Systems Analysis and Design 9th Edition

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Symantec 2010 Windows 7 Migration Global Results.
Requirements Engineering Processes – 2
Chapter 5 Transfer of Training
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Chapter 10 Organizing Information Technology Resources
1
Operations Management Maintenance and Reliability Chapter 17
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Myra Shields Training Manager Introduction to OvidSP.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
Objectives To introduce software project management and to describe its distinctive characteristics To discuss project planning and the planning process.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
Custom Services and Training Provider Details Chapter 4.
Modern Systems Analyst and as a Project Manager
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Site Safety Plans PFN ME 35B.
Systems Analysis and Design 8th Edition
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Chapter 6 Data Design.
Legacy Systems Older software systems that remain vital to an organisation.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
Last Planner ® National Capital Region Community of Practice Victor Sanvido – Southland Industries Matt Bruening – Southland Industries 1.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
GEtServices Services Training For Suppliers Requests/Proposals.
Systems Operation and Support
Systems Analysis and Design in a Changing World, Fifth Edition
Systems Operation and Support
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Essential Cell Biology
James A. Senn’s Information Technology, 3rd Edition
Management: Arab World Edition Robbins, Coulter, Sidani, Jamali
Database Administration
© Prentice Hall CHAPTER 15 Managing the IS Function.
PSSA Preparation.
Copyright © 2002 by The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Systems Analysis & Design Sixth Edition Systems Analysis & Design Sixth Edition Chapter 10.
Chapter 10 Systems Operation, Support, and Security
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Introduction to Systems Analysis and Design
Systems Analysis and Design 10th Edition
Prof. Mohammad Moizuddin
Systems Analysis & Design 7 th Edition Systems Analysis & Design 7 th Edition Chapter 11.
CHAPTER 9 System maintenance
CHAPTER 12 SECURING AND SUPPORTING THE SYSTEM
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 13 Post-Implementation Training.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 Systems Analysis & Design 7 th Edition Topic 9.
Systems Analysis & Design 7 th Edition Systems Analysis & Design 7 th Edition Chapter 11.
SYSTEMS ANALYSIS & DESIGN
Introduction.
CHAPTER 9 System maintenance
Presentation transcript:

Systems Analysis and Design 9th Edition Chapter 12 Managing Systems Support and Security

Phase Description Systems Operation, Support, and Security is the final phase in the systems development life cycle You will support and maintain the system, handle security issues, protect the integrity of the system and its data, and be alert to any signs of obsolescence The deliverable for this phase is an operational system that is properly maintained, supported, and secured

Chapter Objectives Explain the systems support and security phase Describe user support activities, including user training and help desks Define the four types of maintenance Explain various techniques for managing systems maintenance and support

Chapter Objectives Describe techniques for measuring, managing, and planning system performance Explain risk management concepts Assess system security at six levels: physical security, network security, application security, file security, user security, and procedural security

Chapter Objectives Describe backup and disaster recovery List factors indicating that a system has reached the end of its useful life Assess future challenges and opportunities for IT professionals Develop a strategic plan for career advancement and strong IT credentials

Introduction Managing systems support and security involves three main concerns: user expectations, system performance, and security requirements Successful, robust systems often need the most support In most organizations, more than half of all IT department effort goes into supporting existing systems

Overview The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life After delivering the system, the IT team focuses on support and maintenance tasks

User Support User Training Additionally, new employees must be trained on the company’s information systems User training package Training users about system changes is similar to initial training Objective is to show users how the system can help them perform their jobs

User Support Help Desks Enhance productivity and improve utilization of a company’s information resources The help desk is a central contact point for all IT maintenance activities Can utilize many types of automated support

User Support Outsourcing Issues Offshore call centers can trim expenses and free up valuable human resources for product development Critical factors might include phone wait times, support staff performance, and online support tools

Maintenance Tasks

Maintenance Tasks Corrective Maintenance Diagnoses and corrects errors in an operational system Respond to errors in various ways, depending on nature Worst-case situation is a system failure When the system is operational again, the maintenance team determines the cause, analyzes the problem, and designs a permanent solution

Maintenance Tasks Adaptive Maintenance Adds enhancements to an operational system and makes the system easier to use The procedure for minor adaptive maintenance is similar to routine corrective maintenance Can be more difficult than new systems development because the enhancements must work within the constraints of an existing system

Maintenance Tasks Perfective Maintenance Involves changing an operational system to make it more efficient, reliable and maintainable Cost-effective during the middle of the system’s operational life Programs that need a large number of maintenance changes usually are good candidates for reengineering The more a program changes, the more likely it is to become inefficient and difficult to maintain

Maintenance Tasks Preventive Maintenance Requires analysis of areas where trouble is likely to occur IT department normally initiates preventive maintenance Often results in increased user satisfaction, decreased downtime, and reduced TCO Sometimes does not receive the high priority that it deserves

Maintenance Management The Maintenance Team System administrator Systems analysts Programmers Organizational issues

Maintenance Management Maintenance Requests Involve a series of steps All work must be covered by a specific request Initial determination The systems review committee Task completion User notification

Maintenance Management Establishing Priorities In many companies, systems review committee separates maintenance requests from new systems development requests Some IT managers believe that evaluating all projects together leads to the best possible decisions Object is to have a procedure that balances new development and necessary maintenance work

Maintenance Management Configuration Management As enterprise-wide information systems grow more complex, configuration management becomes critical Also helps to organize and handle documentation

Maintenance Management Maintenance Releases A numbering pattern distinguishes the different releases Reduces the documentation burden Service packs Version Control Archived Essential part of system documentation

Maintenance Management Baselines Systems analysts use baselines as yardsticks to document features and performance during the systems development process Functional baseline Allocated baseline Product baseline

System Performance Management Fault Management The more complex the system, the more difficult it can be to analyze symptoms and isolate a cause The best strategy is to prevent problems by monitoring system performance and workload

System Performance Management Performance and Workload Measurement Benchmark testing Metrics Response time Bandwidth and throughput Kbps (kilobits per second) Mbps (megabits per second) Gbps (gigabits per second)

System Performance Management Performance and Workload Measurement Turnaround time The IT department often measures response time, bandwidth, throughput, and turnaround time to evaluate system performance both before and after changes to the system or business information requirements Management uses current performance and workload data as input for the capacity planning process

System Performance Management Capacity Planning What-if analysis Need detailed information Need an accurate forecast of future business activities Should develop contingency plans based on input from users and management

System Performance Management System Maintenance Tools Many CASE tools include system evaluation and maintenance features In addition to CASE tools, you also can use spreadsheet and presentation software to calculate trends, perform what-if analyses, and create attractive charts and graphs to display the results

System Security Overview Security is a vital part of every computer system System Security Concepts CIA triangle Integrity Availability Security policy

System Security Overview Risk Management Absolute security is not a realistic goal Risk identification - exploit Risk assessment - risk Risk control Avoidance, mitigation, transference, acceptance

System Security Overview Attacker Profiles and Attacks An attack might be launched by a disgruntled employee, or a hacker who is 10,000 miles away Attackers break into a system to cause damage, steal information, or gain recognition, among other reasons

Security Levels Must consider six separate but interrelated levels Physical Security First level of security concerns the physical environment Physical access to a computer represents an entry point into the system and must be controlled and protected

Security Levels Physical Security Operations center security Servers and desktop computers Notebook computers

Security Levels Network Security Network Network interface Encrypted Encrypting network traffic

Security Levels Network Security Wireless networks Private networks Virtual private networks Ports and services Firewalls

Security Levels Application Security Services Hardening Application permissions Input validation Patches and updates Software Logs

Security Levels File Security Permissions User Groups Read a file Write a file Execute a file Read a directory Write a directory User Groups

Security Levels User Security Privilege escalation attack Identity management Password protection Social engineering

Security Levels User Security Procedural Security User resistance New technologies Security token Procedural Security Operational security Dumpster diving Paper shredders

Backup and Disaster Recovery Backup Policies Backup policy Backup media Rotation schedule Offsiting Backup Types Retention periods

Backup and Disaster Recovery Backup Policies

Backup and Disaster Recovery Business Continuity Issues Test plan Business continuity plan (BCP) Hot site Data replication

System Obsolescence At some point every system becomes obsolete Systems operation and support continues until a replacement system is installed At some point in a system’s operational life, maintenance costs start to increase, users begin to ask for more features and capability, new systems requests are submitted, and the SDLC begins again

Future Challenges and Opportunities Predictions The highest priorities will be the safety and security of corporate operations, environmental concerns, and bottom-line TCO Gartner, Inc. is a leading IT consulting firm that is famous for forecasting industry trends Author Randall Stross notes that the enormous amount of energy needed to drive cloud computing, including Google’s servers, has raised serious environmental concerns

Future Challenges and Opportunities Strategic planning for IT professionals Working backwards from your long-term goals, you can develop intermediate mile stones and begin to manage your career just as you would manage an IT project Planning a career is not unlike planting a tree that takes several years to reach a certain height

Future Challenges and Opportunities IT Credentials and Certification Credentials Certification In addition to Microsoft, many other IT industry leaders offer certification, including Cisco, Novell, Oracle, and Sun Microsystems

Future Challenges and Opportunities Critical Thinking Skills Soft skills Certiport, Inc. and the Educational Testing Service (ETS) introduced the iCritical Thinking certification exam Individual and team-based exercises can strengthen critical thinking skills

Chapter Summary Systems support and security covers the entire period from the implementation of an information system until the system no longer is used A systems analyst’s primary involvement with an operational system is to manage and solve user support requests Systems analysts need the same talents and abilities for maintenance work as they use when developing a new system Security is a vital part of every computer system

Chapter Summary All information systems eventually become obsolete An IT professional should have a strategic career plan that includes long-term goals and intermediate milestones An important element of a personal strategic plan is the acquisition of IT credentials and certifications that document specific knowledge and skills Chapter 12 complete