尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Bank Audit in IT Environment ,[object Object],[object Object]
During the past few years Information Technology  has made  rapid inroads  into  our lives  in a way  we could ever imagine.
Mom, When is my Happy Download Day?
How many times have I told you!  You were not downloaded. You were born…
we are currently developing an insatiable appetite for instant information made possible by Information Technology. Information Technology has completely changed the way, we lead our lives.
Everyday one trillion dollars worth of money is transacted over the global networks. Money equal to 200 per cent of India’s GDP over a whole year moves over the global financial networks in a single day. ,[object Object],[object Object],[object Object],[object Object]
The wide spread use and ongoing development of Information Technology has affected business immeasurably.  And that is the reason; the audit environment has also undergone a chemical change.
Banking Applications Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Branch Automation Software ,[object Object],[object Object],[object Object],[object Object]
Total Branch Automation Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Core Banking Solution: ,[object Object],[object Object],[object Object],[object Object],[object Object]
The basic tenet of Audit remains the same-i.e. reliability and integrity of data. Use of IT does not give rise to new audit objectives nor does it change the same. But the role, focus and scope of audit has certainly changed in the changed environment .
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Physical Environment Vs e-Environment
[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Potential Risk Areas in computerised environment
Arithmetic accuracy and uniform processing of transactions that reduces the audit risk as there is no need to maintain and verify balancing ledgers and no need to verify postings if there is a fool proof computer system.  Further, the system calculates interest automatically and chances of error are limited.  The clerical errors ordinarily associated with manual processing are virtually eliminated.   Advantages over manual system
[object Object],[object Object],[object Object],[object Object],Challenges
After the AAS 29 on Auditing in a Computerised Information Systems (CIS) environment became operative for all audits related to accounting periods beginning on or after 1st April 2003, the responsibility of the bank branch auditor has increased manifold.  As per AAS 29, the overall objective and scope of an audit does not change in a CIS environment, however, the use of a computer changes the processing, storage, retrieval and communication of financial information and may affect the accounting and internal control systems employed by the entity. AAS 29
[object Object],[object Object],[object Object],[object Object],[object Object],AAS 29
[object Object],[object Object],[object Object],Controls in Information System Environment
[object Object],[object Object],Application Controls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lock Guard Security: Scenario
Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons:   Sabotage / Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK  Environmental / Physical Threats  E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through:   Hackers/ competitors /   criminals etc. Reasons:   Sabotage /  Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc Information Security Risk in a Bank
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],Thanks for being nice & giving a patient hearing

More Related Content

What's hot

03.1 general control
03.1 general control03.1 general control
03.1 general control
Mulyadi Yusuf
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
seanpizzy
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
Rajeswaran Muthu Venkatachalam
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
MNorazizi HM
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
Jayesh Daga
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
Adetula Bunmi
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
MuhamadSyawal7
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
Randy James
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
Kashif Rana ACCA
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
Lisa Dowdell, MSISTM
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 

What's hot (20)

03.1 general control
03.1 general control03.1 general control
03.1 general control
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 

Similar to bankauditinITEnv

Chapter 6
Chapter 6Chapter 6
Chapter 6
Nur Dalila Zamri
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
Ashish Desai
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
guestc1bca2
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptxONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
spommmari
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
KugendranMani
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
Ros Dina
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
Anne ndolo
 
Sushant edp
Sushant edpSushant edp
Sushant edp
zalak007
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
VadivelM9
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
Olivia Wilson
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
Harry George
 
Advantages of Electronic Permit System
Advantages of Electronic Permit SystemAdvantages of Electronic Permit System
Advantages of Electronic Permit System
Olivia Wilson
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 

Similar to bankauditinITEnv (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptxONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
 
Advantages of Electronic Permit System
Advantages of Electronic Permit SystemAdvantages of Electronic Permit System
Advantages of Electronic Permit System
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 

More from Dr Vijay Pithadia Director

Lecture 6 training development
Lecture 6 training developmentLecture 6 training development
Lecture 6 training development
Dr Vijay Pithadia Director
 
Lecture 5 interviewing candidates
Lecture 5 interviewing candidatesLecture 5 interviewing candidates
Lecture 5 interviewing candidates
Dr Vijay Pithadia Director
 
Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
Dr Vijay Pithadia Director
 
Lecture 2 job aanalysis
Lecture 2 job aanalysisLecture 2 job aanalysis
Lecture 2 job aanalysis
Dr Vijay Pithadia Director
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
Dr Vijay Pithadia Director
 
Performance management
Performance managementPerformance management
Performance management
Dr Vijay Pithadia Director
 
Hr dev performanceappraisal
Hr dev performanceappraisalHr dev performanceappraisal
Hr dev performanceappraisal
Dr Vijay Pithadia Director
 
Dessler hrm12e ppt_11
Dessler hrm12e ppt_11Dessler hrm12e ppt_11
Dessler hrm12e ppt_11
Dr Vijay Pithadia Director
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
Dr Vijay Pithadia Director
 
Session plan
Session planSession plan
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
Dr Vijay Pithadia Director
 
Processing cooperatives
Processing cooperativesProcessing cooperatives
Processing cooperatives
Dr Vijay Pithadia Director
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
Dr Vijay Pithadia Director
 
History of the cooperative movement
History of the cooperative movementHistory of the cooperative movement
History of the cooperative movement
Dr Vijay Pithadia Director
 
Dairy cooperatives
Dairy cooperativesDairy cooperatives
Dairy cooperatives
Dr Vijay Pithadia Director
 
Cooperative
CooperativeCooperative
Consumer cooperative
Consumer cooperativeConsumer cooperative
Consumer cooperative
Dr Vijay Pithadia Director
 
Capitalism and socialism
Capitalism and socialismCapitalism and socialism
Capitalism and socialism
Dr Vijay Pithadia Director
 
Banking cooperative
Banking cooperativeBanking cooperative
Banking cooperative
Dr Vijay Pithadia Director
 
Assignment 1
Assignment 1Assignment 1

More from Dr Vijay Pithadia Director (20)

Lecture 6 training development
Lecture 6 training developmentLecture 6 training development
Lecture 6 training development
 
Lecture 5 interviewing candidates
Lecture 5 interviewing candidatesLecture 5 interviewing candidates
Lecture 5 interviewing candidates
 
Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
 
Lecture 2 job aanalysis
Lecture 2 job aanalysisLecture 2 job aanalysis
Lecture 2 job aanalysis
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
 
Performance management
Performance managementPerformance management
Performance management
 
Hr dev performanceappraisal
Hr dev performanceappraisalHr dev performanceappraisal
Hr dev performanceappraisal
 
Dessler hrm12e ppt_11
Dessler hrm12e ppt_11Dessler hrm12e ppt_11
Dessler hrm12e ppt_11
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
 
Session plan
Session planSession plan
Session plan
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
 
Processing cooperatives
Processing cooperativesProcessing cooperatives
Processing cooperatives
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
History of the cooperative movement
History of the cooperative movementHistory of the cooperative movement
History of the cooperative movement
 
Dairy cooperatives
Dairy cooperativesDairy cooperatives
Dairy cooperatives
 
Cooperative
CooperativeCooperative
Cooperative
 
Consumer cooperative
Consumer cooperativeConsumer cooperative
Consumer cooperative
 
Capitalism and socialism
Capitalism and socialismCapitalism and socialism
Capitalism and socialism
 
Banking cooperative
Banking cooperativeBanking cooperative
Banking cooperative
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

Recently uploaded

Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

bankauditinITEnv

  • 1.
  • 2. During the past few years Information Technology has made rapid inroads into our lives in a way we could ever imagine.
  • 3. Mom, When is my Happy Download Day?
  • 4. How many times have I told you! You were not downloaded. You were born…
  • 5. we are currently developing an insatiable appetite for instant information made possible by Information Technology. Information Technology has completely changed the way, we lead our lives.
  • 6.
  • 7. The wide spread use and ongoing development of Information Technology has affected business immeasurably. And that is the reason; the audit environment has also undergone a chemical change.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. The basic tenet of Audit remains the same-i.e. reliability and integrity of data. Use of IT does not give rise to new audit objectives nor does it change the same. But the role, focus and scope of audit has certainly changed in the changed environment .
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Arithmetic accuracy and uniform processing of transactions that reduces the audit risk as there is no need to maintain and verify balancing ledgers and no need to verify postings if there is a fool proof computer system. Further, the system calculates interest automatically and chances of error are limited. The clerical errors ordinarily associated with manual processing are virtually eliminated. Advantages over manual system
  • 23.
  • 24. After the AAS 29 on Auditing in a Computerised Information Systems (CIS) environment became operative for all audits related to accounting periods beginning on or after 1st April 2003, the responsibility of the bank branch auditor has increased manifold. As per AAS 29, the overall objective and scope of an audit does not change in a CIS environment, however, the use of a computer changes the processing, storage, retrieval and communication of financial information and may affect the accounting and internal control systems employed by the entity. AAS 29
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK Environmental / Physical Threats E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through: Hackers/ competitors / criminals etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc Information Security Risk in a Bank
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  翻译: