Information Technology Management, Audit & Control
Information Technology Management, Audit & Control
Edited by
Qaseem Usman Rais
[email protected]
[email protected]
[email protected]
[email protected]
CONTENTS: PAGE NO.
2. CONTROLS
2.1. Environmental Exposure & Controls 14
2.2. Physical Access Exposure & Controls 15
2.3. Logical Access Exposure & Controls 16
2.4. Network Infrastructure Security 17
2.5. Application Controls 20
4. E – COMMERCE 24
5. SOFTWARE
5.1. Supply Chain Management 28
5.2. ERP 29
5.3. CRM 30
5.4. Sales Force Automation 32
6. IT CONTROLS FRAMEWORK
6.1. General Framework 32
6.2. COBIT® [ controls objective on IT] 33
6.3. SAC, COSO, SAS & SYSTRUCT 36
6.4. IFAC Guidelines 37
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 1 of 40
1 - INTRODUCTION TO I.T STRATEGY & MANAGEMENT
I.T. = C.T. + T.T.
I.T.: Nowadays it is called I.C.T.
C.T.: Hardware + software
T.T. : Sending signals to distant locations. It includes TV. Radio, cell phones.
NETWORK
Network is a connection of autonomous processes. Two or more processes are said to be autonomous if they can work independently
with each other as well as collectively.
Our mobile phones processes do not form a network because they are not intelligent enough to work independently. Similarly if
several I/O devices are attached with a super, mainframe or mini computer, it is not a network because I/O devices are not able to
work independently if they are disconnected.
However, if two or more micro computers are connected with each other and they are able to work independently as well as in a
sharing network, then it is a NETWORK.
NETWARE
(SOFTWARE NEEDED TO RUN THE NETWORK)
Client – Server
One computer is server and other computer is client. The biggest example might be internet in which we are the clients of an internet
ISP. Again IPSs are client of internationally recognized networking bodies. (Hyundai, AT & T, British Telecom)
Peer to Peer
No one is server, no one is client. Every machine is server and every machine is client.
FRICKING
Trying to access an unauthorized network e.g. trying to select telenore network with Mobilink SIM, (settings/ phone settings / network
selection / manual / / warid or telenore)
Now in NOKIA reminder can be set only up to the date upto which date can be set. But in sumsung,, there is still an inconsistency.
Another programming problem found in all mobile sets is that they do not stop users while he/she is setting a reminder to be rung on a
past date.
SAP & Oracle Financials are foreign ERPs while Sidat Hyder Financials is a local one.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 2 of 40
1.1 - Organizational Issues (Not Problems) /Important Points
1. CENTRALIZATION /DECENTRALIZATION
if both the storage and processing of data are being carried out at the same place on a single machine, then the system is said to be
Centralized. While under a Decentralized system, the storage and processing of data are carried out by several independent
computers. All Airlines are centralized but all food chains are decentralized. It should be according to business needs.
2. ROUTINE PROCESSING
Nowadays you no need to visit your customer or supplier for processing of orders, payments or collection. I.T. has saved you from
these day to day hassles and has made your routine processing very simple as well as speedy.
3. CONSTANT CHANGES
There are a lot of hardware changes, a lot of software changes, a lot of Netware changes nowadays, due to rapid advancement and
updating of technology even DSL internet has become an old story. Satellite internet is being used.
4. KNOWLEDGE MANAGEMENT
If knowledge is not managed properly, it becomes lost when you need it.
Two types of knowledge are:
• Explicit Knowledge (e.g. C.A.)
• Tacit Knowledge (generally people do not share it e.g. hard earned experience of my life/my articleship)
Now specialized software for knowledge management are available. IBM has “Content Management” for this purpose. SAP and
Oracle has “Knowledge Management”. Knowledge management softwares are different from DBM. They contain rules also
alongwith the data e.g. they contain rules for allowing data also alongwith the students’ data.
5. EMPLOYMENT ISSUES
Nowadays, we don’t need employees without computer literacy. Even a clerk should be computer literate. Every one wants high tech
employees.
6. CUSTOMER SERVICE
This concept has been newly introduced but has become too popular that has been adopted even by Government Organizations. Now
you can manage your data and make queries and complaints on phone or internet. No need to visit physically. E.g. at ACCA you can
create, maintain or alter your record through internet. However, ICAP you will have to visit ICAP office and submit an application
form manually to incorporate any change in your record.
8. ORGANIZATIONAL STRUCTURE
Organization today has become flatter because technology has removed the middle management. Every thing has become automated,
every person has become too productive. One computer operator is replacing 5 clerks.
9. TECHNOLOGICAL EFFECTS.
Today we have new products which did not exist earlier like internet, office equipment etc. Now, we have new methods of offering
products e.g. E-commerce. Its very easy, even for a small company, to business globally. Make a website and receive orders from
every where in the world.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 3 of 40
13. SECURITY
Now we have lot of security issues, now you are more vulnerable. Cyber Crime Law, 2006 have been introduced in Pakistan as well.
If you upload photograph of a person without his permission: an imprisonment of 6 months.
15.INTER OPERABILITY
It talks about seem less in integration. Your cell phones are open system but the problem is inter operability. When you send a
message from Nokia to any 5 other networks, it maintains it’s inter operability and you cant detect any formatting problem due to
change of network, but in case of MMS, the system loses its inter Operability and you can observe some distortion in MMS.
Windows is the most popular but a low profile software. It has a lot of security problems. It was developed in 1995 when there was no
internet.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 4 of 40
IT charged at cost
IT cost is allocated to each user department on the basis of services received by each.
Advantages
• Realistic
• Efficiency
• Good services to user department
• True performance picture
Disadvantages
• Finding a cost unit, whether per page, per data entry or per print.
• No good relations
• Inefficiency may be passed e.g. waste pages by IS department may be claimed as test pages.
IT charged at market
IS department will charge its services to other user department at market rates.
(This changing is actually on books not on reality)
Advantages
• Profit centre
• High standard services, because it is being provided at market rates
• Cost cutting
• Efficiency
Disadvantages
• Administrative hassles
• No comparable services
BUT NOW DAYS WE HAVE 1 MORE WAY OF CHARGING IT COST I.E.
20. OUTSOURCING
To give your work to anyone
• Cheaper
• Save time
• Contracting out services to some one outside the organization, this is called outsourcing.
E.g. accounting services
Reasons
a. Concentrate on core business
b. Flat Structure
c. Flexibility
d. Profits
Classification
1. Total outsourcing
2. Partial outsourcing
3. Adhoc outsourcing (as it needs arises)
4. Project management (every kind fixed, fixed jobs, fixed period.)
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 5 of 40
• Data entry services
• Programming services
• Networking services
3. Facility Management:
• Your own resources / facilities managed by other / someone else
• Audit department managed by audit firms
• PIA
• My bank
Organization involved
Development in outsourcing
1. Multiple sourcing
• I do not give my work to one vendor but more than one vendors
2. Incremental sourcing
• Do not give all jobs on day one but give little further, further
3. Joint ventures sourcing
• Bank develops accounting software and when sold to another software Co. and bank will share in.
4. ASP (Application Service Provider)
Advantages
• Fixed Price
• Economies of scale
• Long term contract
• Experienced work forced
• Skills are retained
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 6 of 40
• New skills availability
• Flexibility
Disadvantages
• Information in other hands
• Information / System unavailability
• Information leakage
• No Competitive advantage
• Vendor Failure is our failure
• Locked for long time
• No experience of Information Technology
• Cost may exceed expectation.
21. IN SOURCING (Transfer people from user department to information system department)
Advantages
• Multi skills
• Employees are retained
• Business people in information technology
• Create good relations between user and I..T. department
Disadvantages
• Inability to learn new skills
• Unwilling to switch
• Replacement of transfer employee
Advantages
• Low and no setup cost
• Pay as you go
• No specialization
• User has his own bandwidth
• Flexibility
Disadvantages
• Same as outsourcing
1. Customer access:
• Browser for websites
• Special browsers E.g. at Airport terminal we can use internet
2. Customer Issues:
• Training
• Queries
3. Secure Connection
4. Dedicated or shared application server (dedicated is recommended)
5. Problem resolution capacity
6. Level of Redundancy / backup
7. Disaster recovery
8. Date ownership
9. Data security
10. Transfer of date between In-house application and ASP
11. How to switch to another ASP.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 7 of 40
1.2 - Strategy Development
• General guidelines to achieve long term objectives
Strategic Planning
• Formulating
• Evaluating
• Selecting strategies
Class Missing
8. Programmers
9. Help desk / information centre:
• Helping users
• Providing technical support
• Problem resolution
• Suggestion for improvement
• Guidance on standards / security
• Support End User Computing (EUC)
10. Data Management
• Data architecture and managing as corporate resource
11. Database administrator (DBA)
• Creation
• Maintenance
• Safety
• Security
• Integrity of database.
12. Security administrator
• Implementing and maintaining physical and logical security as per policy
13. System administrator
• Contracting a network
• Setting up of accounts
• Installing system wise software.
14. Network manager / administrator
• Planning
• Implementing
• Maintaining the telecom network
15. Librarian
• Receiving
• Safeguarding all programs and data files maintained / stored on tapes
16. Control group
• Collecting
• Logging
• Submission of input of various user groups
17. Schedulers
• Responsible for backups at regular intervals
• Lights out operations (Automatic backup procedure by computer itself, robotic arms are used for changing tapes)
18. Data controller
• Checking the input, process and output.
19. Operators
• Input, process and output the data.
20. End user
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 8 of 40
• Execute operations related to business application services.
• Top Down (lower lever policies are derived from corporate policies)
• Bottom up (operation level policies guide the development of corporate policies)
Procedures
Procedures are derived from parent policies. These must be cleared, concise and in writing. Procedures are more dynamic than
policies.
1. Hiring
Control Risk
• No suitable person is available
• No reference checks done.
• Temporary / third party staff may lead to uncontrolled risk
• Lack of awareness of confidentiality requirements.
Controls
• Background check
• Confidentiality agreement.
• Employee bonding
• Conflict of interest agreements.
• Non compete agreement
• Employee handbook:
• Security policies and procedures
• Company expectation
• Employee benefits
• Vacation policies
• Overtime rules.
• Outside employment
• Performance evaluation
• Emergency procedures
• Disciplinary action for absence, non compliance of policies and breach of confidentiality.
2. Promotion policies
It should be based on performance, fairness and understood by every employee.
3. Training policies
It has to be on fair and on regular basis. This strengths the commitment of employees and make them customer focused. Training is
given in case of any updation / upgradation or any change in the job description. Cross training should be encouraged to have backup
persons.
7.Job rotation
8.Termination policies
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 9 of 40
There should be clearly defined steps of termination policy in writing. The policy should address both types of policies.
• Voluntary may be dangerous.
• Voluntary (dangerous).
Control Procedures
• Return all access keys.
• Delete log on IDs and Password.
• Notification to other staff about the terminated employee.
• Arrangement of final pay.
• Termination / exit Interview.
• Return all company property.
• Escort the person to main Gate.
b) Management of Change:-
¾ So frequent changes in IT department.
¾ New Technologies.
¾ New Application / Updation
¾ You need to be updated.
d) Security Management:-
¾ So many Security Threats.
¾ External threats
¾ Internal Threats.
Internal External
User Students/external auditor
IT department people
¾ Business Continuity and Disaster Recovery:
2. IS Assessment methods:
¾ You have to access.
¾ IS Department, IS People Performance to see deviation.
a) IS Budget:
¾ You must develop a Budget.
¾ Also Monitor Budget.
¾ To Calculate Variances.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 10 of 40
b) Capacity and Growth Planning:
¾ Your work is increasing all the time you have to increase your capacity i.e. done during strategic planning.
¾ Business development and IT development should match.
¾ Cost Saving.
¾ Customers remain happy.
¾ Check Capacity of Hardware, Software and Networking.
c) User Satisfaction:
¾ Meet their requirements.
¾ SLAs (Service Level Agreements) are being properly enforced.
IS department has SLA with marketing department etc.
¾ Periodic Audit of SLA.
¾ Interviews and Surveys.
f) Goal Accomplishment:-
¾ All goals are set by I.T. department.
¾ Comparing performance with goals:
• Effectiveness
• Efficiency
• Economy
3. Quality Management:
It helps to measure, control and improve processes to produce desire results.
It includes:
¾ Quality assurance (setting standards and procedures)
¾ Quality control (checking)
¾ Quality Management.
Areas to be focused
¾ General administration
¾ HR management
¾ Acquisition of hardware and software
¾ Software development, implementation and maintenance
¾ Day to day operation
¾ Security
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 11 of 40
c) Uses of performance measurement
¾ Measure product / services
¾ Manage product / services
¾ Assure accountability
¾ Make budget decision
¾ Optimize performance
2. Reconciliation
¾ Responsibility of user department
¾ Data control room
¾ Use of controls totals & balancing sheets by control group ( independent verification.
3. Custody of Assets
¾ Responsibility of user department
¾ If digital (I.T. department)
¾ data owner provide authorization leves for adequate security
¾ data administration group responsible for implementation & enforcing security system
4. Access to Data
¾ I.T. department grant access but permission come from user department
¾ Access should be given on need to know basis
¾ Controls over access to data by physical, system & application security.
¾ Control from internet
5. Authorization forms
¾ Give user information to I.T. department through forms from user department and it is kept by the I.T. department.
¾ Authorized specific system access via written requests of Management
¾ Access privileges should be periodically reviewed
7. Exception reporting
¾ User department are responsible (e.g. audit report)
¾ If there is technical exception then I.S. department is responsible
¾ Exception has been properly handled & Resolved in timely manner.
8. Transactional logs
¾ I.T. department is responsible for transaction log (record of transaction)
¾ Manual log e.g. record of transaction (grouped or batched) before they are submitted for process
¾ Automated log: by computer system.
9. Audit trail
¾ I.T. department is responsible
¾ Track for the purpose of inspection
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 12 of 40
¾ Use to detect fraud and error
¾ Component of will designed systems.
¾ Help IS department and auditor by flow of transaction
¾ Flow of transaction from initiation to end.
¾ IS auditor should be able to determine:
• Who initiated the transaction
• The time of day & date of entry
• The type of entry
• What fields of information it contained
• What file it updates
2. Organization
Responsibilities are defined by position
b) Security Committee
¾ Involve technical/user/executive management people, it sets guidelines, policies and procedures.
c) Data owners
¾ Determine data classification levels, maintain accuracy, completeness and integrity of management.
d) Process owners
¾ Ensure appropriate security as per policy
f) Users
¾ Read policies, follow procedures, keep log on IDs and password secretes and report violation.
g) I.T. Developers
h) I.S. Auditor
¾ To provide independent assurance.
3. Data classification
a. Data is classified by designation
b. Access is given on need to know basis.
c. It reduces the risk and cost of over protecting the information resources.
4. System access:
The ability (read, write) to do something with the computer resources
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 13 of 40
¾ Platform (hardware and operating system)
¾ Network
¾ Application system
¾ Databases
e) Physical Access
Control incoming and outgoing of people. Restrict physical access.
¾ Employee privacy: Name, address, NIC No., phone No. and all details should not be disclosed to anyone.
¾ Consumer privacy: business organization should not disclose their customer details to anyone (e.g banks know all
details about its customer)
i. Right of subject
ii. Laws and Regulations
iii. Transaction border data flow:
Data travel from country to country. You have multiple jurisdiction
Involve experts from operations, legal, technical and marketing side.
ii. Perpetrators
a) Hackers (They gain unauthorized access)
b) Employees (both authorized and unauthorized)
c) Former employees
d) I.S. personnel
e) End user
f) Interested /educated outsiders
Competitors
Foreigners
Organized criminals
Students
Crackers (paid hackers)
Freekers
g) Part time and temporary personnel
h) Vendors and consultants
i) Accidental ignorant
2 - CONTROLS
1. Environmental Exposure And Control
¾ Issues and Exposures
a) Power failure:
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 14 of 40
¾ Blackout
¾ Brown out (low voltage)
¾ Spites and surges (voltage 220 to 440 suddenly high voltage)
¾ Electro magnetic interference
b) Water
c) Fire
d) Air conditioning
e) Humidity
f) Dust
g) Food
b) Water
• Detectors
c) Fire
• Smoke/fire detectors, fire alarm, extinguishers, fire suppression system, halon gas, carbondioxide, fire proof
material, inspection by fire department.
d) Air Conditioning
• Backup Air condition
e) Dust
• Dust controlling
f) food
• No food permission in I.T. department
• Strategically locating computer room
• Documented and tested emergency evacuation plans.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 15 of 40
o) Computer workstation
a) Trojan horse
Unauthorized codes hidden in authorized code, e.g. pictures contain unauthorized data)
b) Rounding down
Round off the figures, e.g. actual figure is .039, you round it to 0.34, the difference amount is automatically transferred to
programmers bank account
c) Salami technique
In this technique you round the figure to zero, e.g. actual figure is 1234.39, round it to 1234.00
d) Viruses
Self replicating code; It slow down your machine (80,000 viruses definition )
e) Worm
Does not replicate (duplicate) itself and spread through network
f) Time bombs
Does not replicate itself, explore/activate at a certain time
g) Logic bombs
Does not replicate itself, explodes/activate at a certain event
h) Trap doors
When a programmer makes a program, he keeps the trap doors, now he can modify, change the programs; e.g. cheat codes in
games
l) Computer shutdown
Remote computer shutdown though a software
Function:
a) User identification (log on IDs) and authentication (password)
b) Apply restrictions
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 16 of 40
c) Create or change user profiles/setting
d) Create accountability (record each and every thing)and auditability(audit of record)
e) Log events
f) Log user activities
g) Report capabilities e.g. message in window XP don’t send
c) System Exists
This should not be available to user; complex maintenance task/tailoring:
there are thing which cannot be recorded by system e.g. in cell phone removing battery or sim system cannot record it.
VI. Viruses
Antivirus:-
a) Scanner
do scanning for signatures, every virus has its own signature/definition.
b) Immunize
it will clean, detect and protect your system from the viruses
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 17 of 40
d) Terminal identification file (when you log on/off)
e) Encrypted transmission. Data has to be encoded
a) Brute force attack (try out all possible combinations of passwords; deadly attack)
b) Impersonation /spoofing /masquerading
c) Packet replay (you copy the packet and replay it and join it with your packets and gain access to the system)
d) Email bombing
e) DOS - DDOS (Denial of service - Distributed DOS)
DOS: e.g. one student ask all question; Huge email
DDOS: e.g. distribute questions among the students
• Engaging the server (Huge email; server busy)
• Bouncing back all request (request does not reach to server)
• Blocking a specific user (block one specific user)
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 18 of 40
Two types of cryptography (knowledge of encryption) system
a) Private Key cryptography system (same key is used for coding and decoding)
Problem:
We need to be aware of the key. Two parties needed to share same keys. Problem arises when you communicate outside the
organization.
b) Public Key cryptography system (different key is used for coding and decoding)
Encryption Decryption
Public Private
Private Public
There are some CAs (Certified Authorities) who give you the private and public keys of the organizations. For example:
¾ CERTO
¾ Veri-sign
¾ Degi-sign
¾ NIFT
Objectives
¾ Security / Confidentiality
¾ Authentication (confirmation who send) & Non-repetition
Objectives
a) Security / Confidentiality
¾ Encrypt: Public Key
¾ Decrypt: Private Key
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 19 of 40
Types of IDS
a) Misuse detection system
¾ The IDS analysis the information it gathers and compares it to large databases of attacks signature.
e) Passive system
¾ Detects a potential security breach, logs the information and signals and alert.
f) Reactive system
¾ Responds to the suspicious activities by logging off a user or re-programming the firewall.
5. Application Controls
1. Input Control
2. Processing Control
3. Output Control
4. Storage Control
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 20 of 40
f) Error correction procedures
¾ Logging of errors
¾ Timely correction
¾ Validity of correction
¾ Approval of correction
¾ Upstream resubmission
¾ Suspense file
¾ Error file.
a) Sequence Checking
b) Limit Check ( e.g. upper and lower limit)
c) Range check
d) Reasonableness check
e) Table lookup
f) Completeness check
g) Duplicate check
h) Logical relationship check ( e.g. Mr. Mrs. Miss)
i) Validity check
j) Check digit
a) Editing
b) Manual recalculation
c) Run to run totals (running balance)
d) Program controls
e) Reasonableness verification of calculated amounts
f) Limit checks on calculated amount
g) Reconciliation of file totals
h) Exception reports
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 21 of 40
3. BUSINESS CONTINUITY PLANNING (B.C.P.)
or DISASTER RECOVERY PLANNING (D.R.P.)
Phases of Business Continuity Planning:
1. Business impact analysis (BIA)
2. Developing business recovery strategies
3. Develop detailed plan
4. Implement plan
5. Test an implemented plan
a) What are critical information resources related to organization’s critical business processes? (is it your server, hardware or
software)
b) What is the critical recovery time /period for information resources?
c) What is the system risk ranking (some are very risky or low risky)
Four ranking
i. Critical system
¾ Need to be replaced by identical capabilities
c) Hot sites
¾ Fully configured and ready to operate within several hours. Installed with low power processor to take care of critical
applications. Additional needs are staff, programs, data files and documentation.
d) Worm sites
¾ Partially configured usually with network connections and selected peripheral equipments such taps and disk drives.
e) Cold sites
¾ Equipped with basic facilities only like electrical wiring, air conditioning and flooring.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 22 of 40
3. Developing a detailed plan
Following factors must be considered.
b) Damage assessment team (assesses damage and estimates time for recovery)
e) Transportation team ( locates a recovery site if not determine and coordinates the transportation of employees to disaster
recovery sites)
f) Network recovery team (re-routes wide area voice and data communication traffic)
g) Communication team (establishes a user/system network solicits and installs communication hardware)
h) User hardware team (coordinates the delivery and installation of user terminals, printers, typewriters, photocopies and other
equipment)
i) Software team ( restores system packs loads and tests operating system)
j) Application team (restores user packs and application programs on the backup system)
l) Off site storage team (obtains packages and shifts media and records to the recovery facilities )
n) Administrative support team (serves as a message centre for the user recovery site.)
q) Relocation team (Coordinates the process of moving from the backup site to a new location or to the restored original
location )
4. Implement Plan
Implement as per details mentioned above.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 23 of 40
¾ Real action of the business continuity test. Actual operational activities are executed to test the specific objectives of
the business continuity test.
c) Post test
¾ Clean up of group activities
Result analysis
a) Time (elapse time for completion of prescribed test.)
b) Amount of work performed at backup site
c) Count no. of vital record successfully carried to the backup sites and no. of critical systems successfully recovered.
d) Accuracy of data entry at the recovery site.
4 - E-COMMERCE
1. E-Commerce (Outlay buying and selling)
2. E-Business (Much broader and includes every business activity)
(iv) Define the role of live interaction. Some products are bought through live interaction: e.g perfumes, cars, cloths etc.
(vii) Create incentives and disincentives (eg. Online shopping , cash transaction)
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 24 of 40
E- Commerce Models
1. B2B (Business to Business)
a) Co. Alliance
¾ To equal people- one buyer one seller
b) Value Alliance
¾ Many people / Many Business
c) Market Alliance
¾ One market, all people / business linked-up
d) Star Alliance
¾ One dominating and other linked up
e) E- Market Place
e.g Sunday Bazar
3. B2 E (Business to Employees)
4. B2 G ( Business to Govt)
5. C2 G ( Citizen to Government)
6. G2 C ( Government to Citizen)
7. X2 X ( Exchange to Exchange)
b) SITE Effectiveness
d) Response Quality
e) Download Quality
f) Navigability
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 25 of 40
g) Fulfillment
h) Up-to-Date
i) Availability
j) Opportunity
iv. Distribution
v. Big Market
viii. E- Marketing
i. No / Fewer Intermediaries
v. New intermediaries
c) Online banking
e) E- Cheque
f) E- Wallets
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 26 of 40
SECURITY SOLUTION
2. Secure http
6. Digital Transaction
3. No / Few Intermediaries
5. Personalize Marketing
6. Connectivity
8. Communication Cost
DISADVANTAGES
1. Lack of Trust
2. Confidentiality
3. Integrity
4. Connectivity / Availabilities
5. Profit
7. Power to Customer
8. Taxation
9. Legal Jurisdiction
5 - SOFTWARE
Enterprise Software
1. Supply chain management
2. ERP (Enterprise Resource Planning)
3. Customer Relationship Management (CRM)
4. Sales Force Automation
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 27 of 40
5.1 - Supply Chain Management:
It includes links from producers to re-seller/distributors, dealers, wholesalers, stockers, retailers and customers. It means streamlining
the bus, process transaction, functions and resources. All the facilities and departments should be networked. SCM is beneficial for the
organization with vertical integration (procedures – suppliers – customers)
Phases of SCM
1. Departmentalized Organization
¾ Departments work in isolation, no good relations with trading partners
2. Integrated Organization
¾ Departments are processes are streamlined.
4. Extended Enterprise
¾ Vertical enterprise, transparent data flow.
i. Order entry
c) Tactical timeframe (e.g. Lead time, supplier contract term, from month to weeks)
d) Strategic timeframe (new plant, new product, new centre, from years to months)
a) Manual management
e) Transportation planning
a) Availability premises
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 28 of 40
b) Warehousing
c) Transportation management
¾ Documentation
¾ Cost calculation
¾ International laws
c) SC process management
Features
a) Forecasting
f) defined by system
h) Documentation
Suppliers of SCM
1. SAP
2. Oracle
3. Bann
4. MFG Pro
5. JD Edward
ERP is single integrated software that runs on single database. It integrates the information used by all level of management/
departments.
Reasons:
(i) Technical solution
(ii) Strategic solution (to support future strategies and having a single comprehensive view in a large organization)
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 29 of 40
Latest Trends in ERP
1. S.M.E. / S.M.B. (Small and Medium Enterprises)
2. Modular approach
Software in Module
¾ Financials
¾ Operations
¾ Costing
¾ Etc
3. Industry solution
4. Supply chain management
5. E-business, E-commerce
6. Outsourcing
7. Non-monolithic (from one suppler)
Financial – Oracle
HR – SAP
Advantages of ERP
1. Standardized and fastest working.
2. Better information flow.
3. Integration.
4. Cheap development.
5. Safe cost estimation.
6. Know how
7. Flexibility.
Disadvantages of ERP
1. Consultant limited knowledge
2. External involvement
3. Changes in working style.
Components of CRM
1. Marketing automation.
2. Profiling (complete customer profile)
3. Personalization (just as per customers)
1. Sales Automation
(i) Sales campaign management
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 30 of 40
(ii) Call management
(iii) Contract management
(iv) Advertisement management
(v) Sales force automation
(vi) Accounts management
(vii) Pricing
4. E-Commerce
a) Data warehousing
Collection of database eg. NADRA)
b) Analytical application
• Produced statistics – projections.
• Pattern recognition.
• Rcognise customer behaviour.
c) Reporting
Produced report.
Features to look at
• Functionality as per business.
• Single and consistent customer views.
• Integrated accessor touch point.
• BE customer contact.
• Technical change involve.
• Incremental.
• Careful selection software.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 31 of 40
• Supplier claims.
Impact of CRM
1. Increased revenues
2. Increased market share
3. Increased complexity.
4. Multiple channel.
5. Multiple technology.
6. Change in beliefs.
A: Stages of SFA
1. Transaction Centric
Basic level, test about customer and prospect and managed sales in pipeline.
2. Sales connectivity
Connect SFA with marketing customer service installation and service process.
3. Knowledge and empowerment
Selling and selling channel related knowledge.
B: Data Mapping
It deals with data flow from the prospective customer to the right person in the organization. The details are deleted to lead and the
progress of the deal till the time sales are realized.
i) Mobile phones.
j) Laptop and hand held devices.
k) Contact management system PDA
D: Results of SFA
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 32 of 40
3. effective control of system design
4. IT asset safeguarding.
5. Compliance with applicable rules & regulations.
6. System reliability
7. Data integrity
a) System quality
• Response time (How quality system report)
• Turned around time (I/O time)
• Ease log information
• Quality of documentation
• Ability to integrated with other application
b) Information quality
c) Task Completion
• Decision accuracy
• Decision confidence
• Decision effectiveness
• Time taking in decision making
• Check satisfaction.
4. IT Asset safeguarding
* Suitable equipment and acceptable life span
* Protection against all threats.
5. Compliance
Quality
Changed process
Security process
Education of uses
Control of completeness, accuracy, timeliness, consistency, compatibility, authorization.
6.2 - COBIT
(Benchmarking nowadays as security and control process )
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 33 of 40
3. Auditors (To substantiate opinion)
CONTROL
Organization structure design to perform reasonable assurance that business objective will be achieved and undesired events will
be prevented, detected and corrected.
IT control objective
Statement of the desire result or purposes to be achieved by implementation control procedure in a particular IT activity.
IT Governance
Structure of relationship and process to direct and control the enterprise in order achieve the enterprise goals by adding value by
balance risk v/s return over IT and its purpose
• Effectiveness.
• Efficiency
• Confidentiality
• Integrity
• Compliance
• Reliability and information
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 34 of 40
• Assess Risk
• Manage project.
• Manage quality.
7. Monitor
It includes management oversight of two organization.
• Monitor the process.
• Assess internal control adequacy.
• Obtain independent assurance.
• Provide for independent audit.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 35 of 40
II Key performance Indication (KPI)
Maturity Model is method for evaluating and measuring of the maturity of IT governance.
5. Optimize
• Advance and forward looking IT governance.
• Training and communications.
• Best practice.
• Root cause analysis and action.
• Extensive, integrated and optimized automation.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 36 of 40
• Enterprise governance and IT governance strategic linked up.
Authoritative guide for service organization to disclose their control activities and processes to their customer and customer
auditor. The user auditor should follow the guidelines of AICPA.
Sys Trust was developed by IACPA & CICA, to ensure system reliability. It has four principles:
1. Availability.
2. Security.
3. Integrity.
4. Maintenance.
Web trust provide assurance for uses on website. It examine control and security issues including:
a) Privacy.
b) Security.
c) Business practices.
d) Transaction integrity.
e) Availability.
f) Confidentiality.
g) Non repetition.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 37 of 40
Core Principles
1. Accountability.
2. Awareness.
3. Multi disciplinary.
4. Cost effective.
5. Integration.
6. IT monitoring.
7. Timeliness.
8. Social factor.
Procedure
1. Policy development.
2. Roles & responsibility.
3. Design of standard, practices and procedures.
4. Implementation.
5. Monitoring.
6. Awareness and training.
Core Principles
1. Alignment.
2. Relevant scope.
3. Relevant time frame.
4. Benefit realization.
5. Achievability.
6. Performance measurement.
7. Reassessment.
8. Awareness.
9. Accountability.
10. Commitment.
Procedures
1. Orientation
• Set scope.
• Establish methodology
3. Strategic Plan
• Develop vision.
• Desired future plan of IT
• Option available (application, technology investment, communication, business process engineering)
4. Tactical Plan
• Divide strategy into series of projects.
• Set priorities based on resources.
• Recommend monitoring and control process.
5. Acquisition of IT
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 38 of 40
5. Progressive buy in with user involvement.
6. Valid business case.
Core principles
1. Alignment
2. Relevant requirements.
3. Obsolescence.
4. Accountability (of buyer)
5. Option analysis.
6. Evaluation.
7. Transparency.
Procedures:
It has two phases:
Phase 1: Initiate acquisition process
1. Start up and orientation.
2. Prescribing requirement (in details)
3. Evaluation criteria.
4. Contractual conditions.
5. RFP (request for proposal)
4. Implementation of IT solution
Core principles (7)
1. Align scope.
2. Project management and commitment.
3. Managing changes, awareness and communication.
4. Selection of relevant implementation method.
5. Implementation phasing (overall phases)
6. Integration.
7. Risk management and monitoring.
Procedures (5 steps)
6. IT SERVICES
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 39 of 40
5. Disciplined approach.
6. Flexibility.
7. Meeting performance execratory.
8. Protected environment. (physical and logical security)
9. Relevance.
10. Reliability.
6. IT Monitoring
1. Comprehensiveness.
2. Relevance.
3. Acceptability.
4. Reliability.
5. Action oriented.
6. Flexibility / Adaptability.
Procedure
1. Set measurable goals.
2. Verify performance.
From the desk of M. Ovais Information Technology – Management, Audit & Control Page 40 of 40