ca vivek panwar’s “eis/it ch.1. bpm & it...ca vivek panwar’s “eis/it -sm” classes...
TRANSCRIPT
CA VIVEK PANWAR’S “EIS/IT-SM” CLASSES CH.1. BPM & IT
1.1 INTRODUCTION
1.2 OVERVIEW OF
BUSINESS PROCESS: What is Process? What is Business Process? Business Process Flow: A. Accounting B. Sales (OTC/ O2C) C. Purchase (P2P) D. Finance
FUNCTIONAL V/S
PROCESS ORGn
1.3 CLASSIFICATION OF BUSINESS
PROCESSES: Different levels identified in
BPM: Business Strategy Goals Organizational Business Processes Operational Business Processes Implemented Business Processes
1.4 BPM
Definition 3 BPM Principles 8 BPM Practices BPM Life Cycles
1.5 THEORIES OF PROCESS
MANAGEMENT
1. SIX SIGMA Meaning, Life Cycle Phases
2. TQM Meaning 4 Categories
3. BPR Meaning BPR Success Factors
1.6 BPM IMPLEMENTATION
Key Factors to consider in Implementing BPM Need for BPM Implementation BPA: Benefits & Risks Challenges in Implementing BPA BPM Technology Value Chain Automation
1.7 AIS (Accounting Information System)
Meaning Basic Functions of AIS Processing Cycle of Accounts BPM Financing Cycle, Revenue Cycle, Expenditure Cycle, Human Resource Cycle, Production Cycle General Ledger & Reporting System Data Processing Cycle
1.8 IMPACT OF IT & RISK OF FAILURE OF IT
Benefits of BPMS Business Risks of Failure of IT Information as a Business Asset
1.9 APPROACHES TO MAPPING SYSTEMS
Reasons why Documentation is Imp to Information Systems Pictorial representation or techniques for mapping business processes: 1. E-R DIAGRAM 2. DATA FLOW DIAGRAM 3. FLOWCHART 4. DECISION TREE 5. DECISION TABLE
FOR ADDITIONAL INFORMATION: CALL/WHATSAPP: 90295-84074; 98209-88423; Email: [email protected] FACEBOOK/INSTAGRAM: CA VIVEK PANWAR
CA VIVEK PANWAR’S “EIS/IT -SM” CLASSES CH.2. IS & IT FUNDAMENTALS
2.1 INTRODUCTION
2.2 NEED FOR IT: NEED FOR IT COMMUNICATION CAPABILITIES DATA & INFORMATION MGT
2.3 IMP. OF IT IN AUDITING
IMP OF IT IN AUDITING AUDIT IN IT
ENVIRONMENT AUDIT OBJECTIVES IN IT
ENVIRONMENT DIFFERENCES IN AUDIT
PROCEDURES IT RISKS & ISSUES NEED FOR CONTROL IN
INFO.SYSTEM AWARENESS REQUIRED
BY AUDITOR FOR AUDITING IN IT ENVIRONMENT
IMPACT OF IT on Risks & Controls
KEY CONCERNS of Auditors in Relation to Controls in Info System
2.4 OVERVIEW OF BPA
IT PROCESSES INVOLVED IN TYPICAL BUSINESS ENTERPRISE 3 CRITICAL PILLARS OF BPA
2.5 OVERVIEW OF COMPUTING
5 SUB-DISCIPLINES OF COMPUTING FIELD
2.6.3: EMERGING COMPUTING MODELS
1. CLOUD COMPUTING (Meaning, Environment,
Architecture, Service Models)
2. MOBILE COMPUTING (Meaning, Components,
Business Applications, Mobile Computing Concerns)
2.7 IS LAYERS
2.7.1 APPLICATION LAYER (TYPES, BENEFITS, DISADV.)
2.7.2 HARDWARE (Input Devices, Processing
Devices, Data Storage Devices, Output Devices)
2.7.3 SYSTEM SOFTWARE Activities executed by O.S 2.7.4 NETWORK LINKS 2 TYPES OF NETWORK NETWORK MODELLED TO ADDRESS WHICH BASIC ISSUES? IMP. BENEFITS OF COMPUTER NETWORK
2.7.5 DBMS SHORT NOTE PROMINENT DATABASE MODELS 1. HIERARCHICAL
MODEL 2. NETWORK MODEL 3. RELATIONAL MODEL 4. OBJECT ORIENTED
MODEL
2.6 SERVER 2.6.1: SERVER Meaning, Types
2.6.2 : 3 MAIN SUB- CATEGORIES OF COMPUTING ARCHITECTURE
1. INSTRUCTION ARCHITECTURE
(FIXED V/S VARIABLE LENGTH INSTRUCTIONS,
CISC V/S RISC) 2. MICRO ARCHITECTURE 3. SYSTEM DESIGN
2.8 INFO. SYSTEM LIFE CYCLE/ SDLC
SHORT NOTE PHASES: 1. INVESTIGATION 2. ANALYSIS 3. DESIGNING 4. IMPLEMENTATION 5. MAINTENANCE &
REVIEW
2.9 RECENT TECHLOGIES/ DEVICES
BLUETOOTH, WI-FI, LAPTOP-NOTEBOOK, TABLET, SMARTPHONE, TOUCHPAD, IPAD, IPOD, ANDROID
FOR ADDITIONAL INFORMATION: CALL/WHATSAPP: 90295-84074; 98209-88423; Email: [email protected] FACEBOOK/INSTAGRAM: CA VIVEK PANWAR
CA VIVEK PANWAR’S “EIS/IT-SM” CLASSES: “IPCC IT” CH.3. TELECOMMUNICATION & NETWORKS
3.1 INTRODUCTION
3.2 NETWORKING AN
ENTERPRISE:
3.3 TRENDS IN TELE-COMMUNICATION
FOR ADDITIONAL INFORMATION: CALL/WHATSAPP: 90295-84074; 98209-88423; EMAIL: [email protected] FACEBOOK/INSTAGRAM: CA VIVEK PANWAR
INDUSTRY TRENDS TECHNOLOGY TRENDS BUSINESS APPLICATION TRENDS
3.4 BUSINESS VALUE OF TELECOMMUNICATION
Strategic Capabilities of Tele-Communication & Other IT include: 1. Overcome Geographic
Barriers 2. Overcome Time Barriers 3. Overcome Cost Barriers 4. Overcome Structural Barriers
3.5 TELE-COMMUNICATION NETWORK
1. TELECOMMUNICATION
NETWORK (MEANING, ADV. OF
COMPUTER NETWORK) 2. TELE-COMMUNICATION
NETWORK MODEL 5 BASIC CATEGORIES OF
COMPONENTS i. TERMINALS ii. TELE-COMM. PROCESSOR a) NIC b) MODEM, c) MULTIPLEXER, d) INTER-NETWORK
PROCESSORS (Switch, Bridge, Router,
Gateway, Hub, Repeater) iii. TELE-COMM. MEDIA (GUIDED MEDIA , UNGUIDED
MEDIA) iv. COMPUTERS v. TELE-COMM. CONTROL S/W
3.6 CLASSIFICATION OF TELECOMMUNICATION
NETWORK
1. AREA BASED LAN MAN WAN
2. FUNCTIONAL BASED: [A] Client/Server
Networking Client (Thick, Thin,
Hybrid) Server Working of C/S Characteristics of C/S Issues in C/S [B] P2P NETWORKING [C] MULTI-TIER
ARCHITECTURE Single Tier Two Tier Three Tier/ N-Tier
3. OWNERSHIP BASED Public Data network Private Data Network Virtual Private Network
3.7 NETWORK COMPUTING
Meaning, Features 2 Basic Models of Network Computing Centralized Computing Decentralized Computing
3.7.1 NETWORK
TOPOLOGY Meaning Of Topology, Types STAR RING BUS MESH (Meaning, Adv, Disadv) 3.7.2 DIGITAL DATA TRANSMISSION Parallel v/s Serial Asynchronous V/S Synchronous TRANSMISSION MODE (Simplex, Half-Duplex, Full-Duplex)
CA VIVEK PANWAR’S “EIS/IT-SM” CLASSES: “IPCC IT” CH.3. TELECOMMUNICATION & NETWORKS
FOR ADDITIONAL INFORMATION: CALL/WHATSAPP: 90295-84074; 98209-88423; Email: [email protected] FACEBOOK/INSTAGRAM: CA VIVEK PANWAR
• VULNERABILITY (Meaning, Factors Responsible) • LEVEL OF SECURITY (8 STEPS OF SECURITY
PROGRAM) KEY ASPECTS OF
NETWORK SECURITY 1. PRIVACY (Cryptography,
Encryption, 2 categories of Encryption & Decryption Methods, 2 Basic Approaches to Encryption)
2. AUTHENTICATION 3. INTEGRITY 4. NON-REPUDIATION NETWORK SECURITY
PROTOCOLS (SSH, SFTP, HTTPS, SSL) NETWORK SECURITY
TECHNIQUES i. IDS (NID, HID, HYBRID) ii. Firewall iii. N.A.C iv. Anti-Malware v. Site Blocking
3.8 NETWORK RISKS, CONTROL, SECURITY
3.9 NETWORK ADMINISTRATION & MGT Meaning of Network
MGT. Common Way of
Characterizing Network Mgt Function (FCAPS)
3.10 INTERNET REVOLUTION
Example of Business Value of E-Business Application
Meaning of: Internet, Intranet, Extranet
Internet Architecture Internet Applications How Internet can be
used as effective media for various applications?
Business Use of Internet
Intranet (Business Value,
Communication, Web Publishing, Operations & MGT)
• Extranet (Business Value, Five Rules
of Extranet) • Information System &
Telecommunication 3.11 ELECTRONIC COMMERCE
TRANSMISSION TECHNIQUES 1. BROAD-CAST NETWORKS 2. SWITCHED NETWORK CIRCUIT SWITCHING PACKET SWITCHING
MESSAGE SWITCHING) NETWORK ARCHITECTURES PROTOCOLS (Meaning, Levels, 3 Aspects
of Digital Communication)
OSI MODEL (7 Layers) INTERNET TCP/IP (5 Layers)
Basic Objective for Providing Network Security
2 Types of System Security
(Physical, Logical) • THREATS (Meaning; Themes)
• Meaning • Benefits of E-
Commerce Application & Implementation
• Risks involved in E-Commerce
• Types of E-Commerce • Key Aspects to be
considered in implementing E-commerce
3.12 MOBILE COMMERCE • Meaning/ Short Note
3.13 ELECTRONIC FUND TRANSFER
• Meaning • Examples of EFT
Systems
CA VIVEK PANWAR “EIS/IT-SM” CLASSES “IPCC IT” CH.5. “BPA THROUGH APPLICATION S/W”
1.1 INTRODUCTION
5.2 CLASSIFICATION OF BUSINESS APPs
Apps Based on Nature of Processing (Batch, Online, Real time) Apps Based on Source of App (Custom Built, Packaged, Leased) Apps based on Size & Complexity of Business (SME, Large Business) Apps Based on Nature of App [Industry Specific App, Compliance App, Accounting App. OMS, MSS, ERP S/W, Product Life Cycle Mgt S/S, Logistics Mgt S/W, CRM S/W, Legal MGT S/w]
5.3 BPA
Definition Objectives Steps for implementation of BPA [Case 1: Automation of P.O Generation. Case 2: Automation of Employee Attendance] Apps that help Entity to achieve BPA Benefits of BPA (Ch.1) Risks associated with BPA (Ch.1) 3 Critical Pillars of BPA (Ch.5)
5.5 DELIVERY CHANNEL
Meaning Delivery Channel for Information Delivery Channel for Products How to choose Information Delivery Channel How to Choose Product Delivery Channel
5.6 CONTROLS
MEANING OF CONTROL OBJECTIVES OF CONTROL MANAGERIAL CONTROL 1. TOP MGT CONTROL 2. S.D.MGT CONTROL 3. PROGRAMMING MGT. C. 4. DATA RESOURCE MGT. C. 5. QUALITY ASSURANCE MGT.C. 6. SECURITY MGT.C. 7. OPERATIONS MGT.C.
• APPLICATIONS CONTROL 1. BOUNDARY CONTROL 2. INPUT CONTROL 3. COMMUNICATION
CONTROL 4. PROCESSING CONTROL 5. OUTPUT CONTROL 6. DATABASE CONTROL
5.7 EMERGING TECHNOLOGUES
1. VIRTUALIZATION (MEANING, TYPES, MAJOR
APPLICATIONS) 2. GRID COMPUTING (MEANING, BENEFITS, TYPES
OF RESOURCES, USING GRID, SECURITY, APPLICATION AREAS)
3. CLOUD COMPUTING (MEANING, ENVIRONMENT,
MODEL, ARCHITECTURE, CHARACTERISTICS, ADV, DISADVANTAGES)
FOR ADDITIONAL INFORMATION: CALL/WHATSAPP: 90295-84074; 98209-88423; Email: [email protected] FACEBOOK/INSTAGRAM: CA VIVEK PANWAR
5.4 INFORMATION PROCESSING
Meaning Classification of Information: 1. Manual Info. Processing
Cycle 2. Computerized Info.
Processing Cycle