Unit – 35 : Security Considerations
A typical computerised environment constitutes three independent but separate components Software, Hardware and Data
The Risks broadly lead to
Incorrect decision-making leading to setback to business
Interruption in activities due to loss of data, hardware, software, Peopleware.
Violation of Privacy
Direct Financial loss due to computer frauds.
The objective of Computer Auditing is:
Assets safeguarding
Preserving data integrity
Achieving system efficiency
Risk prone components in computerised systems
Errors and omissions in data and software
Unauthorised disclosure of confidential information
Computer abuse and mis-utilisation of banks assets
Effective Control Mechanism in computerised environment
Preventive
Detective
Corrective
Scope of System Audit is
Review of operations to establish compliance
Review of the adequacy of procedures and controls
Integrity review focused at fraud detection/prevention of IT system
Audit Trail is a chronological record of all events occurring in a system.
Legal Framework for Electronic Transactions
Consequent upon the recognition given to the electronic records, electronic documents and electronic signatures, incidental amendments have also been made in the following acts:
The Indian Penal Code, 1860
The Indian Evidence Act, 1872
The Bankers’ Books Evidence Act, 1891
The Reserve Bank Of India Act 1934
For complete notes, visit - http://www.jaiibcaiibmocktest.com/material.php
Add maximum of our banking friends to our groups https://www.facebook.com/groups/226943377506645/ https://www.facebook.com/groups/JAIIB.CAIIB.STUDY.MATERIALS/ for mutual benefit.
|