Вы находитесь на странице: 1из 3

Information Technology - Knowledge Level

1. Information Within Organization


SL Content Reference
1.1 Information for management and reporting
The significance of information as a key resource within the
organization
Nature and type of Information
The distinction between information and data
Operating, managerial strategic levels in the organization
Decision and information needs at different organizational
levels
Information system between organizations (electronic data
interchange, wide area networks, Internet)
Information system within an organization (network,
Internet)
The role IT plays in financial reporting system and other
information systems

2. Information Technology Architecture


SL Content Reference
2.1 General systems concepts
Nature and types of systems
Information system architectures (components and
relationships)
Control and feedback in systems
System development life cycle
Types of business systems
2.2 Physical and hardware components of a system
Processing units
Input/Output devices
Data communication devices
Physical storage devices
2.3 Software
Component of a software configuration
Operating systems
Communication systems
Security software
Utility software
Programming aid interactive Programming software
Library management systems
Data management systems
General application software
Accounting packages
E- Business enabling software:
e-business systems(ERP,CRM and other business
automation systems), electronic commerce features (B2C
and B2B models, encryption tools, digital signatures /
certificates, key management)
2.4 Protocols, standards, enabling technologies
Common standards
Internal protocol
Standard setting organizations
2.5 Transaction processing in typical business and
accounting applications
Processing phases (data capture, edit routines, master file
maintenance, outputs, reporting, accounting)
Processing modes (batch, online, real-time, distributed)
Business documents, accounting records, databases
Management and control of application processing
Queries ad-hoc reports
Audit trail
2.6 Data organization and access methods
Data structures and file methods
Access methods
Types of data files
Database management systems features, functions,
architectures
Database administration
Documentation management
2.7 IT professionals and career paths in IT organizations
Job functions
Recruiting/Developing IT human resources
Organization

3. Management of IT
SL Content Reference
3.1 IT organization
IT policies, procedures and methodologies
IT human resources policies
3.2 Management of IT operations, effectiveness and
efficiency
Human resources management process used to maintain
organizational efficiencies
Relationship of infrastructure to applications and user
requirements
Monitoring service provider activities
3.3 Asset management
Asset lifecycle
Asset management and control
3.4 Change control and problem management
Segregation of environments
Change control techniques
Problem management
Management of end user computing
3.5 Security management
Facilities
Physical security
Logical security
3.6 Performance monitoring and financial control over IT
resources
Performance metrics
IT cost control
IT control objective
3.7 Software for personal use
Office software
3.8 Software for professional use
Office software
Computer-assisted audit techniques (CAAT)

4. Communication and IT
SL Content Reference
4.1 The benefits and risks of IT in relation to communication
General means of communication supported by IT
Risk in communication supported by IT
Benefits of IT to communication
4.2 Network and electronic data communication
Network communication, configuration and designs

5. Internal Control in Computer-Based Business


SL Content Reference
5.1 Internal IT control environment
IT risk management approach
IT risk tolerance
IT oversight
Integrity, ethical values, and competence of the IT personal
Authority and responsibility, organization and development
5.2 Setting IT objectives
It strategic objectives
IT control objectives
Overlap of IT objectives
Selection of IT objectives
5.3 Identifying IT risk events
IT risk factor
IT event identification techniques
5.4 Conducting IT risk assessments
IT risk categories
Assessment techniques
5.5 Establishing an IT risk response
Response categories
Possible responses
5.6 Conducting IT control activities
IT control framework
IT control objectives
Types of control activities
Control over information
Communication
5.7 Information and communication in relation to IT
Information
Communication
5.8 Monitoring in relation to IT
Ongoing monitoring activities
Separate evaluation

Вам также может понравиться