Swapnil Patni PDF
Swapnil Patni PDF
Swapnil Patni PDF
Components in COBIT
i) Framework
Organize IT governance objectives and good practices by IT domains and processes, and links them
to business requirements
ii) Process Descriptions
A reference process model and common language for everyone in an organization. The processes
map to responsibility areas of plan, build, run and monitor.
iii) Control Objectives
Provide a complete set of high-level requirements to be considered by management for effective
control of each IT process.
iv) Management Guidelines
Help assign responsibility, agree on objectives, measure performance, and illustrate interrelationship
with other processes
v) Maturity Models
Assess maturity and capability per process and helps to address gaps.
Benefits of COBIT 5
A. Introduction
The world is moving swiftly in the direction of a knowledge-based system as enter-prises adapt more
and more cost- cuing measure.
There is a paradigm shift from an economy principally concerned by the management of tangible
resources (equipment, machinery, buildings, ....) to an economy in which renovation and growth are
determined by intangible resources and investments (knowledge, technology, competencies,
abilities to innovate....).
Information and Knowledge are the key elements of this economy.
A firm’s competitive gain depends on its knowledge processing i.e. what it knows; how it uses & how
fast it can know something new.
It’s much more influential than the harmony of land, labour & capital (i.e. three most important
production factors).
Even though there is not a lucid and exclusive deiniion of the so-called knowledge-based or
knowledge-driven economy, it seems to be unstated as the ‘upshot of a set of structural changes’.
Knowledge Management (KM) is the process of capturing, developing, sharing, and effectively using
organizational knowledge.
It refers to a multi-disciplined approach to achieving organizational objectives by making the best
use of knowledge.
Knowledge Management Systems (KMS) refers to any kind of IT system that stores and retrieves
knowledge, improves collaboration, locates knowledge sources, mines repositories for hidden
knowledge, captures and uses knowledge, or in some other way enhances the KM process.
KMS treats the knowledge component of any organization’s activities as an explicit concern reflected
in strategy, policy, and practice at all levels of the organization.
Types Of Knowledge
There are two broad types of knowledge - Explicit and Tacit KMS makes a direct connection
between an organization’s intellectual assets— both Explicit [recorded] and Tacit [personal know-
how] — and positive results.
1) Explicit knowledge:
Explicit knowledge is that which can be formalized easily and as a consequence is easily available
across the organization.
Explicit knowledge is articulated, and represented as spoken words, written material and compiled
data.
This type of knowledge is codified, easy to document, transfer and reproduce.
2) Tacit knowledge:
Tacit knowledge, on the other hand, resides in a few often-in just one person and hasn’t been
captured by the organization or made available to others.
Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that
individuals form based on their experiences.
It is personal, experimental and context-specific.
Introduction
Core Banking is a banking services provided by a group of networked bank branch- es where
customers may access their bank account and perform basic transactions from any of the member
branch oices.
Normal core banking functions will include transaction accounts, loans, mortgages and payments.
Banks make these services available across multiple channels like ATMs, Internet banking, and
branches.
Most commonly, Core Banking System (CBS) may be denied as a back-end system that processes
daily banking transactions, and posts updates to accounts and other financial records.
These systems typically include deposit, loan and credit- processing capabilities, with interfaces to
general ledger systems and reporting tools.
Core banking functions differ depending on the specific type of bank.
2. User Responsibilities
i. Password use
Mandatory use of strong passwords to maintain confidentiality.
ii. Unattended user equipment
Users should ensure that none of the equipment under their responsibility is ever left
unprotected. They should also secure their PCs with a password, and should not leave it
accessible to others.
6. Mobile Computing
In today's organizations, computing facility is not restricted to a particular data centre alone. Ease
of access on the move provides efficiency and results in additional responsibility on the
management to maintain information security.
i. Mobile computing
Theft of data carried on the disk drives of portable computers is a high risk factor. Both physical
and logical access to these systems is critical. Information is to be encrypted and access
identifications like fingerprint, eye-iris, and smart cards are necessary security features.
a) Managerial Controls:
In this part, we shall examine controls over the managerial controls that must be performed
to ensure the development, implementation, operation and maintenance of information
systems in a planned and controlled manner in an organization. The controls at this level
provide a stable infrastructure in which information systems can be built, operated, and
maintained on a day-to- day basis.
b) Application Controls:
These include the programmatic routines within the application program code. The objective
of application controls is to ensure that data remains complete, accurate and valid during its
input, update and storage.
In this part, we shall examine controls over the managerial functions that must be performed to
ensure the development, implementation, operation and maintenance of information systems in a
planned and controlled manner in an organization.
The controls at this level provide a stable infrastructure in which information systems can be built,
operated, and maintained on a day-to-day basis.
i. Planning-
Determining the goals of the information systems function and the means of achieving these
goals
ii. Organizing-
Gathering, allocating, and coordinating the resources needed to accomplish the goals
iii. Leading-
Motivating, guiding, and communicating with personnel; and
iv. Controlling-
1) Comparing actual performance with planned performance as a basis for taking any corrective
actions that are needed.
2) Top management must prepare two types of information systems plans for the information
systems function: a Strategic plan and an Operational plan.
3) The strategic Plan is the long-run plan covering, say, the next three to five years of operations
whereas the Operational Plan is the short-plan covering, say, next one to three years of
operations. Both the plans need to be reviewed regularly and updated as the need arises.
4) The planning depends upon factors such as the importance of existing systems, the importance of
proposed information systems, and the extent to which IT has been integrated into daily
operations.
2) Systems Development Management Controls
Systems Development Management has responsibility for the functions concerned with analyzing,
designing, building, implementing, and maintaining information systems.
Three different types of audits may be conducted during system development process.
i. Concurrent Audit
Auditors are members of the system development team. They assist the team in improving the
quality of systems development for the specific system they are building and implementing.
Auditors evaluate systems development controls overall. They seek to determine whether they can
reduce the extent of substantive testing needed to form an audit opinion about management’s
assertions relating to the financial statements ir systems effectiveness and efficiency.
The program development life cycle comprises six major phases – Planning; Design; Control; Coding;
Testing; and Operation and Maintenance with Control phase running in parallel for all other phases.
The purpose of the control phase during software development or acquisition is to monitor progress
against plan and to ensure software released for production use is authentic, accurate, and
complete.
i. Planning
Techniques like Work Breakdown Structures (WBS), Gantt charts and PERT (Program
Evaluation and Review Technique) Charts can be used to monitor progress against plan.
ii. Design
A systematic approach to program design, such as any of the structured design approaches
or object-oriented design is adopted.
iii. Coding
Programmers must choose a module implementation and integration strategy (like Top-
down, bottom-up and Threads approach), a coding strategy (that follows the precepts of
structured Programming), and a documentation strategy (to ensure program code is easily
readable and understandable).
iv. Testing
Three types of testing can be undertaken:
• Unit Testing – which focuses on individual program modules;
• Integration Testing – Which focuses in groups of program modules; and
• Whole-of-Program Testing – which focuses on whole program. These tests are to ensure
that a developed or acquired program achieves its specified requirements.
i. Fire
Well-designed, reliable fire-protection systems must be implemented.
ii. Water
Facilities must be designed and sited to mitigate losses from water damage.
iii. Energy Variations
Voltage regulators, circuit breakers, and uninterruptible power supplies can be used.
iv. Structural Damage
Facilities must be designed to withstand structural damage.
v. Pollution
Regular cleaning of facilities and equipment should occur.
vi. Unauthorized Intrusion
Physical access controls can be used.
vii. Viruses and Worms
Controls to prevent use of virus-infected programs and to close security loopholes that allow
worms to propagate.
viii. Misuse of software and data services
Code of conduct to govern the actions of information systems employees.
ix. Hackers
Strong, logical access controls to mitigate losses from the activities of hackers.
Processing Controls
The processing subsystem is responsible for computing, sorting, classifying, and summarizing data.
Its major components are the Central Processor in which programs are executed, the real or virtual
memory in which program instructions and data are stored, the operating system that manages
system resources, and the application programs that execute instructions to achieve specific user
requirements.
i. Processor Controls:
The processor has three components:
a) A Control unit, which fetches programs from memory and determines their type;
b) an Arithmetic and Logical Unit, which performs operations; and
c) Registers that are used to store temporary results and control information.
Introduction
Information security is not just about anti-virus software, implementing the latest firewall or locking
down the laptops or web servers.
The overall approach to information security should be strategic as well as operational, and different
security initiatives should be prioritized, integrated and cross-referenced to ensure overall
effectiveness.
ISO/IEC 27001 (International Organization for Standardization (ISO) and the International Electro-
technical Commission (IEC)) defines how to organize information security in any kind of organization,
profit or non-profit, private or state-owned, small or large.
It is safe to say that this standard is the foundation of Information Security Management.
ISO 27001 is for information security; the same thing that ISO 9001 is for quality – it is a standard
written by the world’s best experts in the field of information security and aims to provide a
methodology for the implementation of information security in an organization.
It also enables an organization to get certified, which means that an independent certification body
has confirmed that information security has been implemented in the best possible way in the
organization.
ISO/IEC 27001 formally specifies an Information Security Management System (ISMS), a suite of
activities concerning the management of information security risks.
The ISMS is an overarching management framework through which the organization identifies,
analyzes and addresses its information security risks.
It is a systematic approach to managing confidential or sensitive information so that it remains
secure (which means Available, Confidential and with its Integrity intact).
The ISMS ensures that the security arrangements are fine-tuned to keep pace with changes to the
security threats, vulnerabilities and business impacts.
It encompasses people, processes and IT systems.
An Information Security Management System helps us to coordinate all our security efforts – both
electronic and physical – coherently, consistently and cost-effectively.
Given the importance of ISO 27001, many legislatures have taken this standard as a basis for
drawing up different regulations in the field of personal data protection, protection of confidential
information, protection of information systems, management of operational risks in financial
institutions, etc.
Systematically examines the organization’s information security risks, taking account of the threats,
vulnerabilities, and impacts;
designs and implements a coherent and comprehensive suite of information security controls and/or
other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are
deemed unacceptable; and adopts an overarching management process to ensure that the
B. History
ISO/IEC 27001 is derived from The British Standard BS 7799 Part 2, published in 1999.
BS 7799 Part 2 was revised by BSI in 2002, explicitly incorporating Deming’s PDCA process concept,
and was adopted by ISO/IEC as ISO/IEC 27001 in 2005.
It was extensively revised in 2013, bringing it into line with the other ISO certified management
systems standards and dropping the PDCA concept.
C. ISO/IEC 27001:
2005, part of the growing ISO/IEC 27000 family of standards, was an Information Security
Management System (ISMS) standard published in October 2005 by ISO/IEC.
Its full name is ISO/IEC 27001:2005 –
Information technology – Security techniques – Information Security Management Systems –
Requirements. It was superseded, in 2013, by ISO/IEC 27001:2013.
D. The Plan-Do-Check-Act (PDCA) cycle
ISO 27001 prescribes ‘How to manage information security through a system of information security
management’.
Such a management system consists of four phases that should be continuously implemented in
order to minimize risks to the Confidentiality, Integrity and Availability (CIA) of information.
The PDCA cyclic process is shown in the and is explained :
a. The Plan Phase (Establishing the ISMS) –
This phase serves to plan the basic organization of information security, set objectives for
information security and choose the appropriate security controls (the standard contains a catalogue
of 133 possible controls).
b. The Do Phase (Implementing and Working of ISMS)
This phase includes carrying out everything that was planned during the previous phase.
c. The Check Phase (Monitoring and Review of the ISMS) –
The purpose of this phase is to monitor the functioning of the ISMS through various “channels”, and
check whether the results meet the set objectives.
d. The Act Phase (Update and Improvement of the ISMS) –
The purpose of this phase is to improve everything that was identified as non- compliant in the
previous phase. The cycle of these four phases never ends, and all the activities must be
implemented cyclically in order to keep the ISMS effective. ISO/IEC 27001:2005 applies this to all the
processes in ISMS.
E. ISO/IEC 27001:
Introduction
2013 is the first revision of ISO/IEC 27001 that specifies the requirements for establishing,
implementing, maintaining and continually improving an Information Security Management System
within the context of the organization.
It is an information security standard that was published on 25th September 2013.
It also includes requirements for the assessment and treatment of information security risks tailored
to the needs of the organization
The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all
organizations, regardless of type, size or nature. ISO 27001:2013 does not put so much emphasis on
this cycle.
Functions
i. Service Desk:
The service desk is one of four ITIL functions and is primarily associated with the Service Operation
lifecycle stage. Tasks include handling incidents and requests, and providing an interface for other
ITSM processes. Features include Single Point of Contact (SPOC); Single Point of Entry and Exit; easier
for customers and streamlined communication channel.
ii. Application management:
ITIL application management encompasses a set of best practices proposed to improve the overall
quality of IT software development and support through the life-cycle of software development
projects, with particular attention to gathering and defining requirements that meet business
objectives.
iii. IT Operations:
IT Operations primarily work from documented processes and procedures and should be concerned
with a number of specific sub-processes, such as: output management, job scheduling, backup and
restore, network monitoring/ management, system monitoring/ management, database monitoring/
management storage monitoring/management.
v. Incident Management:
Incident management aims to restore normal service operation as quickly as possible and minimize
the adverse effect on business operations, thus ensuring that the best possible levels of service
quality and availability are maintained.