JAIIB CAIIB MOCK TEST || CAIIB MOCK TEST | JAIIBCAIIB MOCK TEST |

JAIIB CAIIB STUDY MATERAILS

Unit – 35 : Security Considerations

A typical computerised environment constitutes three independent but separate components Software, Hardware and Data

The Risks broadly lead to

  1. Incorrect decision-making leading to setback to business
  2. Interruption in activities due to loss of data, hardware, software, Peopleware.
  3. Violation of Privacy
  4. Direct Financial loss due to computer frauds.

The objective of Computer Auditing is:

  1. Assets safeguarding
  2. Preserving data integrity
  3. Achieving system efficiency

Risk prone components in computerised systems

  1. Errors and omissions in data and software
  2. Unauthorised disclosure of confidential information
  3. Computer abuse and mis-utilisation of banks assets

Effective Control Mechanism in computerised environment

  1. Preventive
  2. Detective
  3. Corrective

Scope of System Audit is

  1. Review of operations to establish compliance
  2. Review of the adequacy of procedures and controls
  3. Integrity review focused at fraud detection/prevention of IT system
  4. Audit Trail is a chronological record of all events occurring in a system

Legal Framework for Electronic Transactions

Consequent upon the recognition given to the electronic records, electronic documents and electronic signatures, incidental amendments have also been made in the following acts:

  1. The Indian Penal Code, 1860
  2. The Indian Evidence Act, 1872
  3. The Bankers’ Books Evidence Act, 1891
  4. The Reserve Bank Of India Act 1934

Leave a Reply

Your email address will not be published. Required fields are marked *