Professional Documents
Culture Documents
EIS Bull's Eye Mat
EIS Bull's Eye Mat
Supporting Processes
CATEGORIES OF Supporting Processes back core processes and functions within
BUSINESS PROCESSES an organization. Human Resource Management The main HR
CATEGORIES OF Process areas are grouped into logical functional
BUSINESS PROCESSES areas that include Recruitment and Staffing;
Management Processes
Manageme nt Processes measure, monitor and control the
activities related to business procedures and systems.
1
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
BUSINESS PROCESS
AUTOMATION (BPA)
2
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
3
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
RISK MANAGEMENT
ENTERPRISE RISK MANAGEMENT (ERM)
Align risk Link growth, risk Enhance risk
Enterprise Risk Management (ERM) may be defined as a appetite and return response
process affected by an entity’s Board of Directors, and strategy decisions
management and other personnel, applied in strategy Minimize Identify and Provide integrated
setting and across the enterprise. operational manage responses to
surprises and cross-enterprise multiple risks
losses risks
Seize Rationalize
opportunities capital
ERM Framework Components
Internal Environment Objective Event
Setting Identification
Risk Assessment Risk Control
Response Activities
Information and Monitoring
Communication
4
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
CONTROLS
Control is defined as policies, procedures, practices and organization structure that are designed to provide reasonable
assurance that business objectives are achieved and undesired events are prevented or detected and corrected.
(i) They enable enterprise (a)InformationTechnologyGeneralControls(ITGC) • abilityto executeandplannew internal control policies and procedures. • Management’s consideration
to achieve objectives; • Information SecurityPolicy work suchasITinfrastructure SA315 defines the system of Internal that thecostof aninternal
• Administration, Access,andAuthentication Control as “the process designed, control doesnot exceed
(ii) They help in • Developmentprojects that are
mitigating risks. • Separationof keyITfunctions implemented and maintained by those theexpectedbenefitsto be
• Management of SystemsAcquisition and deliveredontimeandwithin
charged with governance, management derived.
budget
Implementation and other personnel to provide reasonable • mostinternal controls do
• ChangeManagement • Ability to allocateresources assurance about the achievement of an not tendto bedirectedat
• Backup,Recovery andBusinessContinuity predictably. entity’s objectives regarding reliability transactionsof unusual nature,
• ProperDevelopmentandImplementation of of financial reporting, effectiveness and thereasonablepotential for
ApplicationSoftware • Clear communicationto
efficiency of operations, safeguarding of human error.
• Confidentiality,Integrity andAvailability of Software management of keyindicatorsof
assets, and compliance with applicable • Thepossibilityof
anddatafiles effectivecontrols
laws andregulations”. circumventionof internal
• Incidentresponseandmanagement • Theability to protect againstnew controls through collusion
Subpostofcomponentsof IT controlas
• Monitoring of ApplicationsandsupportingServers vulnerabilitiesandthreats
perSA315 with employeesor with
• ValueAddedareasof ServiceLevelAgreements
• Theefficient useof acustomer partiesoutsidetheentity.
(SLA) I. Control Environment
• UsertrainingandqualificationofOperations support centeror helpdesk. • apersonresponsiblefor
II. RiskAssessment exercisinganinternalcontrol
personnel • Heightened security awareness on
III. Control Activities could abusethat responsibility
(b)Application Controls the part of the users and a security
• Manipulationsby
ApplicationControls arecontrols whichare consciousculture. IV. Information andCommunication
management with respect
implementedin anapplicationto prevent or detect and V. Monitoringof Controls to transactionsor estimates
correct errors.
andjudgmentsrequiredin
thepreparationof financial
statements.
5
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
RISKS AND CONTROLS FOR SPECIFIC BUSINESS PROCESSES Inventory Cycle – Risks and Controls
The Inventory Cycle is a process of accurately tracking the on-hand
Business Processes -Risks and Controls inventory levels for an enterprise.
The typical phases of the Inventory Cycle for Manufacturers are as follows:
The The The finished goods
Based on Control Levels of Control Ordering Production and delivery
phase phase phase
Preventive Detective Configuration Masters
Corrective Transaction MastersInventory Page35 Transactions-Inventory Page35
Stagesof HR Cycle
Order to Cash (O2C) – Risks and Controls
• Recruiting and On-boarding • Orientation and Career Planning
Order to Cash (OTC or O2C) is a set of business processes that involve • Career Development • Termination or Transition
receiving and fulfilling customer requests for goods or services.
6
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
7
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
Flowcharting Symbols
The two most common types of boxes in a flowchart are as follows:
• A processing step, usually called activity and denoted as a rectangular box. • A decision usually denoted as a diamond.
Link between
Documentation Efficient coding Program Debugging conditions and actions Standardization
8
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
Process Data flow External Agent Data Store Real time link
9
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
REGULATORY
Information
AND
Technologyn Act,
COMPLIANCE
2000 (IT Act)
REQUIREMENTS The
Companies
Act, 2013
10
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
Advantages of Cyber Laws Privacy of Online Date Sensitive Personal Data Information (SPDI)
11
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
1
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
CONCEPTS IN COMPUTERIZED
ACCOUNTING SYSTEMS
A Master
of Data Module - Accounting
Non-Master Data Module - Accounting
master data is relatively • Memorandum
permanent data that is not It is adatawhich is expected • Contra • Payment
• Purchase Order
expected to change again to change frequently, again • Receipt
and again and is not a • Sales Order • Stock Journal
and again. • Journal • Sales
permanent data. • Purchase • Physical Stock
• Accounting Master Data
• Delivery Note
• Inventory Master Data
Our Personal Master Data • Credit Note
• Payroll Master Date • Debit Note • Receipt Note
• Statutory Master Data • Attendance • Payroll
2
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
3
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
• Flexibility
4
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
NON-INTEGRATED
SYSTEM
5
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
Risks an
6
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
Role Base
• MAC
Role-Based Access Control is an • DAC
approach to restricting system access
to authorized users. (i) Create – Allows to create data;
MAC criteria are defined by the system (ii) Alter – Allows to alter data;
administrator, strictly enforced by the (iii) View – Allows only to view
Operating System and are unable to data;
be altered by end users.
and
DAC involves physical or digital
measures and is less restrictive than (iv) Print – Allows to print data.
other access control systems as it
offers individual’s complete control
over the resources they own.
7
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
BUSINESS
PROCESSMODULESAND
THEIRINTEGRATION WITH
FINANCIAL
AND
ACCOUNTING
SYSTEMS
Trial
Ledger Balance
Journal THE
ACCOUNTING
PROCESSFLOW Adjusted
Source
Document Trial
Balance
Closing Financial
Entries Statement
8
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
• Financial Accounting Module • Controlling Module • Sales and Distribution Module Sales and Distribution
The key features of this module are as under: Key features of this module
are as under:
•Tracking of flow of financial data across
the organization in a controlled manner • Cost Element Key features of Sales and Sales and Distribution Process:
and integrating all the information for Accounting Distribution Module are • Pre-Sales Activities
effective strategic decision making. • discussed as under:
• Cost Centre Accounting • Sales Order
Creation of Organizational Structure • Setting up Organization
• Activity-Based- • Inventory Sourcing
• Financial Accounting Global Structure
Accounting • Material Delivery
Settings • General Ledger Accounting • Assigning Organizational Units
• Tax Configuration & Creation and • Billing
• Internal Orders • Defining Pricing Components
Maintenance of House of Banks. • Receipt from Customer /
• Product CostControlling • Setting up sales document
•Account Payables, accounts receivable, Payment
types, billing types, and tax-
fixed assets, general ledger and cash • Profitability Analysis related components;
management, etc. • Account Receivables • • Profit Centre Accounting • Setting up Customer master
Asset Accounting. • Integration with Sales data records and configuration.
and Distribution and Materials Management.
9
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
10
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
11
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
12
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
13
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
• The capabilities of the firm. ⚫ enhancing communication among departments while coordinating activities;
14
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
Business Intelligence combines abroad setof data analysis applications, including ad hoc analysis and querying, enterprise reporting, Online Analytical Processing
(OLAP), mobile BI, real-time BI, operational BI, cloud and software asa service BI, open-source BI, collaborative BI and location intelligence.
BI programs can also incorporate forms of advanced analytics, such as data mining, predictive analytics, text mining, statistical analysis and big data analytics.
Business Intelligence data typically is stored in a data warehouse or smaller data marts that hold subsets of a company’s information.
Business intelligence is sometimes used interchangeably with business analytics;
15
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
WhyisBusinessReportingImportant?
Business Reporting 🢫 Organizations communicate with
• Effective and transparent business reporting allows organizations
their stakeholders about:
Business Reporting or Enterprise Reporting 🢫 to present a cohesive explanation of their business and helps them
• mission, vision, objectives, and
engage with internal and external stakeholders, including customers,
• The public reporting of operating and financial strategy;
employees, shareholders, creditors, and regulators.
data by a business enterprise or the regular • governance arrangements and
provision of information to decision-makers within risk management; • High-quality business reporting is at the heart of strong and sustainable
• trade-offs between the shorter- organizations, financial markets, and economies.
an organization to support them in their work.
and longer-term strategies; and • As organizations fully depend on their stakeholders for sustainable
• Organizations conduct a wide range of reporting, • financial, social, and success,it isin their interest to providethemwith high-qualityreports.
including financial and regulatory reporting; environmental performance • Many organizations are increasingly complex, and have larger
Environmental, Social, and Governance (ESG) (how they have fared against economic, environmental, andsocial footprints.
reporting (or sustainability reporting); and their objectives in practice).
• High-quality reports also promotebetter internal decision-making.
increasingly integrated reporting.
16
CA INTERMEDIATE
ENTERPRISE INFORMATION SYSTEM
General – Applicable to all irrespective Regulatory Compliance and Accounting Systems Accounting and Tax Compliance or Only Tax Compliance
of anything. Regulatory compliance and accounting systems 1. Easeof software operation
Specific – Applicable to specific type of are closely connected with each other. Most of 2. Features and facilities
businesses only. business systems. the regulatory compliance requires accounting 3. Time and efforts required
data and accounting data comes from accounting 4. Accuracy
systems 5. Cost
17
HIT THE BULLS EYE
ENTERPRISE INFORMATION SYSTEM
INFORMATION
SYSTEMS
1
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
COMPONENTS OF
INFORMATION
2
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
COMPONENTS OF
INFORMATION
3
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Computer systems provide output (a) Operating System Software (b) Application Software
to decision makers at all levels An Operating System (OS) is a set of computer programs that manages Application Software is the category
in an enterprise to solve business
computer hardware resources and acts as an interface with computer of programs that do some useful
problems, the desired output may
applications programs. processing or task for the user.
be in visual, audio or digital forms.
Types of Output Devices: Activities are executed by Operating systems Application Suite like MS Office 2010
• Textual Output • Performing hardware functions • User Interfaces which has MS Word, MS Excel, MS
• Graphical outputs • Hardware Independence • Memory Management Access, etc.
• Tactile output
• Task Management • Networking Capability
• Audio output
• Logical Access Security • File management
• Video output
Output Devices
4
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
• Advantages of DBMS
•Permitting Data Sharing • Minimizing Data Redundancy • Integrity can be • Disadvantages of DBMS
maintained • Program and File consistency • User-friendly Improved security • Cost • Security
• Achieving program/data independence • Faster Application Development
• Telecommunication Network
• Computer Network Types of network
Telecommunication networks give an organization the
Computer Network is a collection
capability to move information rapidly between distant
of computers and other hardware
locations and to provide the ability for the employees, Connection Connectionless
interconnected by communication channels
customers, and suppliers to collaborate from anywhere, Oriented networks
combined with the capability to bring processing power that allow sharing of resources and
information. networks
to the point of the application.
5
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
NETWORKING AND
COMMUNICATION
SYSTEM
• Issues in real world Network • Benefits of computer Network • Telecommunications my provide these
These real-world networks have helped model • Distributed nature of information values through the following impacts
computer networks. Each of these networks is • Time compression • Overcoming
• Resource Sharing • Computational Power
modelled to address the following basic issues: geographical dispersion • Restructuring
• Routing • Bandwidth • Resilience • Reliability • User Communication business relationships
6
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
INFORMATION
SYSTEMS CONTROLS
7
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
CLASSIFICATION OF IS CONTROL
These controls prevent errors, omissions, or These controls are designed to detect errors, It is desirable to correct errors, omissions, or
security incidents from occurring. They are omissions or malicious acts that occur and report incidents once they have been detected. They are
basically proactive in nature. the occurrence. reactive in nature.
The main characteristics of Detective controls are Minimizing the impact of the threat;
A clear-cut understanding about the given as follows: Identifying the cause of the problem;
vulnerabilities of the asset; Clear understanding of lawful activities so that Providing Remedy to the problems discovered by
Understanding probable threats; anything which deviates from these is reported detective controls;
as unlawful, malicious, etc.;
Provision of necessary controls for probable An established mechanism to refer the reported Getting feedback from preventive and detective
threatsfrom materializing. unlawful activities to the appropriate person or controls;
group, whistle blower mechanisms Correcting error arising from a problem; and
Interaction with the preventive control to prevent Modifying the processing systems to minimize
such acts from occurring; and Surprise checks by future occurrences of the incidents.
supervisor.
• Environmental Controls
•Environmental Controls • Physical Access • Fire • Electrical Exposure • Water Damage
Controls • Logical Access Controls • Pollution Damage
8
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
• Audit Functions
Electrical Exposures
These include risk of damages that may be caused due electrical faults.
Controls of Electrical Exposures • Electrical Surge Protectors • Un-interruptible Power System (UPS)/Generator
• Voltage regulators and circuit breakers • Emergency Power-Off Switch
Water Damage Water damage to a computer installation can be the outcome of water pipes burst.
Water Detectors • Strategically locating the computer room • Wherever possible have waterproof ceilings, walls and floors
Ensure an adequate positive drainage system exists; • Install alarms at strategic points within the installation; • In flood-prone areas, have the
installation above the upper floors but not at the top floor; • Water proofing; •Water leakage Alarms.
9
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Cipher locks Bolting Door Electronic Personal Plastic Cards Identification Logging on Other Means of
(Combination Door Locks Door Locks Identification Badges Facilities Controlling
Locks) Numbers (PIN)
Manual Electronic
Logging Logging
• Video Cameras • Security Guards • Controlled Visitor Access • Bonded Personnel • Dead Man Doors/Man trap
• Non–exposure of Sensitive Facilities • Controlled Single Entry Point • Alarm System • Perimeter Fencing • Computer
Terminal Locks • Control of out of hours of employee-employees • Secured Report/Document Distribution Cart
10
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
11
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
12
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
•Theprocessof examining data setsto draw conclusions about the DataAnalytics methodologies Confirmatory Data Analysis (CDA), which applies
information they contain, increasingly with the aid of specialized systems include ExploratoryDataAnalysis statistical techniques to determine whether
and software. (EDA), which aimsto find patterns hypothesesabout adatasetareTrueor False.
•Data Analytics predominantly refers to an assortment of applications, from andrelationshipsin data. Qualitative Data Analysis:Thequalitative approach
basic Business Intelligence (BI), reporting and Online Analytical Processing QuantitativeDataAnalysis: This is more interpretive - it focuses on understanding
(OLAP) to various forms of advanced analytics. involves analysis of numerical the content of non-numerical data like text, images,
•Data Analytics initiatives can help businesses increase revenues, improve data with quantifiable variables audio and video, including common phrases,
operational efficiency, optimize marketing campaigns and customer service that canbecomparedor measured themes and points of view.
efforts, respondmorequickly to emergingmarkettrendsandgainacompetitive statistically. PredictiveAnalytics, BigDataAnalytics,
edge over rivals - all with the goal of boosting business performance. DataMining, MachineLearning Text mining
13
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
14
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
15
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
BUSINESS INTELLIGENCE
TECHNOLOGY
Business Intelligence combines a broad set of data analysis applications, including ad hoc
analysis and querying, enterprise reporting, Online Analytical Processing (OLAP), mobile BI,
real-time BI, operational BI, cloud and software as a service BI, open-source BI, collaborative
BI and location intelligence.
BI programs can also incorporate forms of advanced analytics, such as data mining, predictive
analytics, text mining, statistical analysis and big data analytics.
Business Intelligence data typically is stored in a data warehouse or smaller data marts that
hold subsets of a company’s information.
Business intelligence is sometimes used interchangeably with business analytics;
16
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
BUSINESS REPORTING
AND FUNDAMENTALS
OF XBRL
17
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
What is XBRL 🢫 What does XBRL What is XBRL Tagging? What uses XBRL? Important features of
do? • XBRL Tagging is the process (i) Regulators XBRL
• XBRL is an open international
standard for digital business •XBRL makes by which any financial data (ii) Companies • Clear Definitions
reporting, managed by a global reporting more is tagged with the most (iii) Governments • Testable Business Rules
not for profit consortium, accurate and appropriate element in an
XBRL International. XBRL is more efficient. (iv) Data Providers • Multi-lingual Support
accounting taxonomy (a
used around the world, in (v) Analysts and
dictionary of accounting terms) • Strong Software Support
more than 50 countries. Investors
that best represents the data in
• XBRL provides a language in (vi) Accountants
which reporting terms can be addition to tags that facilitate
authoritatively defined. identification/classification
• XBRL is a standard-based way (such as enterprise, reporting
to communicate and exchange period, reporting currency,
business information between unit of measurement etc.).
business systems.
18
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
APPLICABLE REGULATORY
AND COMPLIANCE
REQUIREMENTS
19
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
What is E-Commerce
E-Commerce:“Sale / Purchaseof goods/ services through electronic mode is e-commerce.”
1
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
E-Market Models
2
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Componentsof E-Commerce(PUVWII)
(v) Marketing and loyalty programs • Mobile advertising and marketing module
•Mobile customer support and information
(vi) Showroom and offline purchase
module
(vii) Different Ordering Methods
• Mobile banking
(viii) Guarantees
(iii) Digital Library
(ix) Privacy Policy (iv) Data Interchange
(x) Security
3
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
4
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
5
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
• Network Diagram • Digital Assets • policy to protect the usability and integrity of network
• incidents of cyber security breach which occurred and the actions taken • Annual review by the CIO
should be • approvals exist before the access is granted to any IT resources • employee awareness
campaigns focusing on methods of intrusion • baseline security configurations established by
the Company under any security standards • remote access logins are configured for two factors’
authentications • vulnerability scans or penetration testing performed by the Company
6
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
COMMERCIAL LAWS
GUIDELINES OF INFORMATION
GOVERNING E-COMMERCE
ECOMMERCE TECHNOLOGY ACT, 2000
Income Tax Act, 1961 (As Amended 2008)
•Billing • Product Companies Act, 2013
guarantee/warranty Foreign Trade (Development and
• Shipping • Delivery Regulation) Act, 1992
• Return • Payment The Factories Act, 1948
The Customs Act, 1962
The Goods and Services Tax
(GST) Act, 2017
Indian Contract Act, 1872
The Competition Act, 2002
Foreign Exchange Management
Act (FEMA 1999) RESERVE BANK OF
Consumer Protection Act, 1986 INDIA ACT, 1934
7
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
8
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
DIGITAL PAYMENT
Digital Payment also known as Electronic Payment, is a
way of payment which is made through digital modes.
Advantages and
Different Types of disadvantages of
Digital Payments Digital Payments
9
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
COMPUTING TECHNOLOGIES
10
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
GRID COMPUTING
Storage Virtualization
Storage Virtualization is the apparent pooling of data from multiple storage devices, even different types of
storage devices, into what appears to be a single device that is managed from a central console.
11
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
CLOUD COMPUTING
12
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Characteristicsof Private Advantagesof Private limitation of Private Characteristicsof Public Advantagesof limitationsof
Cloud Cloud Cloud Cloud Public Cloud Public Cloud
• Secure• Central Control • It improves • invest in buying, • Highly Scalable • •widely usedin the development, • is security assurance
• Weak Service Level average server building, and managing Affordable • LessSecure deployment and managementof and thereby building trust
Agreements(SLAs) utilization the clouds independently. • Highly Available enterprise applications, at affordable amongthe clients is far
•It provides ahigh level Privatecloud resources costs
• Stringent SLAs from desired because
of security and privacy are not ascost-effective • allows the organizations to resourcesare shared
• It is small and controlled aspublic clouds and they deliver highly scalable and reliable
and maintained by the publicly
have weak SLAs. applications rapidly and at more
organization affordable costs • Further, privacy and
• Thereis no need for establishing organizational autonomy
infrastructure for setting up and are not possible
maintaining the cloud
•Public clouds can easily be
integrated with private clouds.
Strict SLAsare followed
• Thereis no limit for the number
of users
13
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
14
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Infrastructure as a Service (IaaS) Platform as a Service Software as a Service Other Cloud Service Models
IaaS, a hardware-level service, provides computing (PaaS) (SaaS) • Communication as a Service (CaaS)
resources such as processing power, memory, storage, PaaS provides the users SaaS provides ability to • Data as a Service (DaaS)
and networks for cloud users to run their application the ability to develop and the end users to access • Security as a Service (SECaaS)
on-demand deploy an application on an application over the • Identity as a Service (IDaaS)
the development platform Internet that is hosted and
provided by the service managed by the service
Characteristicsof IaaS Instances of IaaS
provider provider.
• Web access to the resources • Network asaService (NaaS)
• Centralized Management • Storage asaService (STaaS)
• Elasticity and Dynamic •DatabaseasaService Instancesof SaaS
Scaling • Sharedinfrastructure (DBaaS)• Backend asa • TestingasaService (TaaS)
• MeteredServices Service (BaaS)• Desktop asa • API asaService (APIaaS)
Service (DTaaS) • Email asaService (EaaS)
15
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
MOBILE
COMPUTING
Mobile Computing refers to the
technologythat allows transmissionof data
via a computer withouthaving
tobe connectedtoa fixed
physical link.
Components of Mobile Computing Working of Mobile Computing Benefits of Mobile Computing Limitations of Mobile
• Mobile Communication • The user enters or accesses data using the •work from anywhere as long as Computing
• Mobile Hardware application on hand-held computing they are connected to a network • Insufficient Bandwidth •
• Mobile Software device • Using one of several connecting • reduced the travelling time Security Standards • Power
technologies, the new data are transmitted from different locations or to the consumption • Transmission
from hand-held to site’s information system office and back • productivity interferences • Potential
where files are updated, and the new has been enhanced • enables the health hazards • Human
data are accessible to other system user • organization to improve the services interface with device
Now, both systems (hand-held and site’s offered to its customers • Increased
computer) have the same information and information flow • excellent
are in sync • The process works the same communication • remote access to
way starting from the other direction. work order details
16
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
GREEN COMPUTING
Green Computing or Green IT refers to the study and
practice of environmentally sustainable computing or IT
17
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
18
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
WEB 3.0
The term Web 3.0, also known as the Semantic Web,
describes sites wherein the computers will generate raw
data on their own without direct user interaction.
Underlying Concept Components of Web 3.0 Web 4.0 called The Web 5.0
•Web 3.0 technology uses • Semantic Web • Web “Intelligent Web” is “The Telepathic Web/The
the “Data Web” Technology, Services autonomous, proactive, Symbionet Web” is set to be
which features the data content-exploring, self- highly complex future web
records that are publishable learning, collaborative, and generation, to be present
and reusable on the web content-generating agents after the year 2030 in which
through query-able formats. based on fully matured some things such as brain
semantic and reasoning implants are expected to be
technologies as well as popular.
Artificial Intelligence.
19
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
Internet of Things
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with unique identifiers and the ability to transfer
data over a network without requiring human-to-human or human-to-computer interaction.
Applications Risks
• All home appliances to be connected •Risk to user of these products • Risk to
and that shall create a virtual home user of these products • Technology Risk
•Office machines shall be connected • Environmental Risks due to Technology
through net • Governments can keep
track of resource utilizations/extra support
needed
•Wearables • Smart City • Industrial
Internet of Things • Connected Car
• Smart Retail • Smart Supply Chain
20
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
21
BULL EYESBOOKLET
ENTERPRISE INFORMATION SYSTEM
BLOCKCHAIN
• Blockchain, sometimes referred to as Distributed Ledger Technology (DLT) is a shared, peer-to-peer,
and decentralized open ledger of transactions system with no trusted third parties in between.
• A blockchain generally uses a chain of blocks, with each block
representing the digital information stored in public database (“the
chain”).
22
BULL EYESBOOKLET
CORE BANKING SYSTEMS
❖ INTRODUCTION
• Information Technology (IT).
• Global Business Opportunities.
• Financial Inclusions.
• Growth of Internet.
• Core Banking Systems (CBS).
❖ CBS IT ENVIRONMENT
A. Database Server
B. Application Server
C. Automated Teller Machines (ATM) Channel Server
D. Internet Banking Channel Server (IBCS)
E. Internet Banking Application Server (IBAS)
F. Web Server
G. Proxy Server
H. Anti-Virus Software Server
❖ IMPLEMENTATION OF CBS
• Planning
• Approval
• Selection
• Design and develop or procured
• Testing
• Implementation
• Maintenance
• Support
• Updating
• Audit
✓ Risk Management:
a. Operational Risk
▪ Transaction Processing Risk
▪ Information Security Risk
▪ Legal Risk
▪ Compliance Risk
▪ People Risk
b. Credit Risk
c. Market Risk
d. Strategic Risk
e. IT Risk
• Security Policy
• Information Security
▪ Information Security Policies, Procedures and practices
▪ User Security Administration
▪ Application Security
▪ Database Security
▪ Operating System Security
▪ Network Security
▪ Physical Security
✓ Cyber Crimes.
✓ Banking Regulation Acts.
1) Negotiable Instruments Act-1881 (NI Act).
2) RBI Regulations.
▪ Monetary Authority.
▪ Regulator and supervisor of the financial system.
▪ Issuer of currency.
3) Prevention of Money Laundering Act (PMLA), 2002.
4) Information Technology Act, 2000.
A. Key Provisions of IT Act.
B. Sensitive Personal Data Information (SPDI).
C. Privacy Policy.
❖ CHAPTER X MISCELLANEOUS
Section 63. Punishment for false information or failure to give
information, etc.
Section 70. Offences by companies.