SlideShare a Scribd company logo
IT APPLICATIONS
Professional Stage Application Level, ICAB
Teacher: Mohammad Abdul Matin
Chapter 5
Controls and Standards
Chapter Outline
 Information System Security Controls
 Physical Security Controls
 Logical Security Controls
 Control and Standard for Information Integrity
 Control and Standard for Information Access Control
 Control and Standard for Computer Audit
 Control and Standard for System Implementation Phase
 Control and Standard for System Maint. and Evaluation
 Risks of IT Systems
 Controls for Personal Systems
Syllabus
 In the examination, candidates may be required to
a. explain the controls and standards which are applied during
the system implementation phases of installation, testing,
training, documentation, file conversion and changeover,
and post-implementation review
b. explain the controls and standards which are applied to
system maintenance and evaluation (system maintenance,
evaluation, computer based monitoring, system
performance)
c. describe the controls that are applied to personal systems to
ensure processing integrity, security and safeguarding of IT
resources, and availability/continuity provisions (backup and
recovery) for IT resources
Systems’ Purpose & Components
• Capital management
• Foundation of doing business
• Productivity
• Strategic opportunity and advantage
Typical Enterprise System
Control & Standards for System
Implementation Phases
System
Installation
System Testing Documentation
Training
Conversion &
Change Over
Control in ERP Implementation
Training &
Practice
System
Tests
Develop To-
Be
Phase 2:
Business
Blueprint
Go
Live
Phase 3:
Realization
Project
Close
Phase 1:
Project
Preparation
Project
Kickoff
Understand
As-Is
Overview
Training
Phase 4:
Final
Preparation
Configure
System
Training
Materials
User
Support
Phase 5:
Go Live &
Support
March April May June
W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 W15 W16 W15 W16
Cutover
System Selection
Implementation Readiness
Business Readiness:
 business PROCESSES are seen through and documented
 competent PEOPLE are in right places
 process CHAMPIONS are identified
Technology Readiness:
 robust IT INFRASTRUCTURE is in place
 right HARDWARE is selected, ordered and delivered
 right SOFTWARE is selected and licenses are ordered
 competent SYSTEM INTEGRATOR is selected and engaged
 An agreed PROJECT PLAN is finalized
Planning (High Level)
Broad Activities Sep Oct Nov Dec Jan Feb Apr Jun Jul
BUSINESS READINESS
TECHNOLOGY READINESS :
- Infra. & ERP resources recruitment
- Secured Data Center preparation
- Project Office & Training Facility set up
- Network Review & Redundancy set up
- ERP solution finalization
- Hardware sizing, ordering & delivery
- System Integrator selection
- Scope of Work finalization
- Project Plan finalization
PROJECT KICK OFF (Start)
ERP IMPLEMENTATION (As per Project Plan)
GO LIVE 1st August 2012
1st February 2012
Project Team
System Development Lifecycle
System Implementation
Prepare for System
Implementation
Deploy
System
System
Initiation
Requirement
Analysis
System
Design
System
Construction
System
Acceptance
System Preparation
Transition to Performing
Organization
Transition
Control & Standards for System
Implementation Phases (cont.)
 System Installation
– Implementation plan, milestones, stakeholder engagement,
communication, approval, issue handling and back out plan
 System Testing
– Scheduled, planned testing with defined criteria, scope,
expectation, scenarios and records
– User Acceptance Testing (UAT)
 Documentation
– System / Process Description
– System Documentation
– System File Layout / Architecture Documentation
Control & Standards for System
Implementation Phases (cont.)
 Training
– Administration / MDM training
– User Training
– TOT Approach
 File Conversion and Change-over
– New System Implementation
• Data preparation, go-live
– Manual System to Automation
• Data preparation, parallel run, cut-over
– Old System to New System
• Data conversion & transfer, cut-over
Risks in Implementation
Expectation & Experience Curve
Risks to IT Systems
 Computer Viruses
– Protection and Updating
– Checking and Cleaning
– Awareness of Risks (Internet, removable disks)
– Recovery from Losses
 Computer Hackers (Intrusion)
– Implement Firewall
– Develop and Apply Policy
– Antivirus, Antispyware and Intrusion Prevention Software
– Address vulnerabilities
– Conduct Tests
Controls for Personal Systems
 Sensitivity of information is much higher than any other
systems in an organization
– HRIS
– Personal information
– Salary information
 Needs to be protected from both external and internal
users
 Sometimes needs separating HRIS and Payroll at Admin
levels
Controls for Personal Systems (cont.)
 General Controls
– Access, data, program, physical security
– Software development and change control
– Data center operation
– Disaster recovery
 Application Controls
– Input controls
– Authorization
– Validation
– Error notification and correction
– Processing controls
– Output controls
Questions
 How the security requirements can be implemented in
developing a new accounting system?
Thank You

More Related Content

PPTX
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
PPTX
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
PPTX
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
PPTX
ICAB - ITK Chapter 3 class 4 - Management of IT
PPTX
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
PPTX
ICAB - ITK Chapter 3 class 6-7 - Management of IT
PPTX
ICAB - ITK Chapter 1 class 2-3 - Information within Organization
PPTX
Information System Architecture and Audit Control Lecture 1
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 3 class 4 - Management of IT
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 3 class 6-7 - Management of IT
ICAB - ITK Chapter 1 class 2-3 - Information within Organization
Information System Architecture and Audit Control Lecture 1

What's hot (20)

PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PPT
3c 2 Information Systems Audit
PPT
Information System Architecture and Audit Control Lecture 2
PPTX
Information Systems Audit - Ron Weber chapter 1
PPTX
Control and Audit Information System
PPTX
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
PDF
Internal controls in an IT environment
PPTX
ITGC audit of ERPs
PPTX
Auditing SOX ITGC Compliance
PDF
Basics in IT Audit and Application Control Testing
PPTX
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
PPT
008.itsecurity bcp v1
PPTX
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
PPT
transaction processing system
PDF
Control and audit of information System (hendri eka saputra)
PPT
IT Audit methodologies
PPT
DEVELOPMENT PROCESS OF MIS
PPTX
Conducting an Information Systems Audit
PPTX
Information System Audit and Control
IT General Controls Presentation at IIA Vadodara Audit Club
3c 2 Information Systems Audit
Information System Architecture and Audit Control Lecture 2
Information Systems Audit - Ron Weber chapter 1
Control and Audit Information System
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Internal controls in an IT environment
ITGC audit of ERPs
Auditing SOX ITGC Compliance
Basics in IT Audit and Application Control Testing
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
008.itsecurity bcp v1
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
transaction processing system
Control and audit of information System (hendri eka saputra)
IT Audit methodologies
DEVELOPMENT PROCESS OF MIS
Conducting an Information Systems Audit
Information System Audit and Control
Ad

Viewers also liked (20)

PPTX
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
PPTX
ICAB - ITA Chapter 1 class 3 - IT Strategy
PPTX
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
PPTX
ICAB - ITA Chapter 1 class 5-6 - IT in Enterprise in Bangladesh
PPTX
ICAB - ITK Chapter 1 class 1 - Information within Organization
PPT
Nonrandom sampling
PPT
Sampling methods PPT
PPTX
ICAB - ITK Chapter 3 class 5 - Management of IT
PPTX
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
PPT
Decision making
PPTX
non probability sampling
PPTX
No-probilty
PPTX
ICAB - ITK Chapter 2 Set 2 - Information Technology Architecture
PPTX
Non probability sampling methods
PPTX
Sampling in qualitative researc
PPT
Non Probability Sampling
PPT
Sampling techniques Systematic & Purposive sampling
PPTX
Slide sampling presentation-latest
PPTX
Sampling Methods
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 3 - IT Strategy
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 5-6 - IT in Enterprise in Bangladesh
ICAB - ITK Chapter 1 class 1 - Information within Organization
Nonrandom sampling
Sampling methods PPT
ICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
Decision making
non probability sampling
No-probilty
ICAB - ITK Chapter 2 Set 2 - Information Technology Architecture
Non probability sampling methods
Sampling in qualitative researc
Non Probability Sampling
Sampling techniques Systematic & Purposive sampling
Slide sampling presentation-latest
Sampling Methods
Ad

Similar to ICAB - ITA Chapter 5 class 9-10 - Controls and Standards (20)

PPTX
Systems Life Cycle
PPTX
Information system implementation, change management and control
PPTX
IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13
PPTX
Accounting System Design and Development-Internal Controls
PPTX
Software Development Life Cycle (SDLC).pptx
DOC
sdlc-Lecture2.doc System analsysis and design
PDF
Systems Analysis Midterm Lesson
PDF
bdms unit importants in MBA 3 rd sem in marketingem
PDF
chapter11-120827115420-phpapp01.pdf
PPT
Modul Sistem informasi akuntansi Bagranoff simkin strand
PPT
BIS Ch 4.ppt
PPTX
Chapter 11 Managing Systems Implementation .pptx
PPTX
CS 414 (IT Project Management)
PPTX
HI600 Ch 1 Inst_slides
PPT
Information system
PPT
Information Systems Lifecycle
DOCX
What is an Information system
DOCX
Information system
PPTX
Information System (IS) life cycle.pptx
Systems Life Cycle
Information system implementation, change management and control
IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13
Accounting System Design and Development-Internal Controls
Software Development Life Cycle (SDLC).pptx
sdlc-Lecture2.doc System analsysis and design
Systems Analysis Midterm Lesson
bdms unit importants in MBA 3 rd sem in marketingem
chapter11-120827115420-phpapp01.pdf
Modul Sistem informasi akuntansi Bagranoff simkin strand
BIS Ch 4.ppt
Chapter 11 Managing Systems Implementation .pptx
CS 414 (IT Project Management)
HI600 Ch 1 Inst_slides
Information system
Information Systems Lifecycle
What is an Information system
Information system
Information System (IS) life cycle.pptx

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Computing-Curriculum for Schools in Ghana
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Presentation on HIE in infants and its manifestations
PDF
RMMM.pdf make it easy to upload and study
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Complications of Minimal Access Surgery at WLH
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Computing-Curriculum for Schools in Ghana
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Supply Chain Operations Speaking Notes -ICLT Program
A systematic review of self-coping strategies used by university students to ...
Presentation on HIE in infants and its manifestations
RMMM.pdf make it easy to upload and study
Microbial disease of the cardiovascular and lymphatic systems
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Complications of Minimal Access Surgery at WLH
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3

ICAB - ITA Chapter 5 class 9-10 - Controls and Standards

  • 1. IT APPLICATIONS Professional Stage Application Level, ICAB Teacher: Mohammad Abdul Matin Chapter 5 Controls and Standards
  • 2. Chapter Outline  Information System Security Controls  Physical Security Controls  Logical Security Controls  Control and Standard for Information Integrity  Control and Standard for Information Access Control  Control and Standard for Computer Audit  Control and Standard for System Implementation Phase  Control and Standard for System Maint. and Evaluation  Risks of IT Systems  Controls for Personal Systems
  • 3. Syllabus  In the examination, candidates may be required to a. explain the controls and standards which are applied during the system implementation phases of installation, testing, training, documentation, file conversion and changeover, and post-implementation review b. explain the controls and standards which are applied to system maintenance and evaluation (system maintenance, evaluation, computer based monitoring, system performance) c. describe the controls that are applied to personal systems to ensure processing integrity, security and safeguarding of IT resources, and availability/continuity provisions (backup and recovery) for IT resources
  • 4. Systems’ Purpose & Components • Capital management • Foundation of doing business • Productivity • Strategic opportunity and advantage
  • 6. Control & Standards for System Implementation Phases System Installation System Testing Documentation Training Conversion & Change Over
  • 7. Control in ERP Implementation Training & Practice System Tests Develop To- Be Phase 2: Business Blueprint Go Live Phase 3: Realization Project Close Phase 1: Project Preparation Project Kickoff Understand As-Is Overview Training Phase 4: Final Preparation Configure System Training Materials User Support Phase 5: Go Live & Support March April May June W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 W15 W16 W15 W16 Cutover
  • 9. Implementation Readiness Business Readiness:  business PROCESSES are seen through and documented  competent PEOPLE are in right places  process CHAMPIONS are identified Technology Readiness:  robust IT INFRASTRUCTURE is in place  right HARDWARE is selected, ordered and delivered  right SOFTWARE is selected and licenses are ordered  competent SYSTEM INTEGRATOR is selected and engaged  An agreed PROJECT PLAN is finalized
  • 10. Planning (High Level) Broad Activities Sep Oct Nov Dec Jan Feb Apr Jun Jul BUSINESS READINESS TECHNOLOGY READINESS : - Infra. & ERP resources recruitment - Secured Data Center preparation - Project Office & Training Facility set up - Network Review & Redundancy set up - ERP solution finalization - Hardware sizing, ordering & delivery - System Integrator selection - Scope of Work finalization - Project Plan finalization PROJECT KICK OFF (Start) ERP IMPLEMENTATION (As per Project Plan) GO LIVE 1st August 2012 1st February 2012
  • 12. System Development Lifecycle System Implementation Prepare for System Implementation Deploy System System Initiation Requirement Analysis System Design System Construction System Acceptance System Preparation Transition to Performing Organization Transition
  • 13. Control & Standards for System Implementation Phases (cont.)  System Installation – Implementation plan, milestones, stakeholder engagement, communication, approval, issue handling and back out plan  System Testing – Scheduled, planned testing with defined criteria, scope, expectation, scenarios and records – User Acceptance Testing (UAT)  Documentation – System / Process Description – System Documentation – System File Layout / Architecture Documentation
  • 14. Control & Standards for System Implementation Phases (cont.)  Training – Administration / MDM training – User Training – TOT Approach  File Conversion and Change-over – New System Implementation • Data preparation, go-live – Manual System to Automation • Data preparation, parallel run, cut-over – Old System to New System • Data conversion & transfer, cut-over
  • 17. Risks to IT Systems  Computer Viruses – Protection and Updating – Checking and Cleaning – Awareness of Risks (Internet, removable disks) – Recovery from Losses  Computer Hackers (Intrusion) – Implement Firewall – Develop and Apply Policy – Antivirus, Antispyware and Intrusion Prevention Software – Address vulnerabilities – Conduct Tests
  • 18. Controls for Personal Systems  Sensitivity of information is much higher than any other systems in an organization – HRIS – Personal information – Salary information  Needs to be protected from both external and internal users  Sometimes needs separating HRIS and Payroll at Admin levels
  • 19. Controls for Personal Systems (cont.)  General Controls – Access, data, program, physical security – Software development and change control – Data center operation – Disaster recovery  Application Controls – Input controls – Authorization – Validation – Error notification and correction – Processing controls – Output controls
  • 20. Questions  How the security requirements can be implemented in developing a new accounting system?