Professional Documents
Culture Documents
MJ 19
MJ 19
Page 1 of 2
helping rural people. The system is not strong enough to meet all the demands of its clients,
also the system is not secure enough. Therefore, rural people are loosing their interest of
getting help from “X Sheba Limited.”
Required:
(a) What type of framework regarding IT governance can be implemented in X Sheba 5
Limited to get rid of this problem? 5
(b) What are the tips for implementing IT governance using the COBIT 5 framework?
5. In information security authentication mechanisms today, one creates a double layer
gateway prior to unlocking any protected information.
Required:
(a) Explain, One Time Password (OTP) algorithm in authentication. 5
(b) What are the basic security guideline to Prevent Hacking? 5
6. Cyber-crime is becoming one of the fastest growing menace globally. Today, cyber
criminals are doing everything from stealing intellectual property and committing fraud to
unleashing viruses and committing acts of cyberterrorism.
Required:
(a) How does cyber-crime impact business and national security? 5
(b) Being an IS auditor how will you advise your clients to protect themselves against
cyber-crime? 5
7. The E-commerce is the demand of time, customers, business and nations. We spend our
daily time more on the internet for work, study, marketing, business, learning and
entertainment.
Required:
(a) What is E-commerce and why is the E-commerce different today? Elucidate in a
tabular format the eight unique features of E-commerce technology today based on
technology dimension and corresponding business significance. 4+6
(b) Describe the growth of E-commerce in the context of business transformation,
technology foundations and new emerging business models. 5
8. New and emerging technologies will enable companies to derive increased insight and
superior value from data. Data protection and privacy are recognized as fundamental rights.
When considering privacy, the first consideration comes where the data are stored and/or
from where they are derived that may include social media, cloud computing, mobile
devices, big data analytics/machine learning/AI, Internet of Things (IoT), personal devices,
drones, CCTV, or GPS devices. Consequences of data privacy breach may include financial
theft, involvement in malicious ad campaigns, and even stolen identities.
Required:
(a) What is auditing of data privacy? 2
(b) i. What considerations do you include in performing Pre-Audit Planning and 4
ii. determine audit procedures and steps for data gathering? 4
9. “X-group of companies” are spending large amounts of money on computer-based
information systems because it recognizes the tremendous benefits that information
systems can bring to its operations and services. However, they need to ensure that their
information systems are reliable, secure and not vulnerable.
Required:
(a) Define IT Audit and its objectives. 5
(b) How is IT Audit carried out? 5
-The end-
Page 2 of 2