ISA 3.0 MODULE – 4 INFORMATION SYSTEMS OPERATIONS AND MANAGEMENT

preview_player
Показать описание
@InformationSystemsAudit @DISA @ICAI @ISA 3.0
The video features important concepts and their explanation from ISA 3.0 Exams point of view related to the 4th module that deals with INFORMATION SYSTEM OPERATIONS and MANAGEMENT
I hope viewers find this useful.
Kindly don't forget to LIKE and SUBSCRIBE my channel.
Thank You
#isa, #disa, #cisa, #ca, #icai, #audit, #auditing, #isaudits,
Рекомендации по теме
Комментарии
Автор

If you like the session then please share

cavinodkrsharma
Автор

can you plz upload remaining topics left out in all modules..your explanation of the topics is so good made us so easy to understand..plz sir

subscription
Автор

Cleared DISA In July attempt, only CA to crack the exam out of 150CAs appeared from Auranagbad centre, result % 0.0067%.Thanks a lot to you, your lectures made the difference

rohanachalia
Автор

ISA 3.0 MODULE – 4 INFORMATION SYSTEMS OPERATIONS AND MANAGEMENT
CA Vinod Kr Sharma
The Esa examination series consists of four modules: Information System Management, Information Systems Operations, Information Operations and Management. From an exam point of view, you should expect at least four to five questions from this area as the frequency of questions increases from module one to module six. RTO organizations must define policy documents that must be taken care of prior to implementing the system. As an example, in banking operations, both Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are important and they should be near to zero. A low RTO indicates that the organization has a zero tolerance for disasters, thus mirror imaging or real-time replication for data backup is highly recommended.

Maintaining your digital assets requires a backup or alternative arrangement to recall data in case of a disaster or system crash. Mirror sites are a type of backup that maintains an image or mirror copy of the data, allowing services to be resumed immediately and efficiently. Warm sites are services that can be started quickly with additional IT applications and updated data, while cold sites require availability of applications and updated backups before services can be resumed. Mobile sites are processing facilities mounted on vehicles, ready to be delivered.

Mirror sites are a proper option for critical systems, depending upon how critical the system is. Mirror sites offer the fastest mode of recovery, while cold sites offer the slowest mode of recovery, as only the infrastructure is available and there are no applications or data backups. Reciprocal arrangements are the lowest expenditure in terms of recovery arrangements. Attention attenuation, or attenuation as it is also known, is weakening of the signal due to interference and crosstalk. Unshielded twisted pairs have more attenuation than shielded ones. Alternate routing and diverse routing are techniques used to transfer information from one place to another using alternative mediums, such as copper cable or fiber optics. Electromagnetic interferences are caused by electrical storms, noisy electrical equipment and other sources.

The Open System Interface (OSI) Connection Model is a conceptual framework which describes the functions of a network system. It consists of seven layers, five of which are used for communication, such as Loop and Long Haul for long distance availability. At the OSI physical layer, a repeater is used to receive and transmit signals to strengthen the speed and extend the network. Switches and routers are intelligent devices that can make decisions based on the IP address to direct the packet to its destination. Full backups are more time consuming and require more storage capacity than incremental backups, which require less time and storage capacity since only data changes since the last full backup are taken into account. Differential backups are slower than incremental ones.

Network penetration testing is an effective way to identify real-time risks to an information processing environment. Before the test is conducted, the isolator must inform the authorities and seek permission. This thread intelligence helps organizations protect themselves from attacks. This module 4 has been summarized in the best possible way and soon module 5 and 6, along with practice questions and explanations, will be released. I apologize for my quickness in completing this video as it had the potential to go beyond its expected length. I hope this information is useful.

cavinodkrsharma
Автор

sir for module 5 and 6 also your video required.

vijayalakshmiponnuswamy
Автор

Can you add MCQs also via separate video ???

rohanachalia
Автор

hi sir your vedeos are very very nice and useful for fast preparation of DISA exam... Please share your videos for module 5 and 6....

vijayalakshmiponnuswamy