Describe the use of technology in the financial-information management function.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Distributed Data Processing
Internet, Intranet and Extranets
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Chapter 17 Controls and Security Measures
02/12/00 E-Business Architecture
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Chapter 7 IT Infrastructures Business-Driven Technology
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
E-Business: Intra-Business E-Commerce
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Computer Networks IGCSE ICT Section 4.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
The Internetworked E-Business Enterprise
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
What is Enterprise Architecture?
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2007 by Prentice Hall 1 Introduction to databases.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
IB ITGS Case Study. Introduction: Serving thousands of clients, it is method of environment-friendly green ticketing. User friendly system which minimizes.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Information Systems Security
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
1. What is desktop publishing software used for? 2.
Information Security What is Information Security?
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Chapter2 Networking Fundamentals
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Project Management May 30th, Team Members Name Project Role Gint of Communications Sai
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Introduction TO Network Administration
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Windows Small Business Server 2003 R2 Powering Small Businesses.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Foundations of Information Systems in Business
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Onsite CRM Security
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
IS4550 Security Policies and Implementation
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Networks Lesson 1.
Technology Department Annual Update
Database management systems
Presentation transcript:

Describe the use of technology in the financial-information management function

Introduction Have you ever looked at an older house and noted how it’s had extensions added that don’t fit the original house? Whether it’s the pattern of the windows, the exterior surface or the shape of the extension that does not match you can tell it’s just not right and makes the whole structure look bad. Inside the house, the switch and outlet layout in the new rooms are different and the plumbing does not work as well as it did before. The air conditioning doesn’t get the house as cool and even the foundation of the house is cracking because the new and old sections are settling differently.

The use of technology in the financial- information management function One way financial services firms can improve their operational efficiency is to revamp their data management infrastructure. Creating a central repository for data that is used by multiple applications can ensure data consistency and quality across the enterprise, ease integration bottlenecks, and lower the number of failed trades

The use of technology in the financial- information management function However, different applications have different database usage patterns. To satisfy them all, any central data repository must: Support a large number of transactions with high performance Provide fast response to queries, using up-to-date information Provide reliable, scalable persistence for data Be easily accessible by several applications

Master data management Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to one file, called a master file, that provides a common point of reference. When properly done, MDM streamlines data sharing among personnel and departments. In addition, MDM can facilitate computing in multiple system architectures, platforms and applications.

Principle of least authority The principle of least privilege (POLP) is the practice of limiting access to the minimal level that will allow normal functioning. Applied to employees, the principle of least privilege translates to giving people the lowest level of user rights that they can have and still do their jobs

Single platform database With software it’s easier to disguise the exterior differences by adding a new user interface to all applications to make them look like one. However it’s infinitely harder to match up the structural elements of the applications and make them work like one especially if the platforms vary. The truth is no matter how good a development team is and how much time and money you spend on it, no two applications can ever be joined together in a way that allows them to operate as well as a single code, single platform application that was developed by one software firm. It would be like Rembrandt trying to finish a painting half completed by Picasso – no matter how great the artist, the result won’t be as good

Central data repository a central data repository would interface with many systems, including applications that handle risk management, performance measurement, accounting and trading, as well as reference data and corporate action services. In addition, the central repository should provide a fast response to queries from analysts, data integrity users and compliance users. To control costs and maintain smooth operations, many firms will want to take a gradual, modular approach to changing their data management infrastructure

Technological safeguards that are used to ensure the security of financial information Firewalls - A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets intrusion detection systems - is a device or software applicationthat monitors network or system activities for malicious activities or policy violations and produces reports to a management station Encryption- Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it. For example, if you purchase something from a website, the information for the transaction (such as your address, phone number, and credit card number) is usually encrypted to help keep it safe. Use encryption when you want a strong level of protection for your information

Technology used to archive financial records Microfilm - a length of film containing microphotographs of a newspaper, catalog, or other document. Digital images - Any image from a scanner, or from a digital camera, or in a computer, is a digital image. Computer images have been "digitized", a process which converts the real world color picture to instead be numeric computer data consisting of rows and columns of millions of color samples measured from the original image Electronic text -

Your employer is interested in updating and acquiring more effective financial-information management technology. Each team needs to develop and give a oral presentation and slide show that details the specific pieces/types of financial-information management technology that the team recommends for its company.