Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Chapter-5+6

Computer Fraud
1. Threats of AIS
2. Computer fraud types
3. Fraud triangle
4. Cause to rise of computer fraud
5. Shot notes soft copy (abuse techniques)

Chapter-8

Control for information security


1. Trust service framework
2. User access control
3. Firewall. Border router, DMZ
4. CISO, CISRT, Cloud computing

Chapter-9

Confidentiality and Privacy Controls


1. Encryption. Hashing, Digital signature, VPN
2. Types of encryption

Chapter-10

Processing Integrity and Availability Controls


1. Data Entry control
2. Recovery backup types

Chapter-11

Auditing Computer-Based Information Systems


1. Definition
2. Types of audit
3. Planning the audit process
4. Collection of audit evidence
5. Evaluation of Audit Evidence
6. Communication of Audit Conclusion
7. Risk-Based Audit
8. Information Systems Audit
9. Audit Techniques Used to Test Programs
10. Computer Audit Software
Chapter-12

The Revenue Cycle: Sales to Cash Collections


1. The Revenue Cycle with data flow (describe the flow)
2. Revenue cycle threats and control
3. Cash collection (Lock box, EFT, Automatic cleaning house)

Chapter-20

Introduction to System Development & System Analysis


1. System development life cycle
2. Situation/condition to development new system in a company
3. Capital budgeting, NPV. IRR
4. Organizational behavior (fear, communication, Bitter experience)

Chapter-21

System Development Process


1. Types of software
2. Canned software
3. Turnkey system
4. Application service providers (ASP)
5. Request for proposal
6. System development process
7. Business process reengineering (BPR)
8. Business process management (BPM)
9. Principles of BPM.

You might also like