Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge Statements (Knowledge of)... 2 Relationship between Task and Knowledge Statements... 3 Knowledge Statement Guide... 4 1
Section 1 SECTION 1: OVERVIEW PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING Objective Objective: Demonstrate understanding of functioning of key components of existing and emerging information Technologies and their practical deployment. Task Statements 1.1 Identify deployment of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. 1.2 Recognise the configuration of hardware, operating system software, database management software and application software. 1.3 Recognise function of Telecommunications and Network security including wireless, encryption, firewalls, Cryptography etc. 1.4 Analyze baseline security procedures, firewall configurations, user administration and user management. 1.5 Distinguish the technology architecture of a typical data centre in a centralised environment identifying different layers/components of technology and their functions. Knowledge Statements (Knowledge of) 1.1 Information Technology components of Information Systems Infrastructure and related processes in the context of practical deployment in enterprises. 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. 1.3 Configuration management of hardware, system software, database management software and application software. 2
Module 1: e- Learning 1.4 Telecommunications and Network security including wireless, encryption, firewalls, Cryptography etc. 1.5 Concepts related to applied cryptography, including plain-text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.6 Baseline security procedures, firewall configurations, user administration and user management. 1.7 Information Technology components of a Data Centre in centralised environment Relationship between Task and Knowledge Statements The task statements are what the ISA Candidate is expected to know how to perform. The knowledge statements delineate each of the areas in which is ISA candidate must have a good understanding in order to perform the tasks. The task and knowledge statements are mapped in the chart below. Note that although there is often overlap, each task statement will generally map to several knowledge statements. Task Statement 1.1 Identify deployment of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. 1.2 Recognize the configuration of hardware, operating system software, database management software and application software. Knowledge Statement 1.1 Information Technology components of Information Systems infrastructure & related processes in the context of practical deployment in enterprises. 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. 1.3 Configuration management of hardware, operating system software, database management software and application software. 3
Section 1 1.3 Recognize function of Telecommunications and network security including wireless, encryption, firewalls, cryptography etc. 1.4 Telecommunications and network security including wireless, encryption, firewalls, cryptography etc. 1.5 Concepts related to applied cryptography, including plain-text, ciphertext, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.4 Analyze baseline security procedures, firewall configurations, user administration & user management 1.5 Distinguish the technology architecture of a typical data centre in a centralised environment identifying different layers/components of technology & their functions. 1.6 Baseline security procedures, firewall configurations, user administration & user management 1.7 Information technology components of a Data centre in centralised environment. Knowledge Statement Guide Each knowledge statement is explained in terms of underlying concepts and relevance of the knowledge statement to the ISA Candidate. It is essential that the candidate understand the concepts. The knowledge statements are what the IS Auditor must know in order to accomplish the tasks. Consequently, only the knowledge statements are detailed in this section. The sections identified in the matrices are described in greater detail in the forthcoming part of this module. 1.1 Information Technology components of Information Systems infrastructure & related processes in the context of practical deployment in enterprises. Information Technology components, Information Systems infrastructure & related processes Chapter1, Part 1: 1.1 to 1.4 4
Module 1: e- Learning 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. Components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories. Chapter1: Part 1 to 3 1.3 Configuration management of hardware, operating system software, database management software and application software Configuration management of hardware, operating system software, database management software and application software Chapter1: 2 to 4 1.4 Telecommunications and Network security including wireless, encryption, firewalls, cryptography etc. Telecommunications and Network security, Chapter 3, Part 1 to 3 wireless, encryption, firewalls and cryptography. 1.5 Concepts related to applied cryptography, including plain-text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. Applied cryptography, plain-text, cipher-text, Chapter 3, Part 1 to 3 symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.6 Baseline security procedures, firewall configurations, user administration and user management. 5
Section 1 Baseline security procedures, firewall configurations, user administration and user management. Chapter 3, Part 2 to 3 1.7 Information Technology components of a Data Centre in centralised environment IT components of a data centre in CBS environment Chapter 1, Part 4, topic 4.3 6