In
fact, the two keys are mathematically related. Data encrypted with the private key may
be decrypted with the corresponding public key, and vice-versa.
Triple DES: DES is a technique by which the DES algorithm is applied three times to
each plaintext block. Typical approaches use two conventional DES key, yielding a
length of 112 bits. Some applications use three different keys yielding a total key size
of 168 bits, which is truly enormous for a symmetric cipher.
The likely range of keys for symmetric ciphers will be between 40 and 128 bits,
although we may come across 168-bit 3DES implementations. The important question
Join GEEKY BANKER on YouTube
we may often have to consider is whether or not appropriate products have sufficient
key lengths to protect our information. A longer key is always
preferable to a shorter key. For low risk applications 40-bit crypto keys may be enough,
while for critical applications 112-bit key 3DES and 128-bit IDEA keys may be
considered.
DIGITAL SIGNATURES
The security of the electronic transaction is the main consideration for the success of
any business proposition on Internet. Digital Signatures play a major role for secure e-
commerce. A digital signature is an electronic substitute for a manual signature that
serves the same functions as a manual signature. It is to identify a person and a
document together when computer is used.
In technical terms, a digital signature is the sequence of bits that is created by running
an electronic message through a one-way hash function (a program). The resulting
message is called Message Digest (MD). Some of the popular MD algorithms are MD5
and SHAL. The MD is encrypted with the sender's private key. The encrypted
message digest is the digital signature, which looks like an unintelligible
Before a sender can digitally sign an electronic communication, the sender must first
create a public-private key pair. The private key is kept confidential by the sender. The
private key is used for creating digital signatures. The public key is disclosed generally
by posting the key in online databases, repositories, or anywhere else the recipient of
the message can access it.
1.Authenticity
2.Integrity
3.Non repudiation
Join GEEKY BANKER on YouTube
(a) Authenticity: Authenticity is concerned with the source of origin of communication.
It answers two basic question:
Is it a genuine message?
(b) Integrity: Integrity is concerned with the accuracy and completeness of the
message. Before the recipient of an electronic message takes any action on it, he must
ensure beyond doubt that
1.The document he received is the same as the document that the sender has sent.
2.claim that the contents of the message as received are not the same as what he
sent.
CERTIFICATION AUTHORITIES
Central Authority: All certificates are signed by a single authority and we can check
them with that authority's public key. The central authority's key is usually embedded in
the certification checking software, which is distributed manually to each host.
Web of Trust: Anyone with a certificate may act as a CA by signing another certificate.
Individual who use the system must judge for them whether to trust a given certificate
Join GEEKY BANKER on YouTube
based on whether they can validate any of the certifiers' signatures and whether they
personally trust any of those certifiers.
The certification process generally works in the following way. The subscriber:
(b) Contacts the CA (either in person or online) and produces proof of identity, such as
a driver's license and passport or any other proof required by the CA
(c) Demonstrates that he/she holds the private key corresponding to the public key
(without disclosing the private key).
Certificate Revocation by CA
There will be times when a key needs to be revoked before it expires. A key is revoked
by revoking its certificate. The problem is how to notify people that they should no
longer rely on a key. The solution to this problem is the certificate revocation list or
CRL. A CRL is simply a database of certificates that have been revoked before their
expiration date. A CRL may be part of the repository maintained by the certification
authority.
Liability on CA
Join GEEKY BANKER on YouTube
A CA may be subject to claims for negligence in performing its functions or for
misrepresentation in issuing certificates that contain false information. A CA's liability
for such claims may be limited either by law or by contract.
3. the CA who issues the certificate used by the recipient to verify the digital signature.
The obligations and responsibilities of each of these three parties is the subject of
legislation i.e. the IT ACT-2000
Join GEEKY BANKER on YouTube
Thanks for Watching
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
Disaster Management
Unit – 16
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Disaster Recovery?
Computer Virus?
DISASTER RECOVERY
Definition: Disaster recovery is the organization's ability to get back into business
quickly after an event that disrupts the flow of information. This is done through a set of
pre-planned, coordinated, and totally familiar procedures with an established set of
priorities. The disaster recovery is the concept of "failsafe." That is, the bank's ability to
survive the disaster. The disaster recovery plan is extremely necessary to the survival
of a bank.
(a) Take data off-site: It is standard practice to store media at an off-site location. This
step reduces the likelihood that the same event will affect both on-site data and
backup. However, some banks take even greater steps by placing a large
geographical distance between the data centre and the vaulting site. (Different
seismic zones)
(b) Take data off-line: Many banks, particularly those who use paperless transactions
extensively, maintain a mirror image of their production data, sometimes in an off-site
facility. While this is an effective disaster-avoidance or continuity measure, it could
have a serious impact from a disaster-recovery perspective. Take for example, the
Join GEEKY BANKER on YouTube
introduction of a devastating virus. If you run a mirrored image of data to assure an up-
to-date backup, you end up with an up-to-date, virus-infected backup as well.
(c) Put data out of reach: Only by keeping multiple generations of data on tape and
shipping them to a remote location can be fully assured that are protected from
viruses, sabotage, human error, and other online attacks that a mirrored system does
not protect against. If data loss is due to an internal act of sabotage- an embezzler
attempting to cover the trail, for example there is virtually no chance that the culprit will
be able to access the vaulted data (at least not without leaving a lot of evidence).
(d) Test: This is an all-important and often-overlooked aspect of the data recovery
process. Schools conduct fire drills regularly. And the drills aren't simply to keep the
kids in practice. They are also used to check the amount of time it takes to clear the
building and to find any weak links in the safety process- before it's too late. A good
recovery plan requires the same attention. Do the drills, Contingency planning is the
process of devising plans and strategies for coping with emergency situations that
cause disruption of normal computer operations.
Employee awareness
Fire detection and prevention
Hardcopy records
Human factor personnel considerations
Local area networks
Media handling and storage
Miscellaneous considerations
Security and safety awareness is critical to any disaster avoidance program. Develop a
good security and safety awareness program. Conduct exercise where employees
identify potential safety hazards and other conditions that could lead to an emergency.
Invite community service representatives such as the fire department, law enforcement
agencies, security companies, and others to come and speak to your employees at
awareness sessions. Piggyback onto Human Resources indoctrination programs for
Join GEEKY BANKER on YouTube
new employees to make new employees aware of safety, emergency, security and
other procedures. Consider inserting safety tips into pay-stub/ cheque envelopes. Post
safety and security posters on Bulletin Boards throughout the organization.
Fire detection and suppression systems are the responsibility of Facilities and
Services. However, each business unit should ensure that these systems are
adequate and in good working order. Fire detection and suppression systems should
be maintained and tested on a regular basis. Exit signs should be checked regularly to
ensure that they are lit. If any require maintenance, Facilities and Services should be
notified.
Hard copy records should be protected against fire and water damage, Records stored
off-site should also receive similar protection, Fire resistant cabinets should be
considered for the storage of hard copy records that are deemed critical to the
Business Unit. Backup for hard copy documents include microfilming. imaging
technology and writeable CD-ROM technology.
This is not an easy area to deal with and more often than not, it's an area that is either
ignored or not even considered by recovery and continuity planners. However, it is an
extremely important area to tack since avoiding disasters and recovering from them,
depends to a large extent on how you handle the human factor Develop a trauma
intervention plan. Considerations include Ensure trauma intervention is initiated within
the first 24 to 72 hours after an incident. If in house expertise is not available, seek
assistance from outside professionals experienced in post-crisis response. Make sure
you have a good communication plan in place.
Many Business Units now depend on LANs to process and store information locally as
well as to access institutional systems. It is therefore becoming increasingly critical that
LAN environments be afforded a reasonable level of protection in order to ensure that
the environment is stable.
Join GEEKY BANKER on YouTube
Make sure that the plan provides for the appropriate support of personnel required to
help with the emergency and subsequent recovery. Consider lodging, food,
transportation, communication with family, friends and relatives and other creature
comforts. Provisions for scheduled, unattended backups of the server should be
implemented. Backup of server files should be automated and should happen on a
nightly basis.
1. Disk Mirroring
2. Disk Duplexing
3. Drive Arrays
4. Hot Backup
Disk Mirroring: Disk mirroring is a technique used to protect a computer system from
loss of data and other potential losses due to disk failures. In this technique, the data is
duplicated by being written to two or more identical hard drives, all of which are
connected to one disk controller card.
Disk Duplexing: Disk Duplexing is similar to disk mirroring except that each drive has
its own controller circuitry, if one disk or controller fail, the file server issues an alert
and continues operating.
Disk Arrays: Some disk array systems enable the administrator to replace a failed
drive while the server is still running. With such a system the server does not have to
be brought down, thus users can continue operating while a defective drive is being
replaced. The system automatically copies redundant data on the file server to the new
disk. RAID (Redundant Array of Inexpensive Disks) technology is in use for failure
recovery mechanisms.
Hot Backup: Hot backup, also known as dynamic or online backup, is a backup
performed on data while the database is actively online and accessible to users. A hot
backup is the standard way of doing most database backups. Oracle is a principal
vendor of the process, but the company doesn't have a monopoly on the concept.
Join GEEKY BANKER on YouTube
(f) Media Handling and Storage
In this part of the planning, you will need assess your hardware location/s and how
your virtual environments (if any) are supported, and consider offsite and storage
options for redundancy and better protection.
RTO (Recovery Time Objective) is the goal your organization sets for the maximum
length of time it should take to restore normal operations following an outage or data
Join GEEKY BANKER on YouTube
loss. RPO (Recovery Point Objective) is your goal for the maximum amount of data the
organization can tolerate losing.
For the purpose of this portion of your planning, let’s say you’ve determined that your
onsite data storage is your greatest vulnerability, you should map out the most efficient
way to migrate your data to a public cloud. This is where understanding your RTO and
RPO is key. Critical infrastructure will need to be available as quickly as possible, while
less critical data and applications might not be available for several hours or even
several days depending on your budget and pain tolerance.
Computer Viruses
(a) A Trojan is a program that while visibly performing one function, secretly carries
out another. For example, a program could be running in a computer game, while
simultaneously destroying a data file or another program. A Trojan's work is
immediate, and obvious. They are easy to avoid as they do not copy themselves.
(c) A trap door (back door) is an undocumented entry-point into a computer system.
It is not to be found in design specifications but may be put in by software developers
to enable them to bypass access controls while working on a new piece of software.
Because it is not documented, it may be forgotten and used at a later date.
(d) A logic bomb is a piece of code triggered by certain events. A program will behave
normally until a certain event occurs, for example disk utilization reaches a certain
percentage. A logic bomb, by responding to set of conditions, maximizes damage. For
example, it will be triggered when a disk is nearly full, or when a large number of users
are using the system.
(e) Rootkits: It is a malware that takes root access and replaces system executables.
Rootkit is set of malicious program that enables administrator-level access to a
computer network.
Join GEEKY BANKER on YouTube
Thanks for Watching
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
INFORMATION SYSTEM AUDIT
Unit –17
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Information system audit is essentially an audit of computer system. The basic objectives of
such audit are to safeguard the assets, maintain data integrity, maintain process integrity, and
achieve the goals of an organization effectively and efficiently.
1. Safeguarding the assets: These include hardware, software, human ware (manpower).
Even some items like physical manuals of hardware and software systems are important
assets of the organization although in normal course these are not required very often.
Similarly, documentation of various system files is important assets of the organization.
These assets are to be safeguarded from damages, miss utilization and other losses. The
objective of the System Audit is to ensure that the organization has taken adequate
measures to protect the assets.
4. Effectiveness auditing: Any System Audit must aim at effective auditing. An organization
must have some goals. Whether the computer system set up by the organization is
achieving those goals is the objective of effectiveness auditing. In order to evaluate the
effectiveness, an auditor must know the characteristics of the users as also the system
of the organization. Effectiveness Auditing takes place after a system has been running
for some time. The feedback coming out of this audit helps the management to decide
whether to scrap the system, continue its running or modify it in some way.
Effectiveness auditing can also be carried out during the process of designing a system.
If a system is complex and costly to implement, management may decide to have an
effectiveness audit to judge whether the design of the system will be effective for the
organization.
5. Efficiency auditing: The System Audit should also focus on efficiency of the system. In
other words, such audit should throw light on whether efficiency has been increased
after adopting the computer system in achieving the goals of the organization. This is
also known as Efficiency Audit. This reveals software etc. Again, such audit is an effective
tool for the management to take suitable decision regarding not only the quality of
functioning of the system as a whole but also the adequacy of the hardware, utilization
of capacity of the system qualitatively as well as quantitatively.
Scope of IS Audit
The basic areas of an IT audit scope can be summarized as: the organization policy and
standards, the organization and management of computer facilities, the physical
environment in which computers operate, contingency planning, the operation of
Join GEEKY BANKER on YouTube
system software, the applications system development process, review of user
applications and end-user access.
IS audit being important because it gives assurance that the IT systems are adequately
protected, provide reliable information to users and properly managed to achieve their
intended benefits
Many users rely on IT without knowing how the computers work. A computer error
could be repeated infinite times, causing more extensive damage than a human mistake.
IS audit could also help to reduce risks of data tampering, data loss or leakage, service
disruption, poor management of IT systems.
It improves decision making process of management, based on correct data sources
since it helps in maintaining data integrity.
It reduces the probability of fraud and embezzlement which may cause havoc to any
organization, particularly in a computerized environment where there is no limit for
such loss.
It reduces the probability of computer error by detecting the same earlier which may be
high costly.
It ensures the optimum utilization of high value computer resources through
Effectiveness Auditing and Efficiency Auditing.
It ensures that security aspects in the computerized environment are strictly followed
and secrecy in respect of system relating to individual, company is maintained.
It ensures that any evolutionary use of computer system does not adversely affect the
interest of the company.
Apart from thorough audit of computer system, system audit also critically examines link
between computer system and its manual interface and analyze the strength and weaknesses
of such interface.
Therefore, a system auditor must have an understanding of the business activities undertaken
in a computerized environment. He must be able to assess implication of risks, analyze and
evaluate controls.
Join GEEKY BANKER on YouTube
Join GEEKY BANKER on YouTube
Generally, IS audit is carried out in the following phases:
4. Perform audit tests, using Computer-Assisted Audit Techniques (CAATS) such as data
extraction and analysis software or test data, where appropriate.
6. Follow up.
Audit Organization
Audit Organization determines whether the audit will be done by Internal Auditors or by
External Auditors. While Internal Auditors understand the system and procedures as also the
objectives of the organization better, they may be influenced by the management. In such
cases, the audit may not reveal something which is not liked by the management. Thus, audit
by the Internal Auditors may not fully serve the purpose.
On the contrary, External Auditors may be impartial and cannot be influenced, but they will
take a lot of time to understand the systems and procedures of the organization. Thus, both
the systems have advantages and disadvantages. In any case, if the audit is done by Internal
Auditors, it is to be ensured that the Internal Auditors can work in an open, uninfluenced
environment.
Join GEEKY BANKER on YouTube
Process of planning
For the purpose of System Audit, the Process of Planning may be divided into the following
steps.
(i) Reviewing the latest Audit Report and take necessary steps,
Audit Reporting
Audit Reporting is the auditor's formal written communication with the management detailing
their Observations on various issues relating to the audit objectives with the purpose of
assisting the management to establish and maintain adequate system of internal control.
Collection of Evidence
For evaluating a computerized system, auditors must collect evidence relating to performance
of the system. Various tools and techniques are available to assist the auditors to collect such
evidence.
Computer Aided Audit Tools and Techniques (CAATTS):- Refer to any computer program
utilized to improve the audit process. Generally, however, it is used to refer to any data
extraction and analysis software. This would include programs such as data analysis and
extraction tools, spreadsheets (e.g. Excel), databases (e.g. Access), statistical analysis (e.g.
SAS), general audit software (e.g. ACL, Arbutus, EAS, business intelligence (e.g. Crystal Reports
and Business Objects), etc.
Program source code review: While Generalized Audit Software is used to examine the quality
of data produced by a program, Program Source Code Review is a direct way of examining
program codes. The Program Source Code Review identifies Erroneous code, unauthorized
code, ineffective code, inefficient code, and non-standard code. This helps the auditors to
identify the low quality of functioning of some programs.
Join GEEKY BANKER on YouTube
Test data: The Test Data approach indicates creation of dummy data to test specific aspects of
a program. The main objective of Test Data Technique is to assess whether the program
contains errors.
Program code comparison: By using this technique, auditor can ascertain audit of the correct
version of the software by comparing the program codes of the audit version of the software
with the same or the standard version of the software. There are two types of software
available - Source Code Comparison and Object Code Comparison. The Object Code
Comparison assures whether the audit version is authorized one or not. The Source Code
Comparison gives a meaningful list of discrepancies between the audit version and the
standard version of the software. This technique is easy to use requiring little technical
knowledge.
Concurrent audit techniques: These are used when the auditors need to collect evidence and
evaluate the same instantaneously. This is done mostly to ensure the process integrity. The
techniques available for concurrent auditing are- Integrated Test Facility (ITF),
Snapshots/Extended Records, System Control Audit Review File (SCARF), Continuous and
Intermittent Simulation (CIS).
They are independent of the system being audited and will use a read-only copy of the file to
avoid any corruption of an organization's data. Many audit-specific routines are used such as
sampling. Provides documentation of each test performed in the software that can be used as
documentation in the auditor's work papers.
Manual techniques: Apart from Computer Assisted Audit Techniques, evidences can also be
collected manually through Interviews, Questionnaires, and Control Flow Charts etc. After
collecting evidences, the same are to be evaluated to judge the functioning of the system in
respect of the four objectives of the System Audit as stat earlier. valuation of Asset
Safeguarding and Data Integrity Capability is done simultaneously as the same methodology is
Join GEEKY BANKER on YouTube
followed for the same. This evaluation is focused on qualitative as well as quantitative aspects.
The Auditors also evaluate the effectiveness of the system by judging some parameters like
Improvement in Task Accomplishment, Improvement in quality of Working Life, Organizational
Effectiveness, Technical Effectiveness, Economic Effectiveness etc. Such evaluation must also
include cost-benefit evaluation. Similarly, audit of System Efficiency is also to be done.
Join GEEKY BANKER on YouTube
Thanks for Watching
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D PART - 2
INFORMATION SYSTEM AUDIT
Unit –17
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE –D PART - 2
Chapter 17: Information System Audit
What we will study?
Clean and Dust Free Environment: The System Room must be in clean
and dust free environment. The temperature and the humidity in the
System Room must be controlled for better maintenance of the system.
This apart, a system of Water Damage Control and Pest Control should be
Join GEEKY BANKER on YouTube
in place, other aspects like Location of the System Room, Maintenance of
System Room should also be taken care of.
(vi) Database Controls: The Database Controls ensure that the data in the
database is not corrupted by any means and the integrity of data in the
database is maintained. To this end, data in the data base is copied to
another database or to any other storage media like magnetic tape. This
Join GEEKY BANKER on YouTube
method is known as Back-Up. This ensures that even if the database of
the system is corrupted by any chance, the same can be restored back to,
with the help of the copied database. In addition to this, the Back-Up
tapes should be stored in off-site storage so that in case some untoward
incidents occur in the office, tape backing up the data and kept in off-site
storage will be safe and can be used to restore data.
This apart, database must be free from virus so that the same is not
corrupted.
(vii) Output Controls: The objectives of Output Controls are to safeguard
against
Unauthorized alteration in the reports
Willful suppression of reports or its parts
Delivery of reports to unauthorized persons
Misplacement/exchange/deliberate destruction of reports
Careless handling of reports after expiry of retention period.
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D PART -3
INFORMATION SYSTEM AUDIT
Unit –17
Join GEEKY BANKER on YouTube
CYBER LAW?
CYBER LAW
Cyber Law is a generic term referring to all the legal and
regulatory aspects of the internet.
IT ACT – 2000
This is very relevant for the Banks. Banks can now use
digital signature in case of payments, remittances,
appraising loan proposals and even putting up internal notes
between various offices electronically.
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
COMPETITIVE BID PROCESS- RFP AND SLA
Unit –18
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Chapter 18
COMPETITIVE BID PROCESS- RFP AND SLA
RFP Process?
Pre-proposal Conference?
Scope of Work of RFP?
Evaluation of proposals?
Service Level Agreement?
What is an RFP?
The RFP invites relevant vendors to submit a proposal to
meet the desired need. More specifically, the RFP is a
document that explains a project's needs and asks for
proposed solutions from potential vendors.
Join GEEKY BANKER on YouTube
Difference between RFP and Tender?
Tender:-
Tenders are more rigid than RFPs. The tender is an “offer”
which the bidders accept in submitting a bid, resulting in a
bid contract. The bid contract requires that the project
owner and the successful bidder must enter a contract to
perform the project. In a tender process, the project owner
must follow several requirements that are implied into the
bid contract, unless the requirements are removed by the
bid invitation (which must be done carefully and typically
with legal advice).
RFP:-
RFP is the process that an organization goes through to
communicate a need for services. The RFP invites relevant
vendors to submit a proposal to meet the desired need.
More specifically, the RFP is a document that explains a
project's needs and asks for proposed solutions from
potential vendors.
Join GEEKY BANKER on YouTube
The life cycle Of a contractual relationship always starts
with requirements phase.
There are four major stages of a contractual relationship.
1. Setup
2. Contract
3. Operations
4. Transition-out.
The first two stages, setup and contract need a lot of focus
in order to ensure smooth 3 and 4h stages i.e., operations
and exit.
RFP PROCESS
The process begins with scope of work (SOW) statement
(description of services) or specifications (description of
goods), and proposal evaluation criteria.
EVALUATION OF PROPOSALS
Proposal openings are open to the public and are
scheduled two to four weeks after the pre-proposal
Conference. This may vary depending on the complexity of
project that is being bid.
The RFP must contain a cost proposal format that allows the
vendors to explicitly identify their charges for the
deliverables identified in the project. Deliverables must be
well defined so that all vendors can respond to the same
Join GEEKY BANKER on YouTube
deliverables thus allowing the organization to make
comparative analyses of the vendor's costs.
CONTRACT CO-ORDINATION
Contract co-ordination is basically the performance
monitoring of the vendor. After award, the project
coordinator, who is usually named in the contract
document, monitors the vendor's performance, approves
Join GEEKY BANKER on YouTube
Invoices, and notifies the Purchasing Office if any problems
are encountered.
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
COMPETITIVE BID PROCESS- RFP AND SLA
Unit –18 Part - 2
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Chapter 18
COMPETITIVE BID PROCESS- RFP AND SLA
SLA Benefits
SLAs make use of the knowledge of enterprise capacity
demands, peak periods, and standard usage baselines to
compose the enforceable and measurable outsourcing
agreement between vendor and client.
Join GEEKY BANKER on YouTube
For instance,
SLA PROCESSES
Before determining what can be measured, both parties
must understand the customer's goals. By focusing
initially on the identification of goals, prospective
partners are in a better position to clearly recognize
which financial, performance, and strategic metrics
are appropriate for measuring success.
b) Service representative(s);
c) A Finance representative;
Preparation
Join GEEKY BANKER on YouTube
Negotiation
a) Create a draft SLA
b) Finalize SLA
Management
a) Implement Performance
b) Measurement System
c) Report attained service levels
d) Review SLA
Join GEEKY BANKER on YouTube
Thanks for Watching
9835634545
Join GEEKY BANKER on YouTube
Geeky Bankers
CAIIB (IT)
Module –D
COMPETITIVE BID PROCESS- RFP AND SLA
Unit –18 PART-3
Join GEEKY BANKER on YouTube
CAIIB(IT) MODULE -D
Chapter 18 PART - 3
COMPETITIVE BID PROCESS- RFP AND SLA
SLA STRUCTURE?
CHANGE MANAGEMENT?
SPOF AND CLUSTERING?
WORKLOAD SCHEDULING?
MONITORING TOOL?
STRUCTURING AN SLA
Structuring an SLA is an important, multiple-step process
involving both the client and the vendor. In order to
successfully meet business objectives, SLA best practices
dictate that the vendor and client collaborate to conduct a
detailed assessment of the client's existing applications
Join GEEKY BANKER on YouTube
General Clauses
Services and Service Levels
Management Elements
General Clauses
1. Scope
2. Parties to the Agreement
3. Term
4. Conventions
Management Elements
1. Rewards and Remedies
2. Escalation Procedures
3. Reporting
4. Reviews
5. Change Process
Join GEEKY BANKER on YouTube
6. Points of Contact
7. Approval
Change Management
A well-defined change management procedure is a critical
security measure to protect the production IT environment
Join GEEKY BANKER on YouTube
What is Clustering?
Workload Scheduling
1.Real time
2.Log-based.
1. Sematext Monitoring
2. SolarWinds Server & Application Monitor
3. Atera
4. Datadog Infrastructure Monitoring
5. Site24x7 Server Monitoring
6. Paessler PRTG Network Monitor
7. ManageEngine Applications Manager
8. Nagios
9. Zabbix
10. NinjaOne
11. Spiceworks
SLA MANAGEMENT
SLA agreements require constant discussion and
renegotiation as the needs of the business change. Using
software tools to automate the measuring process saves
time and reduces the chance of errors and conflict.
9835634545
Geeky Bankers
CAIIB (IT)
Module –D
RBI guidelines on IT security (2016) & ATM
Security (2017)
Unit – 19
The Reserve Bank of India on 02-June 2016 had issued a circular (RBI/
2015-16/418DBS.CO/CSITE/BC.11/33.01.001/2015-16) on Cyber Security
Framework in Banks. This was for All Scheduled Commercial Banks
(excluding Regional Rural Banks).
availability of information.
Cyber Security
enforcement.
It deals with threats that may or may not exist in the cyber realm
information, etc.
2. Auto run facility of exe files from a network or a USB port shall be
disabled immediately.