SlideShare a Scribd company logo
1 of 13
IT TODAY AND TOMORROW
•INFORMATION TECHNOLOGY (IT) IS BROADLY USED IN ALL AREAS
OF COMMERCE AROUND THE WORLD. IT IMPERATIVE THAT THE
DEVELOPING WORLD OF COMMERCE NEEDS A PARALLEL
GROWTH OF KNOWLEDGE FOR IT PROCESSES AND CONTROL
THAT IS BASICALLY SIGNIFICANT FOR EVERY BUSNESS’S STANCEI
ON INFORMATION. THE MANNER OF PACING ON HOW
INFORMATION SHOULD BE AVAILABLE FOR BUSINESS IS A
PRIMARY CONCERN OF EVERY EACH OF THEM.
TO NAME A FEW, CONTROL ORIENTED
ORGANIZATIONS:
•(AICPA) – AMERICAN INSTITUTE OF CERTIFIED PUBLIC
ACCOUNTANT
•(CICA) – CANADIAN INSTITUTE OF CHARTERED ACCOUNTANTS
•(ACFE) – ASSOCIATION OF CERTIFIED FRAUD EXAMINERS
•THEY RECOGNIZE THE IMPORTANCE OF FURTHER RESEARCH,
STUDIES AND DEVELOPMENT REGARDING IMPROVED CONTROL
FOR IT PROCESSES IN BUSINESS.
SECURITY ORGANIZATIONS AGAINST
TECHNOLOGY CRIMES
•(SANS) – SYSADMIN, AUDIT, NETWORK, SECURITY) INSTITUTE
•(GAO) – U.S. GOVERNMENT ACCOUNTABILITY OFFICE
•(FBI) – FEDERAL BUREAU OF INVESTIGATION
•(FTC) – FEDERAL TRADE COMMISSION
•(CSI) – COMPUTER SECURITY INSTITUTE
•(CERT) – COMPUTER EMERGENCY RESPONSE TEAMS
CONTROL OBJECTIVE FOR INFORMATION
AND RELATED TECHNOLOGY (COBIT)
• IT IS THE MOST RECENT ADDITION TO THE MAJOR STUDIES CONDUCTED
REGARDING IT CONTROLS. IT BASICALLY DEFINES A SET OF GENERIC
PROCESS FOR THE MANAGEMENT OF IT. ITS COMPONENTS INCLUDE:
1.FRAMEWORK
2.PROCESS DESCRIPTION
3.CONTROL OBJECTIVES
4.MANAGEMENT GUIDELINES
5.MATURITY MODELS
•COLLOQUIUM FOR INFORMATION SYSTEM SECURITY
EDUCATORS (CISSE) HAS BEEN A LEADING PROPONENT
FOR IMPLEMENTING THE COURSE OF INSTRUCTION IN
INFORMATION SECURITY (INFOSEC) AND INFORMATION
ASSURANCE IN EDUCATION EVER SINCE 1996.
INFORMATION INTEGRITY, RELIABILITY, AND
VALIDITY: IMPORTANCE IN TODAY’S GLOBAL
BUSINESS ENVIRONMENT
•BASED ON HISTORICAL EVENTS, ORGANIZATION ARE CRUCIALLY
RELIANT ON INFORMATION’S IS AN ESSENTIAL MECHANISM A
BUSINESS NEED IN ITS DAY-TO-DAY OPERATION. IT SERVES AS
BASIS AND FOUNDATION OF TRUST BETWEEN THE ENTITY AND
THE STAKEHOLDERS.
•MOREOVER, HAVING A DEEPER UNDERSTANDING ABOUT
INFORMATION’S STANDARDS WILL PAVE THE WAY ON EFFICIENCY
AND EFFICACY OF FAIR AND JUST SHARING OF DATA
COMMUNICATION AMONG BUSINESSES, TO WIT:
a.INTEGRITY – COMPLETENESS, HONESTY, AND FAIRNESS OF INFORMATION
b.RELIABILITY – THE EXTENT TO WHICH INFORMATION YIELDS SAME
RESULTS ON REPEATED TRIALS.
c.VALIDITY – IS THE STATE OF BEING WELL-GROUNDED, JUST AND
RELEVANT.
E-COMMERCE AND ELECTRONIC FUND
TRANSFER
•E-COMMERCE – IS A METHOD OF BUYING AND SELLING GOODS
AND SERVICES ONLINE.
•ELECTRONIC FUND TRANSFER (EFT) – IS A SYSTEM FOR
TRANSFERRING MONEY FROM ONE BANK TO ANOTHER WITHOUT USING
A PAPER MONEY. THE FUNDS FLOW COULD BE EITHER A SINGLE INSTITUTION
OR MULTIPLE INSTITUTION.IT IS WELL-KNOWN BY A NUMBER OF NAMES
THROUGHOUT COUNTRIES AND DIFFERENT PAYMENT SYSTEMS E.G.,
“ELECTRONIC CHECK” OR “E-CHECK” IN UNITED STATES, “BANK TRANSFER” OR
“BANK PAYMENT” IN UNITED KINGDOM AND LASTLY, “GIRO TRANSFER” IN
SEVERAL EUROPEAN COUNTRIES.
FEDERAL SECURITY LEGISLATION
•THE IT AUDITOR SHOULD RECOGNIZE THAT THE U.S. FEDERAL
GOVERNMENT HAS PASSED A NUMBER OF LAWS TO DEAL WITH
ISSUES OF COMPUTER CRIME AND SECURITY AND PRIVACY OF IS.
• COMPUTER FRAUD AND ABUSE ACT OF 1986
MAKES IT A CRIME FOR ANYONE TO ACCESS WITHOUT AUTHORIZATION A
COMPUTER OR COMPUTER SYSTEM USED BY A FINANCIAL INSTITUTION, US
GOVERNMENT AGENCY, OR ANY ORGANIZATION OR INDIVIDUAL INVOLVED IN
INTERSTATE OR FOREIGN COMMERCE OR COMMUNICATION.
FEDERAL SECURITY LEGISLATION
•COMPUTER SECURITY ACT OF 1987
WAS A UNITED STATES FEDERAL LAW ENACTED IN 1987 DUE TO
CONGRESSIONAL CONCERNS AND PUBLIC AWARENESS ON
COMPUTER SECURITY-RELATED ISSUES AND BECAUSE OF DISPUTES
ON THE CONTROL OF UNCLASSIFIED INFORMATION. IT WAS INTENDED
TO IMPROVE THE SECURITY AND PRIVACY OF SENSITIVE
INFORMATION IN FEDERAL COMPUTER SYSTEMS AND TO ESTABLISH
MINIMALLY ACCEPTABLE SECURITY PRACTICES FOR SUCH SYSTEM.
PRIVACY ON THE INFORMATION
SUPERHIGHWAY
•THE TERM “INFORMATION SUPERHIGHWAY” IS ATTRIBUTED TO
THE FORMER US VICE PRESIDENT AL GORE. HE USED THE TERM
TO DESCRIBE A COMMUNICATIONS NETWORK AKIN TO A HIGHWAY
SYSTEM. THE SYSTEM WILL ALLOW EVERYONE TO BE
CONNECTED TO EVERYONE ELSE, HAVE A UNIVERSAL STANDARD,
AND MINIMIZE BOTTLENECKS.
•ONE MAJOR CONCERN IN INFORMATION SUPERHIGHWAY IS
PRIVACY. “FORGING E-MAIL IS NOTORIOUSLY EASY”, - GARY
JACKSON
SECURITY PRIVACY AND AUDIT
•TODAY, PEOPLE ARE SHOPPING AROUND AT HOME THROUGH
NETWORKS. PEOPLE USE “NUMBERS” OR ACCOUNTS TO BUY
WHAT THEY WANT VIA SHOPPING COMPUTER OR PLATFORMS.
THESE “NUMBERS” ARE “DIGITAL MONEY”, THE MODERN
CURRENCY IN THE WORLD. DIGITAL MONEY WILL BRING US
BENEFITS AS WELL AS PROBLEMS.
•FOR IT AUDITOR, THE NEED FOR AUDIT, SECURITY, AND CONTROL
WILL BE CRITICAL IN THE AREAS OF IT AND WILL BE THE
CHALLENGE OF THIS MILLENNIUM.

More Related Content

Similar to CIS-REPORT-1.pptx

CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.pptChayaSorir
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) Evolver Inc.
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Week 4 Purchasing & Info Technology
Week 4 Purchasing & Info TechnologyWeek 4 Purchasing & Info Technology
Week 4 Purchasing & Info TechnologyShah Danny
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
INFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptxINFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptxSmitachetia1
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An OxymoronJohn Mancini
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information EconomyEricsson
 
Mobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsMobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsThe Mechanism
 

Similar to CIS-REPORT-1.pptx (20)

CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Week 4 Purchasing & Info Technology
Week 4 Purchasing & Info TechnologyWeek 4 Purchasing & Info Technology
Week 4 Purchasing & Info Technology
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Presentation for ethics
Presentation for ethicsPresentation for ethics
Presentation for ethics
 
Information security
Information securityInformation security
Information security
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
INFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptxINFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptx
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An Oxymoron
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Mobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsMobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of Cards
 

Recently uploaded

Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.soniya singh
 
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICE
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICEUDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICE
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICEApsara Of India
 
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura Bhopalpura
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura BhopalpuraHi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura Bhopalpura
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura BhopalpuraApsara Of India
 
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceCall Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceApsara Of India
 
Top 10 Makeup Brands in India for women
Top 10  Makeup Brands in India for womenTop 10  Makeup Brands in India for women
Top 10 Makeup Brands in India for womenAkshitaBhatt19
 
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service AvailableCall Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service AvailableApsara Of India
 
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort Service
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort ServiceAll Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort Service
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort ServiceApsara Of India
 
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat Escorts
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat EscortsCall Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat Escorts
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat EscortsApsara Of India
 
My Personal Testimony - James Eugene Barbush - March 11, 2024
My Personal Testimony - James Eugene Barbush - March 11, 2024My Personal Testimony - James Eugene Barbush - March 11, 2024
My Personal Testimony - James Eugene Barbush - March 11, 2024JAMES EUGENE BARBUSH
 
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort ServiceApsara Of India
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip CallMs Riya
 
Call Girls in Sarita Vihar__ 8448079011 Escort Service in Delhi
Call Girls in Sarita Vihar__ 8448079011 Escort Service in DelhiCall Girls in Sarita Vihar__ 8448079011 Escort Service in Delhi
Call Girls in Sarita Vihar__ 8448079011 Escort Service in DelhiRaviSingh594208
 
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...leatherjacketcreator
 
"Maximizing your savings:The power of financial planning".pptx
"Maximizing your savings:The power of financial planning".pptx"Maximizing your savings:The power of financial planning".pptx
"Maximizing your savings:The power of financial planning".pptxsadiisadiimano
 
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)Delhi Call girls
 
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -Pooja Nehwal
 
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsCall Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsPooja Nehwal
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
 
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICE
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICEUDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICE
UDAIPUR CALL GIRLS 96O287O969 CALL GIRL IN UDAIPUR ESCORT SERVICE
 
Siegfried Hottelmann: An Opportunistic Migrant, Part 1
Siegfried Hottelmann: An Opportunistic Migrant, Part 1Siegfried Hottelmann: An Opportunistic Migrant, Part 1
Siegfried Hottelmann: An Opportunistic Migrant, Part 1
 
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura Bhopalpura
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura BhopalpuraHi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura Bhopalpura
Hi Profile Escorts In Udaipur 09602870969 Call Girls in Sobaghpura Bhopalpura
 
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceCall Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
 
Top 10 Makeup Brands in India for women
Top 10  Makeup Brands in India for womenTop 10  Makeup Brands in India for women
Top 10 Makeup Brands in India for women
 
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service AvailableCall Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
 
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort Service
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort ServiceAll Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort Service
All Hotel Karnal Call Girls 08168329307 Noor Mahal Karnal Escort Service
 
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat Escorts
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat EscortsCall Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat Escorts
Call Girls In Panipat 08860008073 ✨Top Call Girl Service Panipat Escorts
 
My Personal Testimony - James Eugene Barbush - March 11, 2024
My Personal Testimony - James Eugene Barbush - March 11, 2024My Personal Testimony - James Eugene Barbush - March 11, 2024
My Personal Testimony - James Eugene Barbush - March 11, 2024
 
Private : +91 9999965857 Affairs: Paschim Vihar Call Girls {{ Monika}} Delh...
Private : +91 9999965857 Affairs: Paschim Vihar Call Girls  {{ Monika}}  Delh...Private : +91 9999965857 Affairs: Paschim Vihar Call Girls  {{ Monika}}  Delh...
Private : +91 9999965857 Affairs: Paschim Vihar Call Girls {{ Monika}} Delh...
 
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service
💞Sexy Call Girls In Ambala 08168329307 Shahabad Call Girls Escort Service
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
 
Rohini Sector 24 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 24 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 24 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 24 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls in Sarita Vihar__ 8448079011 Escort Service in Delhi
Call Girls in Sarita Vihar__ 8448079011 Escort Service in DelhiCall Girls in Sarita Vihar__ 8448079011 Escort Service in Delhi
Call Girls in Sarita Vihar__ 8448079011 Escort Service in Delhi
 
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...
Unveiling LeatherJacketsCreator's High-Demand Leather Jackets: Elevate Your S...
 
"Maximizing your savings:The power of financial planning".pptx
"Maximizing your savings:The power of financial planning".pptx"Maximizing your savings:The power of financial planning".pptx
"Maximizing your savings:The power of financial planning".pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
 
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -
Mumbai Call Girls Malad West WhatsApp 9892124323 Full Night Enjoy -
 
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsCall Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
 

CIS-REPORT-1.pptx

  • 1.
  • 2. IT TODAY AND TOMORROW •INFORMATION TECHNOLOGY (IT) IS BROADLY USED IN ALL AREAS OF COMMERCE AROUND THE WORLD. IT IMPERATIVE THAT THE DEVELOPING WORLD OF COMMERCE NEEDS A PARALLEL GROWTH OF KNOWLEDGE FOR IT PROCESSES AND CONTROL THAT IS BASICALLY SIGNIFICANT FOR EVERY BUSNESS’S STANCEI ON INFORMATION. THE MANNER OF PACING ON HOW INFORMATION SHOULD BE AVAILABLE FOR BUSINESS IS A PRIMARY CONCERN OF EVERY EACH OF THEM.
  • 3. TO NAME A FEW, CONTROL ORIENTED ORGANIZATIONS: •(AICPA) – AMERICAN INSTITUTE OF CERTIFIED PUBLIC ACCOUNTANT •(CICA) – CANADIAN INSTITUTE OF CHARTERED ACCOUNTANTS •(ACFE) – ASSOCIATION OF CERTIFIED FRAUD EXAMINERS •THEY RECOGNIZE THE IMPORTANCE OF FURTHER RESEARCH, STUDIES AND DEVELOPMENT REGARDING IMPROVED CONTROL FOR IT PROCESSES IN BUSINESS.
  • 4. SECURITY ORGANIZATIONS AGAINST TECHNOLOGY CRIMES •(SANS) – SYSADMIN, AUDIT, NETWORK, SECURITY) INSTITUTE •(GAO) – U.S. GOVERNMENT ACCOUNTABILITY OFFICE •(FBI) – FEDERAL BUREAU OF INVESTIGATION •(FTC) – FEDERAL TRADE COMMISSION •(CSI) – COMPUTER SECURITY INSTITUTE •(CERT) – COMPUTER EMERGENCY RESPONSE TEAMS
  • 5. CONTROL OBJECTIVE FOR INFORMATION AND RELATED TECHNOLOGY (COBIT) • IT IS THE MOST RECENT ADDITION TO THE MAJOR STUDIES CONDUCTED REGARDING IT CONTROLS. IT BASICALLY DEFINES A SET OF GENERIC PROCESS FOR THE MANAGEMENT OF IT. ITS COMPONENTS INCLUDE: 1.FRAMEWORK 2.PROCESS DESCRIPTION 3.CONTROL OBJECTIVES 4.MANAGEMENT GUIDELINES 5.MATURITY MODELS
  • 6. •COLLOQUIUM FOR INFORMATION SYSTEM SECURITY EDUCATORS (CISSE) HAS BEEN A LEADING PROPONENT FOR IMPLEMENTING THE COURSE OF INSTRUCTION IN INFORMATION SECURITY (INFOSEC) AND INFORMATION ASSURANCE IN EDUCATION EVER SINCE 1996.
  • 7. INFORMATION INTEGRITY, RELIABILITY, AND VALIDITY: IMPORTANCE IN TODAY’S GLOBAL BUSINESS ENVIRONMENT •BASED ON HISTORICAL EVENTS, ORGANIZATION ARE CRUCIALLY RELIANT ON INFORMATION’S IS AN ESSENTIAL MECHANISM A BUSINESS NEED IN ITS DAY-TO-DAY OPERATION. IT SERVES AS BASIS AND FOUNDATION OF TRUST BETWEEN THE ENTITY AND THE STAKEHOLDERS.
  • 8. •MOREOVER, HAVING A DEEPER UNDERSTANDING ABOUT INFORMATION’S STANDARDS WILL PAVE THE WAY ON EFFICIENCY AND EFFICACY OF FAIR AND JUST SHARING OF DATA COMMUNICATION AMONG BUSINESSES, TO WIT: a.INTEGRITY – COMPLETENESS, HONESTY, AND FAIRNESS OF INFORMATION b.RELIABILITY – THE EXTENT TO WHICH INFORMATION YIELDS SAME RESULTS ON REPEATED TRIALS. c.VALIDITY – IS THE STATE OF BEING WELL-GROUNDED, JUST AND RELEVANT.
  • 9. E-COMMERCE AND ELECTRONIC FUND TRANSFER •E-COMMERCE – IS A METHOD OF BUYING AND SELLING GOODS AND SERVICES ONLINE. •ELECTRONIC FUND TRANSFER (EFT) – IS A SYSTEM FOR TRANSFERRING MONEY FROM ONE BANK TO ANOTHER WITHOUT USING A PAPER MONEY. THE FUNDS FLOW COULD BE EITHER A SINGLE INSTITUTION OR MULTIPLE INSTITUTION.IT IS WELL-KNOWN BY A NUMBER OF NAMES THROUGHOUT COUNTRIES AND DIFFERENT PAYMENT SYSTEMS E.G., “ELECTRONIC CHECK” OR “E-CHECK” IN UNITED STATES, “BANK TRANSFER” OR “BANK PAYMENT” IN UNITED KINGDOM AND LASTLY, “GIRO TRANSFER” IN SEVERAL EUROPEAN COUNTRIES.
  • 10. FEDERAL SECURITY LEGISLATION •THE IT AUDITOR SHOULD RECOGNIZE THAT THE U.S. FEDERAL GOVERNMENT HAS PASSED A NUMBER OF LAWS TO DEAL WITH ISSUES OF COMPUTER CRIME AND SECURITY AND PRIVACY OF IS. • COMPUTER FRAUD AND ABUSE ACT OF 1986 MAKES IT A CRIME FOR ANYONE TO ACCESS WITHOUT AUTHORIZATION A COMPUTER OR COMPUTER SYSTEM USED BY A FINANCIAL INSTITUTION, US GOVERNMENT AGENCY, OR ANY ORGANIZATION OR INDIVIDUAL INVOLVED IN INTERSTATE OR FOREIGN COMMERCE OR COMMUNICATION.
  • 11. FEDERAL SECURITY LEGISLATION •COMPUTER SECURITY ACT OF 1987 WAS A UNITED STATES FEDERAL LAW ENACTED IN 1987 DUE TO CONGRESSIONAL CONCERNS AND PUBLIC AWARENESS ON COMPUTER SECURITY-RELATED ISSUES AND BECAUSE OF DISPUTES ON THE CONTROL OF UNCLASSIFIED INFORMATION. IT WAS INTENDED TO IMPROVE THE SECURITY AND PRIVACY OF SENSITIVE INFORMATION IN FEDERAL COMPUTER SYSTEMS AND TO ESTABLISH MINIMALLY ACCEPTABLE SECURITY PRACTICES FOR SUCH SYSTEM.
  • 12. PRIVACY ON THE INFORMATION SUPERHIGHWAY •THE TERM “INFORMATION SUPERHIGHWAY” IS ATTRIBUTED TO THE FORMER US VICE PRESIDENT AL GORE. HE USED THE TERM TO DESCRIBE A COMMUNICATIONS NETWORK AKIN TO A HIGHWAY SYSTEM. THE SYSTEM WILL ALLOW EVERYONE TO BE CONNECTED TO EVERYONE ELSE, HAVE A UNIVERSAL STANDARD, AND MINIMIZE BOTTLENECKS. •ONE MAJOR CONCERN IN INFORMATION SUPERHIGHWAY IS PRIVACY. “FORGING E-MAIL IS NOTORIOUSLY EASY”, - GARY JACKSON
  • 13. SECURITY PRIVACY AND AUDIT •TODAY, PEOPLE ARE SHOPPING AROUND AT HOME THROUGH NETWORKS. PEOPLE USE “NUMBERS” OR ACCOUNTS TO BUY WHAT THEY WANT VIA SHOPPING COMPUTER OR PLATFORMS. THESE “NUMBERS” ARE “DIGITAL MONEY”, THE MODERN CURRENCY IN THE WORLD. DIGITAL MONEY WILL BRING US BENEFITS AS WELL AS PROBLEMS. •FOR IT AUDITOR, THE NEED FOR AUDIT, SECURITY, AND CONTROL WILL BE CRITICAL IN THE AREAS OF IT AND WILL BE THE CHALLENGE OF THIS MILLENNIUM.