13 Mics Notes
13 Mics Notes
Dear All,
It gives immense pleasure to present this MICS notes, the objective of this notes
is to clear the misconceptions from the minds of the students, who feel MICS as
very difficult to pass/score
Among the eight papers of CA- Final, MICS is the most easiest and scoring
subject as there are no numbers involved, except question numbers in question
paper J
I have put in my best efforts to make this notes easy and understandable ,
Methodology
Phase 1..................................................................................................................................... 2
Chapter - 6 - Enabling Technologies ............................................................................... 2
Chapter - 7 - System Development Process................................................................... 4
Chapter - 8 - Systems Design............................................................................................ 8
Chapter - 9 - System’s Acquisition, Software Development & Testing................. 10
Chapter – 10 - System Implementation & Maintenance ............................................ 12
Phase - 2................................................................................................................................. 14
Chapter – 11 - Design Of Computerised Commercial Applications .......................... 14
Chapter – 12 - Enterprise Resource Planning – Redesigning Business .................... 14
Chapter – 19 - CASE Tools and Digital Technology .................................................... 17
Phase - 3................................................................................................................................. 19
Chapter – 13 - General Controls in EDP Set –up.......................................................... 19
Chapter – 14 - Application Controls in EDP Set-up..................................................... 22
Phase - 4................................................................................................................................. 24
Chapter – 18 - Information Security ............................................................................ 24
Chapter – 15 - Detection of Computer Frauds ............................................................ 26
Chapter – 16 - Cyber Laws and Information Technology Act, 2000 ...................... 29
Chapter – 17 - Audit of Information Systems............................................................. 31
Phase - 5 .................................................................................................................................. 34
Chapter – 3 - Basic Concepts of MIS ............................................................................ 34
Chapter – 4 - Systems Approach & Decision Making ................................................. 37
Chapter – 5 - Decision Support & Executive Information System......................... 39
Chapter – 1 - Basic concepts of systems....................................................................... 41
Chapter – 2- Transaction Processing System .............................................................. 43
Components of C/S
Preliminary Investigation
Requirement Analysis
System Analysis (Present & Proposed)
Design of System
Acquisition & Development of software
System Testing
Implementation & Maintenance
Disadvantages
Process owners not willing to devote significant time, Experimented quite extensive
Lack of documentation and Behavior problem
N Don’t confuse with Reasons for failure to achieve system development objectives
Requirement Analysis
Ø Determining user needs
Ø Study of application area in depth
Ø Assessing the strengths & weaknesses of present system
Ø Reporting to management
6. Data Dictionery (Computer file containing descriptive information about the data
items)
• It contains information about each data item stored in the system, file in which it
is stored, program that modifies it, authorised users & unauthorised persons.
• It is updated with every change in data item.
• Gives an audit trail to the auditor & helping aid in investigation.
Input (Efficient data capture, effective coding & appropriate data entry methods)
Guidelines for form designing
1. Easy to fill (Proper flow, logical division & captioning)
2. Purposeful
3. Accurate completion
4. Attractive
Characteristics of good coding scheme
[Code: - Brief no./title/symbol used instead of lengthy/ambiguous description]
1. Unique Code
2. Brief
3. Convenient
4. Expandability (compatible with future growth)
5. Suggestive
6. Permanence
Please refer page 8.9 for 10 marks. – Factors to be considered designing printed output.
Acquisition of Hardware
1. Latest possible technology.
2. Speeds & capabilities.
3. Software Considerations.
4. Compatibility to future expansion.
5. Vendor selection & machine selection
Acquisition of software (Pre-packaged Application Software)
(Sources may be computer manufacturer, software houses, retail stores, user groups and In
house development)
Advantages
1. Rapid Implementation 3. Low Risk
2. Quality 4. Lower Cost (No hidden costs)
Steps for selection of a computer system (Software & Hardware)
1. Prepare design specification. 2. Distribute request for proposal (RFP)
3. Analysis of proposals. 4. Contact present users of proposed system
5. Conduct Benchmark Test. 6. Select the equipment/system.
(Actual testing of the system)
Evaluation & Ranking of Proposals (Factors) / Validation of vendor’s proposal
1. Capability & Quality • System Maintenance
2. Cost-Benefit Analysis • System Development Support
3. Cost of maintenance • Training
4. Compatibility • Back-up
5. Services provided by the vendor • Complement Hardware / Software
Method of Evaluation/ Validating RFP • Business hours v/s Round the clock
service
1. Checklists (Subjective Method) –
2. Point-scoring analysis
3. Public evaluation reports
(consultancy agency, present users, financial statement analysis, credit rating agency)
System Testing
To be conducted prior implementation
1. Preparation of realistic test data.
2. Processing with new equipment
3. Thorough checking of the results.
4. Review of the results.
Equipment Installation
Ø Necessary hardware to be ordered
Ø Use of Installation Checklist.
Ø Site Preparation ( appropriate location, operating environment, planning
space layout , electricity supply and carpets to be avoided
Ø Equipment Installation (to be installed by the manufacturer and connected)
Ø Equipment Checkout (turned on to check/test under normal operating
conditions, devise and run extensive tests
Training Personnel
Ø System operator training (fundamental of turning on the system, knowledge of normal
operation, trouble shooting and contact names and numbers in case of emergency)
Ø User training (guidelines on equipment use and training on data handling activities )
Ø Evaluate whether the new system is working properly & the users are satisfied.
Ø Current adjustment in new system.
Ø Proposed adjustments in case of future development.
1) Development evaluation. [on schedule & within budget]
2) Operation evaluation.
3) Information evaluation
System Maintenance
Ø Arises due to malfunction/failure to anticipate during design
Ø Involves adding new data elements modifying reports and changing calculations
Etc.
Scheduled maintenance – Anticipated and planned
Rescue maintenance – previously undetected malfunctions that were not anticipated
but require immediate solution.
Definition
ERP is a fully integrated business management system covering all functional areas.
Eg :- Logistics, Production, Finance, and Accounting & Human Resource.
It organizes & integrates the above-stated operations to make optimum use of
resources & maximize return. It does the same thing but in a different manner.
Benefits
1) Assists employees & managers. 6) Reduction of paper document.
2) Production scheduling. 7) Timeliness.
3) Optimum capacity utilization. 8) Accuracy.
4) Reduce Inventory. 9) Quick response.
5) Better services to customers. 10) Competitive advantage.
Features of ERP
1. Provides multi platform, Multi facility, Multi currency and multimode manufacturing.
2. Supports strategic and business planning activities
3. Has end to end supply chain management
4. Coverage of all functional area
5. Perform core activities and increases customer services
6. Integration of systems across organization / Across globe
7. Solutions for better project management
8. Automatic introduction of latest technology like EFI, EDI & Internet.
9. Provides business tools like DSS & EIS.
Business Modeling
Ø Consists of Core Business Processes/Activities & their inter-linking in a diagrammatic
form.
Ø Planning – Top down approach.
Execution – Bottom up approach.
Ø Readymade Business Modeling Templates are also available in the market.
ERP Audit
Ø Necessary for ensuring the proper functioning of ERP package.
Ø May be specific or general.
Ø Evaluation of security, authorization & control.
Ø ERP audit trail.
CASE Workbenches
SYN
User Connecting Receiving
SYN/ACK
Server Server
ACD
Input Controls
1. Source Document Control
Pre-numbered ; Used in Sequence ; Periodical Audit
2. Data Coding Control / what types of errors can corrupt a data code
checking the integrity of data codes used in processing
i. Transcription Error (addition / truncation / substitution)
ii. Transposition Error (e.g. 38276-83276)
⇒ Check Digit - method of detecting data coding errors a control digit is added to
code when originally assigned, establishes integrity.
3. Batch Control
i. Batch Transmittal Sheet – It is prepared by user department & submitted along with
batch of source document. It contains Batch no., Date, Transaction Code, Batch
Totals.
[Batch Totals = Record Count, Hash Total & Control Total]
ii. Batch Control Log – Contains the details of all the batches processed during a
period.
4. Input Validation control
3) Designing of Information System Security Framework after the policy has been
approved by the governing body.
4) Timely Implementation of Information Security System after designing of framework.
5) Continuous Monitoring, disciplinary & corrective actions.
6) Adequate Training, Education & Awareness program to ensure proper functioning of
Information Security.
Role of Security Administrator
Ø Responsible for controlling and co-coordinating the activities related to security
aspects.
Ø Ensures adequate Information Security; Sets Policies; Investigates; Advices; Trains the
users; Monitors the activities related to Information Security.
⇒ Computer fraud means obtaining unfair advantage over another person, computer, or
organization using computer, computer network or computer resources.
Reasons for Internet Fraud / substantiate with reasons to the view that there is a steep rise
in the Internet computer fraud, and why many institutions unable to contain it.
Preventing computer frauds /Measures that can reduce potential for fraud
1. Make fraud less likely to occur
2. Use proper hiring and firing process
3. Manage disgruntled employees
4. Train employee in security and fraud prevention measures
5. Fraud awareness
6. Telephone disclosures
7. Punishment for unethical behaviour
8. Signed confidentiality agreements
Detection methods
Ø Conduct audit at regular interval
Ø Appointment of Computer security officer
Ø Hiring of computer consultants
Ø Maintenance of System activity log
Ø Fraud detection software
Ø Computer forensic tools – In this technique deleted files are recovered. Exact copy of
disk is taken through disk imaging technique & investigation is done without the
knowledge of the fraudster. [Disk Imaging & Analysis Technique]
Security methods
Ø Take proper insurance cover
Ø Keeping back-up at remote location
Ø Develop contingency plan
Ø Using special software to monitor the activities
Please refer study material for computer fraud and abuse techniques Page – 15.9
Disk imaging and analysis techniques – v important page –15.17
Definitions
Asymmetric Crypto System
Key Pair consisting of a private key (for creating digital signature)
and a public key (to verify the digital signature).
Digital Signature
Authentication of electronic record by means of an electronic method.
Secure System {Hardware, Software & Procedure}
ü Is secure from unauthorized access
ü Provide a reasonable level of reliability
ü Suited in performing the intended functions.
ü Adhere to generally accepted security procedures.
Power of CG to make rules in respect of digital signature (Section – 10 )
1. Type of digital signature
2. Manner and format for affixing it.
3. Manner & procedure to identify the originator.
4. Control procedures to ensure security, Integrity & confidentiality.
5. Any other matter to give legal effect to digital signature.
License Issues digital certificates
Controller Certifying Authority
è Controller shall act as repository for all digital signatures issued under this act.
The sole purpose of audit information systems, to review and evaluate an internal control
that protect the system and safeguards the assets
2. Snapshot Technique
• Examines the way transactions are processed
• For selected transactions marked with special code that triggers snap shot process
• Snap shot data recorded in separate file and reviewed by auditor to ensure
correctness
5. Audit hooks
• Flags suspicious transactions & display a message at the auditor’s terminal its
also called ‘Real time notifications’
Pre-requisites of MIS
i. Database and DBMS
User defined, Common data source, Access to authorized persons only, controlled
by separate authority
ii. Qualified system & staff
iii. Support of top management
Because subordinates are lethargic, large emphasis needs to be given, updating to
the management about the status
iv. Adequate control & maintenance of MIS
Ensuring system is operating as it is designed to operate
Limitations of MIS
i. The quality of output depends on quantity of input and process
ii. MIS is not substitute of effective management
iii. Its not flexible – difficult in fast changing complex environment
iv. Cannot provide tailor made information packages
v. Considers quantitative factors and ignores non quantitative factors like moral of the
employee
vi. Less helpful in making non programmed decisions
vii. MIS is not workable if data is not shared
viii. MIS effectiveness decreases due to frequent changes in top management
Top level
Concerned with task of designing, directing and managing the organization, they are
accountable for effectiveness and efficiency of operations and they deal with long term
plans policies and strategies
Requirements
External Internal
Competition, regulatory, trends in economy Historical sales, profits, ratios, debts and
and technology project profitability’s
Purpose of EIS
Ø Supports managerial learning about the organization
Ø Timely access to information – so that learning cycle continues unbroken
Ø Ability to direct management attention to specific areas