What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.

Slides:



Advertisements
Similar presentations
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Advertisements

IS Network and Telecommunications Risks
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Key.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Key.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Class 5 Computer Software. Outline System Software Application Software (“Applications”) Markup languages for Internet (HTML, XML) User Interface Client-Server.
Chapter 7: Moving into Design Chapter 8: Architecture Design
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 5th Edition Copyright © 2015 John Wiley & Sons, Inc. All rights.
Reasons for New Systems Syarat untuk user tidak terpenuhi / Unfulfilled User Requirements New Technology Competition Tetapi kebanyakan Perencanaan strategik.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
Systems Analysis and Design
Chapter 40 Internet Security.
Systems Analysis and Design in a Changing World, Fifth Edition
BUILD SECURE PRODUCTS AND SERVICES
Chapter 6: Securing the Cloud
Chapter 8 Environments, Alternatives, and Decisions.
WSU IT Risk Assessment Process
TIM 58 Chapter 7: Moving on to Design
Systems Analysis and Design
TIM 58 Chapter 11: Physical Architecture Layer Design
Internet, Intranet and Extranets
The Client/Server Database Environment
Internet, Intranet and Extranets
Roberta Roth, Alan Dennis, and Barbara Haley Wixom
Systems Analysis and Design
Living in a Network Centric World
Living in a Network Centric World
Systems Analysis and Design
System Design Chapter 8 PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights.
Moving into Design Chapter 8.
Software What Is Software?
Physical Architecture Layer Design
Workgroup Technology Partners
Cloud Computing.
Security in Networking
Internet, Intranet and Extranets
Malware, Phishing and Network Policies
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Systems Analysis and Design
Systems analysis and design, 6th edition Dennis, wixom, and roth
Living in a Network Centric World
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems Analysis and Design
Living in a Network Centric World
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Living in a Network Centric World
Living in a Network Centric World
Systems Analysis and Design
Acquisition of Information Technology. Need to acquire technology A manager must be prepared to make what are sometimes risky acquisitions to fashion.
Living in a Network Centric World
Living in a Network Centric World
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Living in a Network Centric World
Unit 1.6 Systems security Lesson 1
Living in a Network Centric World
Presentation transcript:

What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful design builds on what we have learned in analysis and transforms that knowledge into a working system. Design is still planning as the system need not be developed during this phase.

Design Strategies Custom development (build from scratch) Purchase and customize Outsource development

Custom Development PROS CONS Allows flexibility and creativity Builds technical skills and functional knowledge in-house Best ‘fit’ CONS Requires significant time and effort May exacerbate existing backlogs May require missing skills Often costs more Often takes more time Risk of project failure

Packaged Software Include small single-function tools All-encompassing enterprise resource planning (ERP) systems Rarely a perfect fit with business needs May allow for customization Manipulation of system parameters Changing way features work Synchronizing with other application interfaces

Outsourcing Hiring an external vendor, developer, or service provider May reduce costs or add value Risks include possibly Losing confidential information Losing control over future development Losing control over future cost structure Losing learning opportunities

Outsourcing Contracts There are Three types: Time and Arrangement: Pay for what is needed to get job done. Flexible but risk of large bill at the end. Fixed-price Certainty regarding payment but very little flexibility in delivering IS support. ‘You get what you ask for.’ Value-added Outsourcer shares in benefits gained from the system.

Selecting a Design Strategy Consider each of the following: Business need In-house experience Project skills Project management Time frame

Key Definitions The architecture design consists of plans for the hardware, software, communications, security , and global support for the new application The designers must decide if processing will occur in the server (server-based), at the personal computer (client-based), or in some combination of these (client-server based).

Key Definitions The network model shows major components of the system, where they are located and how they will be connected to one another. The hardware and software specifications describe these components in detail and aid those responsible for purchase and acquisition of these products.

Architectures Server based Client based Client-server based thick versus thin client cloud computing

Server-Based Computing (and, essentially, Thin-Client Computing)

Client-Based Computing

Client-Server-Based Computing

Client-Server Attributes Typical Pros Compatible with web-based system design Scaleable Work with multiple vendors/products No central point of failure Typical Cons/Limits Complexity New programming languages and techniques (stress for personnel) More complex to update

Identifying Threats to the System A threat is any potential adverse occurrence that can do harm to the application or its data Threats come from internal as well as external sources Categories of threats Disruptions, destruction and disaster Viruses fall into this category Unauthorized access

Most Common Threats

Creating Controls A control is something that mitigates or stops a threat Controls include redundancy fault tolerant servers disaster recovery plans anti-virus software

Additional Controls Include A security policy ‘Social Engineering’ Passwords and encryption What you have What you know What you are Firewalls wired, wireless controls

Current Threats Malware Delivery Software Updates Banner Ads (‘malvertising’) Downloadable documents Man-in-the-middle Keyloggers

The threat of open WiFi ‘Sidejacking’ packet sniffers intercept traffic between two html parties and steal the session cookie Firesheep is an application that supports this as an extension of the Firefox browser requires Firefox browser use cannot read https sessions Faceniff is a similar application for Android phones and tablets