Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore CA Final ISCA Summary ca Final AY

CA Final ISCA Summary ca Final AY

Published by akpune1, 2021-07-10 03:51:13

Description: ISCA Summary ca Final Akshay Yadav

Keywords: CA Final ,ISCA,Akshay Yadav,Summary

Search

Read the Text Version

Chapter XI: Offences Section 65: Tampering with Computer Source Documents: (PM, RTP-M18) Whoever knowingly or intentionally conceals, destroys or alter any computer source code used shall be punishable with (Refer Section 43) … Imprisonment up to 3 years, or *… Fine which may extend up to Rs.2,00,000, or both. Section 66: Computer Related Offences: If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with … Imprisonment which may extend to 3 years or … Fine which may extend to Rs.5,00,000 or both. Section 66A: Punishment for sending offensive messages through communication service. Division bench of Supreme Court decided Sec. 66A of IT Act, 2000 as unconstitutional. Sec 66B: Punishment for dishonestly Sec 66C: Punishment for Sec 66D: Punishment for cheating receiving stolen computer resource or by personation by using computer identity theft resource: (RTP-M16) communication device: Whoever dishonestly receives or Whoever, fraudulently or Whoever, by means of any retains any stolen computer dishonestly make use of the communication device or resource or communication device electronic signature, password or computer resource cheats by knowing or having reason to believe any other unique identification personating, the same to be stolen, feature of any other person, shall be punished with … Imprisonment of either description for a term which may extend to 3 years or … Fine which may extend to Rs.1,00,000 or both Section 66E: Punishment for violation of privacy: Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his/her consent, under circumstances violating the privacy of that person, shall be punished with … Imprisonment which may extend to 3 years or … Fine not exceeding Rs.2,00,000, or both. Section 66F: Punishment for cyber terrorism: 1) Whoever - A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people/any section of the people by – i) denying or cause the denial of access to any person authorized to access computer resource; or ii) attempting to access a computer resource without authorization or exceeding authorized access; or iii) introducing or causing to introduce any computer contaminant, causing or is likely to cause death or injuries to persons or damage to property or adversely affect the critical information infrastructure specified u/s 70 or B) knowingly/intentionally accesses a computer resource without authorization or exceeding authorized access, & by means of such conduct obtains access to information, data/computer database that is restricted for reasons of the security of the State/foreign relations; or any restricted information, data/computer database, with reasons to believe that such information, data/computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty & integrity of India, the security of the State, friendly relations with foreign States, public order, decency/morality, or in relation to contempt of court, defamation to an offence, or to the advantage of any foreign nation, group of individuals/otherwise, commits the offence of cyber terrorism. (2) Whoever commits/conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. www.akpune.com © Compiled By: Akshay R Yadav 55 88881 44446 98817 51563

Section 67 Section 67A Section 67B Punishment for Punishment for Punishment for publishing/transmitting of publishing/transmitting publishing/transmitting of material depicting children in sexually explicit act, etc. in E-form: obscene material in material containing sexually explicit act, etc. E-form: in E-form: Whoever publishes/transmits/causes to be published/transmitted in the electronic form, any material which a) Depicts children engaged in sexually explicit act/conduct; or is appeals to the prurient b) Creates text/digital images, collects, seeks, interest/if its effect is such contains sexually explicit act browses, downloads, advertises; or as to tend to deprave & corrupt persons who are c) cultivates, entices/induces children to online likely, to read, see/hear the or relationship or matter contained in it, d) facilitates abusing children online; or conduct e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, Explanation: Children means a person who has not completed the age of 18 years. shall be punished on 1st conviction Second conviction 1st conviction Second/subsequent conviction 3 years & 5 years & Imprisonment of either description for with imprisonment of either description a term which may extend to 5 years & for a term which may extend to 7 years & Rs. 5,00,000 Rs. 10,00,000 Fine which may extend to Rs.10,00,000. Section 67C: Preservation & Retention of information by intermediaries: 1) Intermediary shall preserve & retain such information as may be specified for such duration & in such manner & format as the CG may prescribe. 2) Any intermediary who intentionally/knowingly contravenes the provisions of sub-section (1) shall be punished with … Imprisonment which may extend to 3 years & … Also liable to fine. Section 68: Power of the Controller to give directions: (PM, RTP-M15) 1) Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance of this Act, rules/any regulations. 2) Any person who intentionally/knowingly fails to comply with any order under subsection (1) shall be guilty of an offence & shall be liable … Imprisonment for a term not exceeding 2 years or … Fine not exceeding Rs.1,00,000, or both. Section 69B: Power to authorize to monitor & collect traffic data/information through any computer resource for Cyber Security: 1) CG may, to enhance Cyber Security & for identification, analysis & prevention of any intrusion/spread of computer contaminant in the country, by notification in the OZ, authorise any agency of the Govt. to monitor & collect traffic data/information generated, transmitted, received/stored in any computer resource. 2) Intermediary/any person in-charge of the Computer resource shall should assist authorised person. 3) Procedure & safeguards for monitoring & collecting traffic data/information, shall be such as may be prescribed. 4) [Same as section 67C(2] - Any intermediary who intentionally/knowingly contravenes the provisions of sub- section (1) shall be punished with … Imprisonment which may extend to 3 years & Also liable to fine. www.akpune.com © Compiled By: Akshay R Yadav 56 88881 44446 98817 51563

Section 69 Section 69A Powers to issue directions for interception/monitoring/decryption blocking for public access of any information through any computer resource 1) Where the CG/SG/any of its officers specially 1) Where the CG/ any of its officers specially authorized by the CG/SG, as the case may be, authorized by it in this behalf may, if satisfied that it is necessary/expedient so to do, in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States/public order/for preventing incitement to the commission of any cognizable offence relating to above it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Govt. to intercept, monitor/decrypt/cause to be or intermediary intercepted/monitored/decrypted to block access by the public/cause to be blocked for access by public any information generated, transmitted, received/stored in any computer resource. 2) Procedure & safeguards subject to which such interception/monitoring/decryption blocking for access by the public may be carried out, shall be such as may be prescribed. 3) Subscriber/intermediary/any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities & technical assistance to - a) Provide access to or secure access to the computer resource generating, transmitting, receiving/storing such information; or b) Intercept, monitor, or decrypt the information, as the case may be; or c) Provide information stored in computer resource. 4) Subscriber/intermediary/any person who fails to 3) Intermediary who fails to comply with the direction assist the agency referred to in sub-section (3) shall be issued under sub-section (1) punished with shall be punished Imprisonment for a term which may extend to 7 years & also liable to fine. Section 70: Protected system (PS): (May 2017)  Appropriate Govt. may, by notification in the OZ, declare any computer resource which directly/indirectly affects the facility of Critical Information Infrastructure, to be a PS.  Any person who secures access/attempts to secure access to a PS in contravention of the provisions of this section shall be punished with … Imprisonment of either description for a term which to 10 years & … Also be liable to fine [Section 70A]: National nodal agency (NNA): 1) CG may, by notification published in the OZ, designate any org. of the Govt. as the NNA in respect of Critical Information Infrastructure Protection. www.akpune.com © Compiled By: Akshay R Yadav 57 88881 44446 98817 51563

Section 70B: Indian Computer Emergency Response Team(ICERT) to serve as national agency for incident response: (Nov 2016) 1) CG shall, by notification in the OZ, appoint an agency of the govt. to be called the ICERT. 2) ICERT shall serve as the national agency for performing the following functions: a) Collection, analysis & dissemination of information on cyber incidents; b) Forecast cyber security incidents; c) Emergency measures for handling cyber security incidents; d) Coordination of cyber incidents response activities; e) Issue guidelines, &reporting of cyber incidents; f) Such other functions as may be prescribed. 3) Agency may call for information & give direction to the service providers, intermediaries. 4) Any service provider, intermediaries, who fails to provide the information called for, shall be punishable with … Imprisonment for a term which may extend to 1 years or … Fine which may extend to Rs.1,00,000 or both Sec. 71: Penalty for misrepresentation Sec. 72: Penalty for breach of confidentiality & privacy Whoever makes any misrepresentation to, or Save as otherwise provided in this Act/any other law for suppresses any material fact from, the the time being in force, any person who, has secured Controller/Certifying Authority for obtaining access to any electronic record, book, register, any license/Electronic Signature Certificate, correspondence, information, document/other material as the case may be, without the consent of the person concerned discloses it to any other person shall be punished with … Imprisonment for a term which may extend to 2 years or … Fine which may extend to Rs.1,00,000 or both Section 72A: Punishment for Disclosure of information in breach of lawful contract: Save as otherwise provided in this Act/any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss/wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person shall be punished with … Imprisonment for a term which may extend to 3 years or … Fine which may extend to Rs.5,00,000 or both Section 73: Penalty for publishing Electronic Signature Certificate false in certain particulars: 1) No person shall publish an Electronic Signature Certificate or make it available to any other person with the knowledge that - a) Certifying Authority listed in the certificate has not issued it; or b) Subscriber listed in the certificate has not accepted it; or c) Certificate has been revoked/suspended, unless such publication is for the purpose of verifying a digital signature created prior to such suspension/revocation. 2) Any person who contravenes the provisions of sub-section (1) shall be punished with … Imprisonment for a term which may extend to 2 years or … Fine which may extend to Rs.1,00,000 or both Section 74: Publication for fraudulent purpose: Whoever knowingly creates, publishes or otherwise makes available an Electronic Signature Certificate for any fraudulent or unlawful purpose shall be punished same as Section 73. Section 75: Act to apply for offences/contraventions committed outside India 1) Provisions of this Act shall apply also to any offence/contravention committed outside India by any person irrespective of his nationality, if the act/conduct constituting the offence/ contravention involves a computer, computer system or computer network located in India. www.akpune.com © Compiled By: Akshay R Yadav 58 88881 44446 98817 51563

Section 76: Confiscation: (RTP- Nov 2018) Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provision of this Act is being contravened, shall be liable to confiscation. Provided that where it is established to the satisfaction of the court adjudicating the confiscation that such resources is not responsible for the contravention of the provisions of this Act, then only person in default will be arrested.  Enterprises need to take steps to ensure compliance with cyber laws. Some key steps:- a) Designate a Cyber Law Compliance Officer as required. b) Conduct regular training of relevant employees on Cyber Law Compliance. c) Implement strict procedures in HR policy for non-compliance. d) Implement authentication procedures as suggested in law. e) Implement policy & procedures for data retention as suggested. f) Identify & initiate safeguard requirements as applicable under various provisions of the Act such as: Sections 43A, 69, 69A, 69B, etc. g) Implement applicable standards of data privacy on collection, retention, access. h) Implement reporting mechanism for compliance with cyber laws. Chapter-XII: Intermediaries not to be liable in Certain Cases Section 79: Exemption from liability of intermediary in certain cases: 1) NWAC in any law for the time being in force but subject to the provisions of sub-sections (2) & (3), an intermediary shall not be liable for any 3rd party information, data/communication link made available by him. 2) Provisions of sub-section (1) shall apply if: a) Function of the intermediary is limited to providing access to a communication system or b) Intermediary does not: i) Initiate the transmission, ii) Select the receiver of transmission, iii) Select/modify information contained in the transmission. c) Intermediary observes due diligence while discharging his duties under this Act. 3) Provisions of sub-section (1) shall not apply if: a) Intermediary has aided in the commission of the unlawful act. b) Intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner. Chapter-XIIA: Examiner of Electronic Evidence Section 79A: CG to notify Examiner of Electronic Evidence (EOEE): CG may, for the purposes of providing expert opinion on electronic form evidence before any court specify, by notification in the OZ, any Department, body/agency of the CG/SG as an EOEE. www.akpune.com © Compiled By: Akshay R Yadav 59 88881 44446 98817 51563

Chapter XIII: Miscellaneous Section 80: Power of police officer & other officers to enter, search, etc.: 1) NAWC in the Code of Criminal Procedure, 1973, any police officer, not below the rank of a Inspector or any other officer of the CG/SG authorized by the CG in this behalf may enter any public place & search & arrest without warrant any person found therein who is reasonably suspected of having committed or of committing or of being about to commit any offence under this Act. 2) Where any person is arrested by an officer other than a police officer, such officer shall, without unnecessary delay, take or send the person arrested before a magistrate having jurisdiction in the case or before the officer-in-charge of a police station. Section 81: Act to have Overriding effect: Provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force. Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act 1957/Patents Act, 1970. Section 81A: Application of the Act to electronic cheque & truncated cheque 1) Provisions of this Act, for the time being in force, shall apply to, electronic cheques & the truncated cheques subject to such modifications & amendments as may be necessary for carrying out the purposes of the Negotiable Instruments Act, 1881 by the CG, in consultation with the RBI, by notification in the OZ. Section 84B: Punishment for abetment of offence: Whoever abets any offence & no express provision is made by this Act for the punishment of such abetment, be punished with the punishment provided for the offence under this Act. Section 84C: Punishment for attempt to commit offences: Where no express provision is made for punishment to be punished with Imprisonment for a term which may extend to one-half of the longest term of imprisonment provided for that offence, or fine as is provided for the offence or both. Section 85: Offences by Companies: 1) Where a person committing a contravention of any of the provisions of this Act/any rule, direction/order made thereunder is a Company, every person who, at the time the contravention was committed, was in charge of, & was responsible to, the company for the conduct of business of the company as well as the company, shall be guilty of the contravention & shall be liable to be proceeded against & punished accordingly: Provided that nothing contained in this sub-section shall render any such person liable to punishment if he proves that the contravention took place without his knowledge or that he exercised all due diligence to prevent such contravention. www.akpune.com © Compiled By: Akshay R Yadav 60 88881 44446 98817 51563

Requirements of Various Authorities for System Controls & Audit A) Requirements of IRDA for System Controls & Audit:  IRDA is the apex body overseeing the insurance business in India.  It protects the interests of the policyholders, regulates, promotes. i) System Audit: 1) All insurers shall have their systems & process audited at least once in 3 yrs by CA firm. 2) For such Audit: Current internal/concurrent/statutory auditor is not eligible for appointment. 3) CA firm must be having a minimum of 3-4 years’ experience of IT systems of - banks/mutual funds/insurance companies. ii) Preliminaries: (M16 – 5 Marks) Before proceeding with the audit, the auditor is expected to obtain the following information at the audit location: 1) Location(s) from where Investment activity is conducted. 2) IT Applications used to manage the Insurer’s Investment Portfolio. 3) Obtain the system layout of the IT & network infrastructure. 4) Previous Audit reports & open issues of unresolved issues from: a) Internal Audit, b) Statutory Audit, c) IRDA Inspection/Audit. 5) Internal circulars & guidelines of the Insurer. 6) Standard Operating Procedures (SOP). 7) List of new Products/funds introduced during the period under review along with IRDA approvals. 8) IRDA Correspondence files, circulars & notifications issued by IRDA. 9) IT Security Policy. 10) BCP. 11) Network Security Reports pertaining to IT Assets. iii) System Controls: 1) There should be Electronic transfer of Data without manual intervention. All Systems should be seamlessly integrated. 2) Auditor should comment on the audit trail maintained in the system for various activities. 3) Auditor shall also ascertain that the system has separate logins for each user & maintains trail of every transaction with respect to login ID, date & time for each data entry, authorization & modifications. B) Requirements of RBI for System Controls & Audit:  RBI is India's central banking institution, which formulates the monetary policy with regard to the Indian rupee. The Bank was constituted for the need of following: a) To regulate the issue of banknotes, b) To maintain reserves with a view to securing monetary stability, c) To operate the credit & currency system of the country to its advantage. i) System Controls: (M16 -5 Marks ) 1) Duties of system programmer/designer should not be assigned to persons operating the system. 2) System person would only make modifications/improvements to programs & the operating persons would only use such programs without having the right to make any modifications. 3) Contingency plans in case of failure of system should be introduced/tested at periodic intervals. 4) An appropriate control measure should be devised & documented to protect the computer system from attacks. 5) In order to bring about uniformity of software used by various branches, be a formal method of incorporating change in standard software should be used. 6) BOD & senior management are responsible for ensuring that an institution’s system of internal controls operates effectively. 7) There should also be annual review of IS Audit Policy to ensure its continued relevance & effectiveness. 8) With a view to provide assurance to bank’s management, banks are required to conduct a quality assurance, at least once every 3 years. www.akpune.com © Compiled By: Akshay R Yadav 61 88881 44446 98817 51563

ii) System Audit: 1) Banks require a separate IS Audit function within an Internal Audit department led by an IS Audit Head reporting to the Head of Internal Audit. 2) Because the IS Audit is an integral part of the Internal Auditors, auditors will also be required to be independent, competent & exercise due professional care. 3) IS Audit should be independent of the auditee, both in attitude & appearance. 4) Additionally, to ensure independence for the IS Auditors, Banks should make sure that:  Auditors have access to information & applications, &  Auditors have the right to conduct independent data inspection & analysis. 5) Competence: IS Auditors should be professionally competent, having skills, knowledge, training & relevant experience. 6) They should be appropriately qualified, have professional certifications such as Certified Information Systems Auditor (CISA, offered by ISACA), Information Systems Audit (ISA, offered by ICAI). 7) IT Governance, information security governance related aspects, critical IT general controls having financial/compliance implications needs to be subjected to IS Audit at least once a year. 8) IS Audits should also cover branches, with focus on large & medium branches, in areas such as control of passwords, user ids, antimalware, maker-checker, segregation of duties. C) Requirements of SEBI for System Controls & Audit:  SEBI is the regulator for the securities market in India.  SEBI has to be responsive to the needs of three groups, which constitute the market: a)Issuers of securities, b) Investors, c) Market intermediaries. i) Systems Audit: (PM, RTP M16) SEBI had mandated that exchanges shall conduct an annual system audit by a reputed independent auditor. 1) Audit shall be conducted according to the Norms, Terms of References (TOR) & Guidelines issued by SEBI. 2) Board of the Stock Exchange/Depository shall appoint the Auditors based on the prescribed Auditor Selection Norms & TOR. 3) Auditors can perform maximum of 3 successive audits. 4) Proposal from Auditor must be submitted to SEBI for records. 5) Audit schedule shall be submitted to SEBI at-least 2 months in advance, along with scope of current audit & previous audit. 6) Scope of the Audit may be extended by SEBI. 7) Audit report be submitted to the Auditee. a) Report should have specific compliance/non-compliance issues as well as qualitative comments for scope for improvement. b) Report should also take previous audit reports in consideration. 8) Auditee mgt. provides their comment about the Non-Conformities (NCs) & observations. 9) Report along with Mgt. Comments shall be submitted to SEBI within 1 month of completion of audit. ii) Audit Report Norms: (RTP N16, M17) 1) Systems Audit Reports & Compliance Status should be placed before the Governing Board of the Stock Exchanges/Depositories & the system audit report along with comments of Stock Exchanges/Depositories should be communicated to SEBI. 2) Audit report should have explicit coverage of each Major Area mentioned in the TOR, indicating any Nonconformity (NCs) or Observations. 3) For each section, auditors should also provide qualitative input about ways to improve the process, based upon the best practices observed. www.akpune.com © Compiled By: Akshay R Yadav 62 88881 44446 98817 51563

iii) Auditor Selection Norms: (PM, M15, MTP) 1) Auditor must have minimum 3 years of experience in IT audit of Securities Industry participants. E.g. stock exchanges, clearing houses, depositories etc. 2) Auditor must have experience in/direct access to experienced resources in the areas covered under TOR. E.g. CISA (Certified Information Systems Auditor) from ISACA, CISM. 3) Auditor should have IT audit/governance frameworks & processes conforming to industry leading practices like COBIT. 4) Auditor must not have any conflict of interest in conducting fair, objective & independent audit. It should not engaged over last 3 yrs in any consulting engagement with entity being audited. 5) Auditor may not have any cases pending against its previous auditees, under SEBI’s jurisdiction. iv) System Controls: 1) Further, along with the audit report, Stock Exchanges/Depositories are advised to submit a declaration from the MD/CEO certifying the security & integrity of IT Systems. 2) A proper audit trail for upload/modifications/downloads of KYC data to be maintained Department of Electronics & IT, Ministry of Communication & IT, Government of India. Cyber Forensic & Cyber Fraud Investigation  Cyber forensics is one of the latest scientific techniques that have emerged due to the effect of increasing computer frauds.  Cyber, means on ‘The Net’ that is online.  Forensics is a scientific method of investigation & analysis techniques to gather, process, interpret & to use evidence in court of law.  ‘Cyber Investigation’ is an investigation method gathering digital evidences to be produced in court of law.  Court rulings & amendments to cyber laws now permit courts to rely upon digital evidences.  To ensure that the above objectives are achieved, the experts of the fields use standard processes & globally accept methods.  There is an increasing demand for experts in the field of cyber forensics.  IT Act u/s 43A & Sec 65 to 67B lists various types of cyber-crimes & specifies penalty for them. Security Standards  Information security is essential in the day-to-day operations of enterprises. Breaches in information security can lead to a substantial impact within the enterprise through, E.g. financial or operational damages.  Ever-increasing need for the enterprise to implement security is highlighted here: a) Maintain information risk at an acceptable level & to protect information against unauthorised disclosure, unauthorised or modifications. b) Ensure that services & systems are continuously available to internal & external stakeholders, leading to user satisfaction with IT engagement & services; c) Comply with the growing No. of relevant laws & regulations & internal policies on information & provide transparency on the level of compliance. d) Achieve all of the above while containing the cost of IT services & technology protection.  Government of India recently published the National Cyber Security Policy 2013 with the --  Vision: “To build a secure & resilient cyberspace for citizens, business & Government”  Mission: “To protect information & information infrastructure in cyberspace, build capabilities to prevent & respond to cyber threats, reduce vulnerabilities & minimize damage from cyber incidents through a combination of institutional structures, people processes, technology & cooperation”. www.akpune.com © Compiled By: Akshay R Yadav 63 88881 44446 98817 51563

 Major objectives of this policy are given as follows: (May 2017) 1) To create a secure cyber ecosystem in the country, generate adequate trust & confidence in IT systems. 2) To create an assurance framework for design of security policies. 3) To strengthen the Regulatory framework for ensuring a Secure Cyberspace ecosystem. 4) To enhance & create National & Sectorial level 24*7 mechanisms for obtaining strategic information. 5) To enhance the protection & resilience of Nation’s critical information infrastructure by operating a 24x7 National Critical Information Infrastructure Protection Center (NCIIPC). 6) ICT products/processes in general & specifically for addressing National Security requirements. 7) To improve visibility of the integrity of Information & Communication Technology products & services. 8) To create a workforce of 500,000 professional skilled in cyber security in the next 5 years. 9) To provide fiscal benefits to businesses for adoption of standard security practices & processes. 10) To enable protection of information while in process, handling, storage & transit. 11) To enable effective prevention, investigation & prosecution of cybercrime. 12) To develop effective public private partnerships & collaborative engagements. 13) To enhance global cooperation by promoting shared understanding & leveraging relationships. A) ISO 27001: (M17, MTP)  Information security is not just about anti-virus software, implementing the latest firewall or locking down the laptops or web servers  ISO/IEC 27001 defines how to organize information security in any kind of organization, profit or non- profit, private or state-owned, small or large.  It is safe to say that this standard is the foundation of Information Security Management. ISO 27001 is for information security; the same thing that ISO 9001 is for quality – i  It is a standard written by the world’s best experts in the field of information security & aims to provide a methodology for the implementation of information security in an organization.  It also enables an organization to get certified, which means that an independent certification body has confirmed that information security has been implemented in the best possible way in the organization.  How the standard works? ISO 27001 requires that management: i) Systematically examines the organization's information security risks, taking account of the threats, vulnerabilities, & impacts; ii) Designs & implements a coherent & comprehensive suite of information security controls &/or other forms of risk treatment to address those risks that are deemed unacceptable; & iii) Adopts an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis. a) ISO/IEC 27001:2005:  Information Security Management System (ISMS) standard published in October 2005 by ISO/IEC.  Its full name is ISO/IEC 27001:2005 – Information technology – Security techniques – Information Security Management Systems – Requirements.  It was superseded, in 2013, by ISO/IEC 27001:2013.  Plan-Do-Check-Act (PDCA) cycle: 1) The Plan Phase (Establishing the ISMS): This phase serves to plan the basic organization of information security, set objectives for information security & choose appropriate security controls. 2) The Do Phase (Implementing & Working of ISMS): This phase includes carrying out everything that was planned during the previous phase. 3) The Check Phase (Monitoring & Review of the ISMS): The purpose of this phase is to monitor the functioning of ISMS through various “channels”, & check whether the results meet the set objectives. 4) The Act Phase (Update & Improvement of the ISMS): The purpose of this phase is to improve everything that was identified as non-compliant in the previous phase. Cycle of these four phases never ends, & all the activities must be implemented cyclically in order to keep the ISMS effective. www.akpune.com © Compiled By: Akshay R Yadav 64 88881 44446 98817 51563

b) ISO/IEC 27001:2013  It is the first revision of ISO/IEC 27001 that specifies the requirements for establishing, implementing, maintaining & continually improving an ISMS.  It also includes requirements for the assessment & treatment of information security risks.  Requirements set out in ISO/IEC 27001:2013 are generic & are intended to be applicable to all org.  ISO 27001:2013 does not put so much emphasis on PDCA cycle.  Changes from the 2005 standard: 1) New standard puts more emphasis on measuring & evaluating how well an org.’s ISMS is performing. 2) There is a new section on outsourcing, which reflects the fact that many organizations rely on third parties to provide some aspects of IT. 3) It does not emphasize the PDCA cycle that 27001:2005 did. 4) Other continuous improvement processes like Six Sigma's DMAIC method can be implemented.  A couple of the major changes to the standard are: a) Annex A has been revised & restructured; there are now 114 controls under 14 categories rather than the previous 133 controls under 11 categories. b) Plan-Do-Check-Act Cycle (PDCA) is no longer mandated.  Benefits of ISO 27001: 1) It can act as the extension of the current quality system to include security. 2) It provides an opportunity to identify & manage risks to key information & systems assets. 3) Provides confidence & assurance to trading partners & clients; acts as a marketing tool. 4) Allows an independent review & assurance to you on information security practices.  Reasons for adopting ISO 27001: (PM, M18) 1) It is suitable for protecting critical & sensitive information. 2) It provides a holistic, risk-based approach (RBA) to secure information & compliance. 3) Demonstrates credibility, trust, satisfaction & confidence with stakeholders, partners, citizens & customers. 4) Demonstrates security status according to internationally accepted criteria. 5) Creates a market differentiation due to prestige, image & external goodwill. 6) If a company is certified once, it is accepted globally. B) Standard on Auditing (SA) 402: (MTP-N16)  (SA) 402 is a revised version of the erstwhile Auditing & Assurance Standard (AAS) 24, \"Audit Considerations Relating to Entities Using Service Organizations\" issued by the ICAI.  Revised Standard deals with the user auditor's responsibility to obtain SAAE when a user entity uses the services of one or more service organizations.  SA 402 also deals with the aspects like obtaining an understanding of the services provided by a service organization, including internal control, responding to the assessed risks of material misstatement, Type 1 & Type 2 reports, fraud, non-compliance with laws & regulations & uncorrected misstatements in relation to activities at the service organization & reporting by the user auditor. www.akpune.com © Compiled By: Akshay R Yadav 65 88881 44446 98817 51563

C) Information Technology Infrastructure Library (ITIL):  ITIL is a set of practices for IT Service Management (ITSM) that focuses on aligning IT services with the needs of business.  In its current form (known as ITILv3 & ITIL 2011 edition).  ITIL is published in a series of five core publications, each of which covers an ITSM lifecycle stage. I) Service Strategy: This provides guidance on clarification & prioritization of service provider investments in services. II) Service Design: This provides good-practice guidance on the design of IT services, processes, & other aspects of the service management effort. III) Service Transition: This relates to the delivery of services required by a business into live/operational use, & often encompasses the \"project\" side of IT rather than Business As Usual (BAU). IV) Service Operation: This provides best practice for achieving the delivery of agreed levels of services both to end-users & the customers. V) Continual Service Improvement: This aims to align & realign IT services to changing business needs by identifying & implementing improvements to IT services that support the business processes. Details of the ITIL Framework: I) Service Strategy: (MT: SBI- FD) Service Strategy volume provides guidance on the design, development, & implementation of service management, not only as an organizational capability, but also as a strategic asset. 1) IT Service Generation: IT Service Management (ITSM) refers to the implementation & management of quality information technology services. 2) Service Portfolio Management: IT portfolio management is the application of systematic management to the investments, projects. 3) Financial Management: Financial Management for IT Services’ aim is to give accurate & cost effective stewardship of IT assets & resources used in providing IT Services. 4) Demand Management: It is a planning methodology used to manage & forecast the demand of products & services. 5) Business Relationship Management: It is a formal approach to understanding, defining, & supporting a broad spectrum of inter-business activities. II) Service Design: (N16)  Service Design translates strategic plans & objectives & creates the designs & specifications for execution through service transition & operations.  Service Design volume provides guidance on the design & development of services & service management processes. 1) Service Catalogue Management: It maintains & produces the Service Catalogue & ensures that it contains accurate details, dependencies & interfaces of all services made available to customers. 2) Service Level Management: It provides for continual identification, monitoring & review of the levels of IT services specified in the Service-Level Agreements (SLAs). 3) Availability Management: It targets allow organizations to sustain the IT service-availability to support the business at a justifiable cost. 4) Capacity Management: It supports the optimum & cost-effective provision of IT services by helping organizations match their IT resources to business demands. 5) IT Service Continuity Management (ITSCM): It covers the processes by which plans are put in place & managed to ensure that IT services can recover & continue even after a serious incident occurs. 6) Information Security Management: Basic goal of security management is to ensure adequate information security, which in turn, is to protect information assets against risks. 7) Supplier Management: Purpose of Supplier Management is to obtain value for money from suppliers & contracts. www.akpune.com © Compiled By: Akshay R Yadav 66 88881 44446 98817 51563

III) Service Transition:  Service Transition provides guidance on the service design & implementation ensuring that the service delivers the intended strategy & that it can be operated & maintained effectively. 1) Service Transition Planning & Support: It process ensures the orderly transition of a new or modified service into production, together with necessary adaptations to service Mgt. processes. 2) Change management & Evaluation: This aims to ensure that standardized methods & procedures are used for efficient handling of all changes. 3) Service Asset & Configuration Management: It is primarily focused on maintaining information about Configuration Items required to deliver an IT service, including their relationships. 4) Release & Deployment Management: It is used by the software migration team for platform- independent & automated distribution of software & hardware. 5) Service Validation & Testing: Objective of ITIL Service Validation & Testing is to ensure that deployed Releases. 6) Knowledge Management (KM): It is the process of capturing, developing, sharing, & effectively using organisational knowledge. IV) Service Operation:  Service Operation provides guidance on the mgt. of a service through its day-to-day production life.  It also provides guidance on supporting operations by means of new models & architectures such as shared services, utility computing, web services, & mobile commerce. 1) Functions: The major functions are as follows: a) Service Desk: It is 1 of 4 ITIL functions & is primarily associated with the Service Operation lifecycle stage. b) Application management: ITIL application management encompasses a set of best practices proposed to improve the overall quality of IT software development. c) IT Operations: IT Operations primarily work from documented processes & procedures. d) IT Technical Support: IT technical support provides a number of specialist functions: research & evaluation, market intelligence, proof of concept & pilot engineering. 2) Incident Management: Incident management aims to restore normal service operation as quickly as possible & minimize the adverse effect on business operations. 3) Request fulfillment: Request fulfillment focuses on fulfilling Service Requests. 4) Access Management: It is a process that focuses on granting authorized users the right to use a service, while preventing access to non-authorized users. 5) Event Management: Event management generates & detects notifications, while monitoring checks the status of components even when no events are occurring. 6) Problem Management: Problem management aims to resolve the root causes of incidents & thus to minimize the adverse impact of incidents caused by errors within the IT infrastructure. V) Continual Service Improvement:  It provides guidance on the measurement of service performance through service life-cycle, suggesting improvements to ensure that a service delivers the maximum benefit. www.akpune.com © Compiled By: Akshay R Yadav 67 88881 44446 98817 51563

www.akpune.com Compiled By: Akshay R Yadav


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook