User talk:Manojpurandare

Welcome!

Hello,, and welcome to Wikipedia! I hope you like the place and decide to stay.

There's a page about creating articles you may want to read called Your first article. If you are stuck, and looking for help, please come to the New contributors' help page, where experienced Wikipedians can answer any queries you have! Or, you can just type   on this page, and someone will show up shortly to answer your questions. Here are a few other good links for newcomers: I hope you enjoy editing here and being a Wikipedian! Please sign your name on talk pages using four tildes ( ~ ); this will automatically produce your name and the date. If you have any questions, check out Where to ask a question or ask me on. Again, welcome!--Mishae (talk) 03:57, 16 September 2013 (UTC)
 * Your first article
 * Biographies of living persons
 * How to write a great article
 * The five pillars of Wikipedia
 * Help pages
 * Tutorial

Manoj Purandare
MANOJ PURANDARE

Manoj Yashwant Purandare has created this Manoj Purandare User Page named and searched as " https://en.wikipedia.org/wiki/User:Manojpurandare "

as a Symbol of work done by him in his Life towards his Social Involvement in the various Fields like Computer, IT, Internet, Email, Rotary Club, Police, Cyber Security, Cyber Crime Investigation, IT Security, CISSP, and many such and similar areas.

This will be an ongoing updating area as and when Author finds something suitable for All to Add here and may naturally be verified by Concerned Authorities as per the Rules & Regulations herein defined by Wikipedia.

There may be multiple Manoj Purandare's in the world. But this page specially created and will be edited by Manoj Yashwant Purandare, from Dombivli, who is Computer / IT / IT Security Specialist and socially involved with various organisations related and topics discussed as like Computer, IT, Internet, Email, Rotary Club, Police, Cyber Security, Cyber Crime Investigation, IT Security, CISSP, and many such and similar areas.

Users are hereby made aware, alert, knowledgeable, about not to duplicate, copy, transfer, modify, delete any letter, number, character, line, paragraph, page of information herein which can be copyrighted further once the complete information is ready. This information will be the intellectual property and patent of Manoj Yashwant Purandare, please make a note of it.

Manoj Purandare is specially interested to work for the downtrodden or poor people in the World for helping them knowledge wise to guide / assist them in the field of : Computer, Information Technology, IT Audits, Internet, Email, Rotary Club, Police, Cyber Security, Cyber Crime Investigation, IT & IT Security related, CISSP, Multi categorial Updated Information about Mumbai, Maharashtra, India and many such and similar areas.

He take keen interest in understanding and updating himself on :

- Important Information about Information Technology Controls in case of IT Audits.

- http://en.wikipedia.org/wiki/Information_technology_controls This link has latest information about Information Technology Controls.

- IT General Controls (ITGC)[edit]

- ITGC represent the foundation of the IT control structure. They help ensure the reliability of data generated by IT systems and support the assertion that systems operate as intended and that output is reliable. ITGC usually include the following types of controls:

- Control environment, or those controls designed to shape the corporate culture or "tone at the top."

- Change management procedures - controls designed to ensure changes meet business requirements and are authorized.

- Source code/document version control procedures - controls designed to protect the integrity of program code

- Software development life cycle standards - controls designed to ensure IT projects are effectively managed.

- Logical access policies, standards and processes - controls designed to manage access based on business need.

- Incident management policies and procedures - controls designed to address operational processing errors.

- Problem management policies and procedures - controls designed to identify and address the root cause of incidents.

- Technical support policies and procedures - policies to help users perform more efficiently and report problems.

- Hardware/software configuration, installation, testing, management standards, policies and procedures.

- Disaster recovery/backup and recovery procedures, to enable continued processing despite adverse conditions.

- Physical security - controls to ensure the physical security of information technology from individuals and from environmental risks.

- Police a Human Being, smart enough to catch the culprit, his limitations, views, issues, what he needs from society, etc.

- Ethics in usage of Internet, Email, Social Media, Social Sites, Information shared and forwarded in Public / Private.

- Idea of Living, and helping others to live in this Competitive World.

- World is not a Race, But you need to updated yourself every time. You cannot take anything once you Die. Nothing is yours, so share it with others.

- Giving is Living, taking is to give back once done. Why not Share for the needy ?