CA SPOM Set-D Paper-4 Concept Compilation
CA SPOM Set-D Paper-4 Concept Compilation
SET- D ; PAPER - 4 :
DIGITAL ECOSYSTEM
AND CONTROLS
CONCEPT COMPILATION
BY,
JEEVAHK. H
Chapter 1: Governance and Management of Digital
Ecosystem
Key Concepts:
2. Enterprise Governance
Key Concepts:
3. IT Governance
Page 1 of 4
Key Concepts:
GEIT is a framework that ensures IT-related decisions are aligned with the
enterprise's strategies and objectives. It focuses on creating value from IT
investments while managing risks.
Key Practices:
IT strategy must align with business strategy to ensure that IT investments support
the organization's goals. This involves integrating IT planning with business planning
and ensuring that IT systems enable business processes.
Key Concepts:
Several frameworks support effective IT governance, including COBIT, ITIL, and ISO
27001.
Page 2 of 4
COBIT (Control Objectives for Information and Related Technologies):
ISO 27001:
7. Key Takeaways
Governance ensures that IT systems align with business goals and deliver
value.
Enterprise Governance balances compliance (corporate governance) with
performance (business governance).
IT Governance focuses on aligning IT with business objectives and managing
IT-related risks.
Frameworks like COBIT, ITIL, and ISO 27001 provide structured approaches
to IT governance and management.
Page 3 of 4
Test Your Knowledge
Page 4 of 4
Chapter 2: Governance, Risk, and Compliance (GRC)
Framework
GRC Tools
GRC tools are software applications that help organizations manage policies, assess
risks, control user access, and streamline compliance processes. These tools provide
features like:
2. Risk Fundamentals
Risk is the potential harm caused when a threat exploits a vulnerability to damage an
asset. The relationship between Risk, Threat, and Vulnerability is defined as:
Risk=Threat×Vulnerability
Key Terms:
Page 1 of 5
Threat: Any entity or event that can cause harm to an asset (e.g., hackers,
natural disasters).
Types of Threats:
Risk management involves identifying, assessing, and mitigating risks. The 4T's of
Risk Management are:
1. Transfer/Share the Risk: Handing off the risk to a third party (e.g.,
outsourcing, purchasing insurance).
2. Tolerate/Accept the Risk: Accepting the risk if the cost of mitigation is too
high (e.g., minor risks).
3. Terminate/Eliminate the Risk: Avoiding the risk altogether by stopping the
activity that causes it (e.g., discontinuing a risky project).
4. Treat/Mitigate the Risk: Implementing controls to reduce the risk (e.g.,
firewalls, backups).
4. Malicious Attacks
Page 2 of 5
Man-in-the-Middle Attacks: Intercepting communication between two
parties.
Infecting Programs:
Virus: Attaches itself to a program and spreads when the program runs.
Worm: Self-replicating malware that spreads across networks.
Hiding Programs:
Trojan Horse: Masquerades as a useful program but contains malicious code.
Spyware: Gathers information about users without their knowledge.
Rootkit: Hides malicious activity by modifying system files.
6. Countermeasures
7. Internal Controls
1. Control Environment: Sets the tone for the organization’s internal control
(e.g., ethical values, management’s commitment to control).
2. Risk Assessment: Identifying and analyzing risks to achieve objectives.
3. Control Activities: Policies and procedures to mitigate risks (e.g., approvals,
reconciliations).
4. Information and Communication: Ensuring relevant information is
communicated effectively.
Page 3 of 5
5. Monitoring: Ongoing evaluation of internal controls to ensure they are
functioning properly.
8. Compliance
9. Key Takeaways
Page 4 of 5
o c) To encrypt sensitive data
o d) To monitor employee activity
Answer: b) To regulate traffic between networks
Page 5 of 5
Chapter 3: Enterprise Risk Management Framework
What is ERM?
Example:
Think of a sports club trying to maximize game attendance. The club must
manage risks related to ticket sales, parking, catering, and even weather
conditions. ERM helps the club identify these risks and implement strategies
to mitigate them.
1. Control Environment:
oSets the tone for how risk is viewed and addressed in the organization.
o Includes the organization’s culture, ethical values, and risk appetite.
2. Objective Setting:
oObjectives must be clear, measurable, and aligned with the
organization’s mission and risk appetite.
o Example: A company might set a goal to increase revenue by 10% while
staying within its risk tolerance.
3. Event Identification:
o Identifying potential risks (and opportunities) that could impact the
organization.
o Example: A tech company might identify the risk of a new competitor
entering the market.
Page 1 of 5
4. Risk Assessment:
o Analyzing the likelihood and impact of identified risks.
o Example: Assessing the financial impact of a data breach.
5. Risk Response:
o Deciding how to handle risks (avoid, mitigate, transfer, or accept).
o Example: A company might decide to purchase insurance to transfer
the risk of a natural disaster.
6. Control Activities:
o Implementing policies and procedures to manage risks.
o Example: Establishing cybersecurity protocols to protect against data
breaches.
7. Information and Communication:
oEnsuring relevant risk information is shared across the organization.
o Example: Regular risk reports to the board of directors.
8. Monitoring:
o Continuously monitoring the ERM process and making adjustments as
needed.
o Example: Regularly reviewing risk management policies to ensure they
are effective.
3. Benefits of ERM
Aligns risk appetite with strategy: Ensures that the organization takes risks
that are in line with its goals.
Enhances risk response decisions: Provides a structured approach to
managing risks.
Minimizes surprises and losses: Helps organizations anticipate and prepare
for potential risks.
Identifies and manages cross-enterprise risks: Looks at risks across the
entire organization, not just in silos.
Seizes opportunities: By considering a full range of events, ERM helps
organizations identify opportunities for growth.
Page 2 of 5
4. The COSO ERM Cube
The COSO ERM Cube is a visual representation of how the 8 components of ERM
interact with the organization’s objectives and units. It has three dimensions:
Example:
A company might use the COSO ERM Cube to ensure that its risk
management processes are aligned with its strategic goals (e.g., expanding
into new markets) and are implemented across all departments (e.g.,
marketing, finance, operations).
The PIML (Plan, Implement, Measure, Learn) approach is a continuous cycle for
implementing ERM:
1. Plan:
Identify the benefits of ERM.
o
o Establish the ERM strategy and framework.
o Determine risk appetite and tolerance.
2. Implement:
Adopt risk assessment tools.
o
o Establish benchmarks and evaluate existing controls.
3. Measure:
o Monitor risk performance.
o Measure the contribution of ERM to the organization.
4. Learn:
o Evaluate the effectiveness of controls.
o Embed a risk-aware culture in the organization.
Page 3 of 5
6. Case Study: Kodak
Kodak failed to adapt to the digital revolution, despite being aware of the
risks.
The company’s leadership chose to focus on its traditional film business rather
than investing in digital technology.
Lesson: Organizations must continuously assess and respond to disruptive
technologies and market changes.
7. Key Takeaways
Page 4 of 5
9. Practical Application
Scenario: You are the risk manager for a retail company. How would you use ERM to
manage the risks associated with expanding into a new market?
1. Identify Risks:
o Market competition, regulatory changes, supply chain disruptions.
2. Assess Risks:
o Likelihood and impact of each risk.
3. Develop Risk Responses:
oMitigate supply chain risks by diversifying suppliers.
o Transfer regulatory risks by purchasing insurance.
4. Monitor and Review:
o Continuously monitor market conditions and adjust strategies as
needed.
10. Summary
Page 5 of 5
Chapter 4 : Information System Security Policy
Example: A company uses an IS to manage customer data. The system takes input
(customer details), processes it (calculates sales trends), and produces output
(reports for managers).
With the rise of technology, organizations rely heavily on Information Systems (IS) for
their operations. However, this reliance makes them vulnerable to security threats.
Page 1 of 6
3. Information System Security
Example: A company uses firewalls to block hackers from accessing its internal
network and encrypts sensitive customer data to prevent theft.
The CIA Triad is a model used to guide information security policies. It consists of
three principles:
Page 2 of 6
Key Components of an Information Security Policy:
o Purpose and Scope: Defines what the policy covers and who it applies
to.
o Roles and Responsibilities: Specifies who is responsible for
implementing and maintaining security measures.
o Incident Response: Outlines steps to take in case of a security breach.
o Compliance Requirements: Ensures the organization follows legal and
regulatory standards.
Example: A company’s Information Security Policy might state that all employees
must use strong passwords and that sensitive data must be encrypted.
Page 3 of 6
8. Monitoring Information Security
Regular monitoring ensures that security measures are effective and up-to-date.
Example: A company conducts regular audits to ensure that its firewall rules are up-
to-date and that employees are following password policies.
9. Case Studies
The document provides two case studies (Case A and Case B) to illustrate the
importance of information security policies and practices.
Page 4 of 6
Test Your Knowledge
Let’s go through the multiple-choice questions (MCQs) at the end of the chapter to
reinforce your understanding:
Page 5 of 6
5. Which Information System Security Policy sets out the responsibilities
and requirements for all IT system users?
o (a) Acceptable Usage Policy
o (b) User Security Policy
o (c) Network & System Security Policy
o (d) Information Classification Policy
Summary
Information Systems are critical for modern businesses, but they need to be
protected from various threats.
The CIA Triad (Confidentiality, Integrity, Availability) is the foundation of
information security.
Information Security Policies provide a framework for protecting
information assets.
Regular monitoring and training are essential to maintain effective security.
Page 6 of 6
Chapter 5: Business Continuity Planning and Disaster
Recovery Planning
Page 1 of 4
Key Components:
o Backup Strategies: Regular backups of data and systems to ensure
data can be restored.
o Alternate Processing Facilities: Options like hot sites, cold sites, and
warm sites for temporary operations during a disaster.
o Recovery Procedures: Steps to restore systems, data, and operations
to normalcy.
4. Types of Plans
5. Types of Backups
Full Backup: Copies all data and files. It is time-consuming but ensures
complete recovery.
Incremental Backup: Copies only the data that has changed since the last
backup. It is faster but requires all backups (full + incremental) for recovery.
Differential Backup: Copies data that has changed since the last full backup.
It is faster than a full backup but slower than incremental.
Mirror Backup: Creates an exact copy of the source data. If a file is deleted
from the source, it is also deleted from the mirror backup.
Cloud Backup: Stores data in the cloud, providing off-site redundancy and
easy access.
Cold Site: A facility with basic infrastructure (e.g., power, cooling) but no pre-
installed systems. It is cost-effective but takes time to set up.
Hot Site: A fully operational facility with all necessary systems and data. It
allows for immediate recovery but is expensive.
Page 2 of 4
Warm Site: A partially equipped facility that offers a balance between cost
and recovery time.
Reciprocal Agreement: An agreement between organizations to share
resources in case of a disaster.
9. BCM Cycle
The Business Continuity Management (BCM) process involves the following stages:
Page 3 of 4
5. Training and Awareness: Train employees and stakeholders on BCM
procedures.
10. Summary
Key Takeaways
Page 4 of 4
Chapter 6:_Information Systems Life Cycle
1. What is SDLC?
The SDLC consists of several phases, each with specific activities and deliverables.
Here are the main phases:
1. Preliminary Investigation
Objective: To understand the needs of the users and define the requirements
for the new system.
Activities:
o Fact-Finding: Gather information through interviews, questionnaires,
and observations.
o Analysis of Current System: Identify problems and areas for
improvement.
o System Specification: Document the requirements in a System
Requirements Specification (SRS) document.
Deliverable: SRS document.
Page 1 of 4
3. System Designing
4. System Development
5. System Testing
6. System Implementation
Page 2 of 4
7. Post-Implementation Review and Maintenance
Feasibility Study
System Testing
Testing is crucial to ensure the system works as intended. The main types of
testing are:
o Unit Testing: Tests individual components.
o Integration Testing: Tests how components work together.
o System Testing: Tests the entire system.
o Acceptance Testing: Ensures the system meets user requirements.
Changeover Strategies
Page 3 of 4
System Maintenance
4. Importance of SDLC
5. Key Takeaways
Page 4 of 4
Chapter 7: System Acquisition and Development
Methodologies
2. System Acquisition
System acquisition refers to the process of acquiring hardware, software, and services
needed to develop or enhance an information system. Key steps include:
A. Acquisition Standards
Security and Reliability: Ensure that the acquired systems meet security and
reliability standards.
Vendor and Contract Reviews: Managers must review vendor contracts and
licenses.
Request for Proposal (RFP): A formal document sent to vendors to solicit
bids for hardware or software.
Page 1 of 4
C. Validation of Vendor Proposals
Final Acceptance: Ensure the system meets all requirements before final
deployment.
Page 2 of 4
4. System Development Methodologies
System development methodologies provide a structured approach to developing information systems. Here are the key
methodologies:
Page 3 of 4
Methodology Description Phases/Key Features Strengths Weaknesses
- Faster delivery of
systems. - May lead to
Rapid Application Focuses on rapid prototyping Rapid prototyping, iterative
- High user inconsistent designs.
Development and iterative development with development, user
involvement ensures - Requires strong
(RAD) Model active user involvement. involvement.
better alignment with commitment from users.
business needs.
- Requires experienced
An iterative and incremental Iterative development, - Highly adaptable to
teams.
approach that emphasizes collaboration, customer changing requirements.
Agile Model - Lack of documentation
collaboration, customer feedback, continuous - Promotes continuous
can be a challenge for
feedback, and rapid delivery. improvement. improvement.
future maintenance.
Page 4 of 4
Chapter 8: Information Systems’ Control
2. Classification of Controls
Controls can be classified based on different criteria. The document discusses four
main classification criteria:
Page 1 of 4
3. Corrective Controls: Designed to correct errors or incidents after they have
been detected.
o Examples: Corrective journal entries, system reboots, business
continuity plans.
o Advantages: Reactive, simple, and cost-effective.
o Disadvantages: May cause disagreements during implementation.
Page 2 of 4
o Examples: Top management controls, systems development controls,
data resource management controls.
2. Application Control Framework: Focuses on controls within specific
applications to ensure data integrity and accuracy.
o Examples: Input controls, processing controls, output controls,
database controls, communication controls, boundary controls.
1. General Controls: Apply to all systems across the organization and are not
specific to any application.
o Examples: Information security policies, backup and recovery
procedures, change management.
2. Application Controls: Specific to individual applications and ensure data
integrity, accuracy, and completeness.
o Examples: Input validation, processing controls, output controls.
3. Physical Controls: Protect physical assets like servers, data centers, and office
spaces.
o Examples: Access control systems, CCTV monitoring, security guards.
Auditors play a critical role in ensuring that controls are effectively implemented and
functioning as intended. The document outlines the following key areas auditors
focus on:
Page 3 of 4
4. Key Takeaways
Page 4 of 4
Chapter 9: Information Technology Tools
Learning Outcomes
Key Concepts
Page 1 of 5
2. Information Systems Audit (ISA)
1. Scoping and Pre-Audit Survey: Identify the areas to be audited and gather
background information.
2. Planning and Preparation: Develop an audit plan and risk-control matrix.
3. Fieldwork: Collect evidence through interviews, document reviews, and
observations.
4. Analysis: Analyze the evidence using techniques like SWOT or PEST analysis.
5. Reporting: Present findings to management and discuss observations.
6. Closure: Follow up on management actions and prepare notes for future
audits.
IT tools are used to automate and enhance the audit process. Some common tools
include:
Microsoft Excel: Used for data analysis, sampling, and creating graphs.
Microsoft Access: Used for querying data files and creating reports.
SAP Audit Management: Helps in documenting evidence and creating audit
reports.
Page 2 of 5
5. Computer-Assisted Audit Techniques (CAATs)
CAATs are tools that help auditors automate the audit process. They are used to:
Integrated Test Facility (ITF): A dummy entity is created in the system to test
transactions without affecting real data.
Test Data: Valid and invalid transactions are processed to test the system's
controls.
Parallel Simulation: A copy of the system is run in parallel to compare results
with the actual system.
Embedded Audit Module (EAM): A module is added to the system to
monitor and collect data for analysis.
System Control Audit Review File (SCARF): A file is created to log specific
transactions for review.
Transaction Tagging: Transactions are tagged and tracked through the
system to verify their integrity.
Continuous and Intermittent Simulation (CIS): A technique that simulates
the system's processing in real-time to identify discrepancies.
The chapter discusses several business processes and the associated risks and
controls. Here are a few examples:
Page 3 of 5
b. Order to Cash (O2C)
c. Inventory Cycle
Process: Involves managing current and savings accounts (CASA), loans, and
other banking products.
Risks: Unauthorized credit line setup, inaccurate interest calculations.
Controls: Restrict access to credit limits, automate interest calculations.
Summary
Information Systems (IS) and Information Technology (IT) are critical for
modern businesses.
Information Systems Audit (ISA) ensures the integrity, efficiency, and
effectiveness of IT systems.
IT tools like CAATs, ITF, and SCARF help auditors automate and enhance the
audit process.
Business processes like P2P, O2C, and inventory management have specific
risks that need to be controlled.
Page 4 of 5
Test Your Knowledge
Page 5 of 5
Chapter 10: Digital Data and Analysis
1. Learning Outcomes
Page 1 of 4
2.2 Data Security Tools
Types of Data:
o Internal Data: Data from business transactions (e.g., sales, customer
records).
o External Data: Data from external sources (e.g., market trends,
competitors).
o Marketing Data: Information about customer behavior and
preferences.
o Structural Data: Data used for designing physical infrastructure.
Stages of Data Analysis:
1. Data Requirement and Gathering: Define the purpose of data
collection.
2. Data Collection: Collect relevant data from various sources.
3. Data Cleaning: Remove errors, duplicates, and inconsistencies.
4. Data Analysis: Use techniques like data mining, predictive analytics,
etc.
5. Data Visualization: Present data in charts, graphs, or dashboards for
better understanding.
Page 2 of 4
2.5 Data Assurance
Focuses on data quality and ensures that data is accurate, complete, and
consistent.
Data Governance: Managing data availability, usability, and security.
Data Profiling: Analyzing data to identify quality issues.
Data Matching: Comparing datasets to find duplicates or inconsistencies.
Master Data Management (MDM): Ensuring uniformity and accuracy of
master data.
Key Provisions:
o Legal recognition for electronic transactions and digital signatures.
o Penalties for cybercrimes like hacking, data theft, and privacy violations.
o Section 43A: Compensation for failure to protect sensitive personal
data.
o Section 66: Punishment for computer-related offenses like identity
theft and cyber terrorism.
Highlights:
o Applicability: Applies to digital personal data collected online or
offline in India.
o Consent: Personal data can only be processed with the individual's
consent.
o Rights of Data Principal: Individuals have the right to access, correct,
and erase their data.
o Obligations of Data Fiduciaries: Entities must ensure data accuracy,
security, and notify breaches.
o Penalties: Fines up to ₹250 crore for data breaches or non-compliance.
Principles:
o Lawfulness, Fairness, and Transparency: Data processing must be
lawful and transparent.
o Purpose Limitation: Data should only be collected for specific
purposes.
o Data Minimization: Collect only the necessary data.
o Accuracy: Ensure data is accurate and up-to-date.
o Storage Limitation: Data should not be stored longer than necessary.
o Integrity and Confidentiality: Protect data from unauthorized access.
Page 3 of 4
o Accountability: Organizations must demonstrate compliance with
GDPR.
4. Summary
Key Takeaways
Page 4 of 4
Chapter 11: Business Intelligence
Business Intelligence (BI) is the process of analyzing raw data and turning it into
actionable insights that help organizations make informed decisions. BI tools and
techniques allow businesses to visualize data, identify trends, and improve decision-
making.
Key Goal: To transform data into knowledge that can be used for strategic
decision-making.
Example: A retail company analyzing sales data to identify top-selling
products and improve inventory management.
BI tools are software applications that collect, process, and analyze large amounts of
data from various sources. These tools help organizations visualize data through
reports, dashboards, charts, and graphs.
Popular BI Tools:
Microsoft Power BI: A widely used tool for data visualization and analysis. It
integrates with various data sources like Excel, Facebook, and Oracle.
Tableau: Known for its user-friendly data visualization capabilities, Tableau
helps create interactive dashboards and reports.
QlikSense: A self-service BI tool that allows users to explore data and uncover
insights using AI and cloud platforms.
Sisense: A user-friendly tool that focuses on simplifying data analysis and
reporting.
Centralized Data: BI tools bring all data into one place, making it easier to
analyze.
Agile Decision-Making: Helps organizations make quick, informed decisions.
Automatic Reports: Automates the process of generating reports, saving
time.
Predictive Analytics: Allows businesses to forecast trends and make
predictions based on historical data.
Page 1 of 4
3. BI Life Cycle
4. BI vs Data Analytics
While BI and Data Analytics are related, they serve different purposes:
Page 2 of 4
5. Chart Types in Power BI
1. Line Charts: Used to show trends over time (e.g., monthly sales).
2. Bar Charts: Useful for comparing data across categories (e.g., sales by region).
3. Pie Charts: Show the proportion of different categories in a dataset (e.g.,
product sales distribution).
4. Doughnut Charts: Similar to pie charts but with a hole in the center, used to
show proportions.
5. Funnel Charts: Visualize data that flows through different stages (e.g.,
recruitment process).
7. Key Takeaways
Page 3 of 4
Test Your Knowledge
Page 4 of 4
Chapter 12: Digital Economy
1. FinTech Overview
Lower fees and better rates: FinTech companies often have lower
operational costs, which they pass on to customers.
Convenience: Services are accessible 24/7 through mobile apps.
Innovation: FinTech companies use cutting-edge technology to offer
personalized services.
2. ABCD of FinTech
What is AI? AI refers to machines that can perform tasks that typically require
human intelligence, such as learning, reasoning, and problem-solving.
Applications in FinTech:
o Robo-Advisors: Automated platforms that provide financial advice and
investment management.
o Fraud Detection: AI can analyze transaction patterns to detect
fraudulent activities.
o Customer Service: Chatbots and virtual assistants handle customer
queries 24/7.
Page 1 of 5
B. Blockchain
C. Cloud Computing
D. Big Data
What is Big Data? Extremely large datasets that can be analyzed to reveal
patterns, trends, and insights.
Applications in FinTech:
o Customer Insights: Analyzing customer behavior to offer personalized
financial products.
o Risk Management: Using data to assess and mitigate risks in lending
and investments.
o Fraud Detection: Identifying unusual patterns that may indicate
fraudulent activities.
Page 2 of 5
AI and Machine Learning: These technologies are becoming more affordable
and are being used to improve customer experiences and reduce costs.
4. Benefits of FinTech
5. Challenges in FinTech
Digital Exclusion: Some consumers may lack access to digital tools or the
skills to use them.
Regulatory Issues: FinTech companies may not always offer the same level of
consumer protection as traditional banks.
Security Risks: New technologies can be vulnerable to cyberattacks and
fraud.
Page 3 of 5
Accessibility: Access data and applications from anywhere.
Big Data refers to the massive amounts of data generated by financial transactions,
social media, and other sources. FinTech companies use Big Data to:
8. Blockchain in FinTech
Applications of Blockchain:
Page 4 of 5
9. Artificial Intelligence in FinTech
10. Summary
Page 5 of 5
Chapter 13: Emerging Technologies
1. Digital Payments
What is UPI?
UPI is a system that allows users to link multiple bank accounts to a single
mobile application. It enables instant fund transfers between bank accounts
using a Virtual Payment Address (VPA).
Key Features:
o 24/7 Availability: UPI works round the clock, including holidays.
o Two-Factor Authentication: Uses a combination of device-specific
details (like fingerprint) and a UPI PIN for secure transactions.
o Peer-to-Peer (P2P) and Peer-to-Merchant (P2M)
Transactions: Allows seamless payments between individuals and
businesses.
o No Wallet Linking: UPI only allows bank account transfers, not wallet-
to-wallet transfers.
Example: Ms. Kavita uses her HDFC net banking app to transfer ₹4000 to her
brother instantly using UPI.
What is USSD?
USSD is a mobile-based payment system that doesn’t require an internet
connection or a smartphone. It works on basic feature phones.
Key Features:
o No Internet Required: Users can check balances, send money, and
perform other banking operations using simple codes like *99#.
o Daily Limit: Maximum transfer limit is ₹5000 per day.
Example: A user can check their bank balance by dialing 9946*1#.
What is AEPS?
AEPS allows users to make payments using their Aadhaar number and
biometric authentication. It’s a bank-led model that promotes financial
inclusion.
Page 1 of 6
Key Features:
o Biometric Authentication: Uses fingerprint or iris scan for secure
transactions.
o No Need for Cards or Signatures: Transactions are completed using
Aadhaar verification.
o Services Offered: Balance inquiry, cash withdrawal, cash deposit, and
fund transfers.
Example: Ms. Neha uses AEPS to check her bank balance while traveling in
rural areas.
D. Mobile Wallets
What is IMPS?
IMPS is an instant interbank and intra-bank fund transfer service available
24/7. It allows users to transfer money using mobile numbers, MMID, or
account numbers and IFSC codes.
Key Features:
o Instant Transfers: Funds are transferred in real-time.
o Multiple Access Points: Can be accessed via mobile, internet banking,
ATMs, and SMS.
Example: Mr. Kamal transfers money from his salary account in the USA to his
wife’s account in India using IMPS.
Page 2 of 6
F. Bharat Interface for Money (BHIM)
What is BHIM?
BHIM is a mobile app developed by NPCI based on UPI. It allows users to send
and receive money using UPI IDs, QR codes, or account numbers.
Key Features:
oSingle App for Multiple Banks: Supports all Indian banks.
o Scan and Pay: Users can scan QR codes to make payments.
Example: Mr. X uses BHIM to pay for clothes at a showroom.
G. RuPay
What is RuPay?
RuPay is an Indian card payment network that allows users to make payments
at POS terminals and ATMs.
Key Features:
oLow-Cost Transactions: Reduces transaction costs compared to
international card networks.
o Reversal of Transactions: Allows merchants to cancel transactions
before completion.
Example: Mr. Amit uses his RuPay card to buy a mobile phone at a local store.
H. e-RUPI
What is e-RUPI?
e-RUPI is a cashless and contactless digital payment system introduced by the
Government of India. It’s a purpose-specific voucher delivered via QR code or
SMS.
Key Features:
oLeak-Proof: Ensures that benefits reach the intended beneficiaries
directly.
o No Bank Account Required: Beneficiaries don’t need a bank account
to use e-RUPI.
Example: e-RUPI vouchers are used for vaccination purposes.
Credit Cards: Allow users to make purchases on credit, with payment due at
the end of the billing cycle.
Debit Cards: Deduct funds directly from the user’s bank account.
Smart Cards: Prepaid cards with embedded microchips that store user
information.
Page 3 of 6
2. E-Business and Associated Risks
A. Benefits of E-Business
Data Privacy and Security Risks: Hackers can exploit vulnerabilities in the
system.
o Control: Implement strong data privacy policies, two-factor
authentication, and regular system updates.
Unauthorized Access: Unauthorized users may gain access to sensitive data.
o Control: Restrict access to employees and regularly update passwords.
Platform Downtime: Lengthy downtime can impact business operations.
o Control: Choose reliable SaaS providers and reduce dependency on
third-party services.
IoT refers to the interconnection of devices through the internet, enabling them to
collect and exchange data.
Page 4 of 6
B. Challenges in IoT Implementation
4. Quantum Computing
5. RegTech
A. Advantages of RegTech
Page 5 of 6
6. Mobile Computing
Summary
This chapter covers various digital payment methods, e-business risks, and emerging
technologies like IoT, Quantum Computing, RegTech, and Mobile Computing. These
technologies are transforming how businesses operate and interact with customers.
Page 6 of 6