• Home
  • Download
    • CA Final Certified Copies
    • CA IPCC Certified Copies
    • Notes
    • Institutes
      • CA
      • CS
      • CMA
  • Social
    • Facebook
    • Twitter
    • YouTube
    • Instagram
    • Google+
  • Subjects
    • INDEX
    • CA Final ISCA
      • Chapter 1
      • Chapter 2
      • Chapter 3
      • Chapter 4
      • Chapter 5
      • Chapter 6
      • Chapter 7
      • Chapter 8
    • CA FINAL AUDIT
  • Jobs/Updates
    • Job Updates
    • Mnemonics Request
    • Announcements
  • GST
  • Direct TAX
  • Exam Tips
  • Contact Us
CAdoErs Handwritten

The Mnemonics blog! **{CA Final ISCA Classes with Mnemonics}** CA Final Online Classes, CA IPCC Online Classes; CA/CS/CMA Notes, Lectures, Classes & Learning Methods

Welcome to Random Mnemonics post

(please comment down below for On request Mnemonics)

Chapter 3 


POIS
Protection of Information Systems




#3.11 Financial Controls

Heading points:

  • Authorization: This entails obtaining the authority to perform some act typically accessing to such assets as accounting or application entries. 
  • Budgets: These estimates of the amount of time or money expected to be spent during a particular period, project, or event. The budget alone is not an effective control. Budgets must be compared with the actual performance, Including isolating differences and researching them for a cause and possible resolution. 
  • Cancellation of documents: This marks a document in such a way to prevent its reuse. This is a typical control over invoices marking them with a "paid" or "processed" stamp or punching a hole in the document. 
  • Dual control: This entails having two people simultaneously access an asset. For example, the depositories of banks' 24-hour teller machines should be accessed and emptied with two people present, many people confuse dual control with dual access, but these are distinct and different. Dual access divides the access function between two people: once access IS achieved, only one person handles the asset. With teller- machines, for example, two tellers would open the depository vault door together, but only one would retrieve the deposit envelopes. 
  • Input/ output verification: This entails comparing the information provided by a computer system to the input documents. This is an expensive control that tends to be over-recommended by auditors. It is usually aimed at such non-monetary by dollar totals and item counts. 
  • Safekeeping: This entails physically securing assets, such as computer disks, under lock and key, in a desk drawer, file cabinet storeroom, or vault. 
  • Sequentially numbered documents: These are working documents with preprinted sequential numbers, which enables the detection of missing documents 

Mnemonics:

Chanda Kochhar vala: Chanda Kochhar ICICI bank ki MD, CEO hai उनका Financial Control बहुत अच्छा है।  


Background: Bank मे जैसे काम होता है Cash deposit/withdrawal, counting etc

Chanda kochhar Authorize करती है: AUTHORIZATION
हर आने जाने वाली transaction को : INPUT/OUTPUT VERIFICATION
Slip (pay-in, withdrawal) को safely रखने के लिए बोलै हुआ है सबको : SAFEKEEPING
जो slips cancel भी होती है उनको भी safe रखने को बोलै हुआ है : CANCELLATION OF DOCS
जब Month end होता है तो Sequentially Number डालते है slips पे: SEQUENTIALLY NO. DOCS
सारे CASH का Budget बनाते है फिर: BUDGETS
जिससे DUAL Control लग सके।: DUAL CONTROL   

Mnemonic Video:



S
H
A
R
E
Newer Posts Older Posts Home

Search this blog

ABOUT AUTHOR

Chartered Accountant, Blogger, Musician & Student. Get in touch with email id's mentioned or just Comment. ;)

Followers

Subscribe to our YouTube Channel

About Us

CAdoErsHandwrirren
View my complete profile

LATEST POSTS

  • CA FINAL ISCA | CHAPTER 8 | EMERGING TECHNOLOGIES (FULL) | Memory Technique
  • CA FINAL ISCA | CHAPTER 5 | ADIS | WATERFALL MODEL | MNEMONICS
  • CA FINAL ISCA | CHAPTER 1 (part #1) | MNEMONICS | MEMORY TECHNIQUE
  • CA FINAL ISCA | CH-5 | ADIS | PROTOTYPING MODEL | MNEMONICS
  • CA FINAL ISCA | CH-5 | ADIS | INCREMENTAL MODEL | MNEMONICS

Tips & Tricks for NOV 17

Featured Post

MNEMONICS | Memory Technique for CH-5 (ADIS) System Development Models

CA FINAL | ISCA | CHAPTER 5 {ADIS} ACQUISITION, DEVELOPMENT & IMPLEMENTATION OF INFORMATION SYSTEMS In this post we are ...

Powered by Blogger.

Blog Archive

  • May 2018 (1)
  • October 2017 (11)
  • September 2017 (16)
  • August 2017 (2)

Labels

  • ADIS (1)
  • AGILE MODEL (1)
  • Amendment (1)
  • AUDIT (1)
  • BCP/DRP (4)
  • CA FINAL/IPCC NOTES (1)
  • CARO (1)
  • Classification of IS Controls (1)
  • COBIT 5 (1)
  • Components of BCM process (3)
  • Exam Tips/Tricks (1)
  • GST (1)
  • Incremental Model (1)
  • irda (1)
  • ISCA Chapter 1 (4)
  • ISCA Chapter 2 (1)
  • ISCA Chapter 3 (4)
  • ISCA Chapter 4 (5)
  • ISCA Chapter 5 (8)
  • ISCA Chapter 6 (2)
  • ISCA Chapter 7 (2)
  • ISCA Chapter 8 (1)
  • IT Act (1)
  • ITIL (1)
  • Objective of Controls (1)
  • POIS (1)
  • Prototyping Model (1)
  • RAD Model (1)
  • SPIRAL MODEL (1)
  • System Development Models Mnenonics technique (1)
  • Waterfall Model (1)

FOLLOW US @ INSTAGRAM

Latest Posts

  • CA FINAL ISCA | CHAPTER 8 | EMERGING TECHNOLOGIES (FULL) | Memory Technique
  • CA FINAL ISCA | CHAPTER 5 | ADIS | WATERFALL MODEL | MNEMONICS

Like us on Facebook

  • About Us
  • Disclaimer
  • Privacy Policy

Follow Us

The Mnemonics Blog! This blog is specially designed for CA students to help them in ISCA subject with the help of Mnemonics. Along with that other subjects will also be covered eventually. CA Final/IPCC Online Classes will be provided through the medium of Youtube at our Official channel @CAdoers Handwritten

Copyright © 2017 CAdoErs Handwritten . Designed by OddThemes