Develop IT systems for Recruitment Group 5 Shafali---399 Vedangi---389 Sunita-----379 Annie----366 Vivek------ Dominica D-----416.

Slides:



Advertisements
Similar presentations
HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
LA County Fire Department
P5, M1, D1.
1 SOFTWARE TESTING Przygotował: Marcin Lubawski. 2 Testing Process AnalyseDesignMaintainBuildTestInstal Software testing strategies Verification Validation.
Project Management Shuffle Directions: take the definitions from the following cards and write a song using the tune from “Cupid Shuffle”
Getting Started in Systems Analysis and Design
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Auditing Computer Systems
Documentation Testing
Managing the Information Technology Resource Jerry N. Luftman
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
1 Working at Citigroup Janel Damstra, BS in CS Josh Knatz, BS in CS.
7.2 System Development Life Cycle (SDLC)
9 C H A P T E R Transaction Processing and Enterprise Resource Planning Systems.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Introduction to Computer Technology
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
UCONN HCM System Implementation
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 15 Database Administration and Security
INFORMATION SYSTEM APPLICATIONS System Development Life Cycle.
Categories of Testing.
1 Software Testing (Part-II) Lecture Software Testing Software Testing is the process of finding the bugs in a software. It helps in Verifying and.
Transaction Processing Systems and System Development Life Cycle
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Information Systems Analysis and Design
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
PMO Incremental Growth Model. Program Management Office Functions2  Risk Identification  Risk Analysis  Risk Response Planning  Integrated Risk Response.
Security Architecture
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
Installation and Maintenance of Health IT Systems
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Maintenance and Support Week 15 CMIS570. User Training Need to consider the same 2 groups: End users Use the system to achieve the business purpose Creating,
R ECRUITMENT M ANAGEMENT S YSTEM CandidatesVendorsDatabase User Departments AdministratorInterviewTesting Fulfillment Manager FEATURES Resume Management.
Testing in UP1 Testing as part of the Unified Process (UP)
1 Copyright © 2004, Oracle. All rights reserved. Introduction.
Storing Organizational Information - Databases
Instructor: Dema Alorini Database Fundamentals IS 422 Section: 7|1.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter(1) Introduction and conceptual modeling. Basic definitions Data : know facts that can be recorded and have an implicit. Database: a collection.
Human Resource Information Systems: A Definition HRIS -- Systematic procedure for collecting, storing, maintaining, retrieving & validating date needed.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Highlights Hiring Policy for Benefitted Employees STEP 1—Need for the Position and Approval STEP 2—Confirm Job Description and Salary.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Software Development Life Cycle by A.Surasit Samaisut Copyrights : All Rights Reserved.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
Database Administration
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 Information Technology Infrastructure & Management Overview.
Anjanae Brueland & Janet Wingard.  What is Network Design, Planning & Management?  System Development Life Cycle (SDLC)  The phases of an information.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix B: Getting Started in Systems Analysis and Design.
TEXT BOOK: DATABASE ADMINISTRATION: THE COMPLETE GUIDE TO PRACTICES AND PROCEDURES CRAIG S. MULLINS Database Administration(IS4511) Sana azzam
Copyright © 2004 Pearson Education, Inc. Chapter 1 Introduction and Conceptual Modeling.
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
SaralTA Batch-07 Software Testing Presented By - Chittaranjan M.
Integration Testing.
Chapter 16 Database Administration and Security
Gary Hughes, South Oakleigh College
ICT meeting Business needs
Chapter 1 (pages 4-9); Overview of SDLC
New Way of Recruiting and Onboarding
Unit 2: Fundamentals of Computer Systems
Presentation transcript:

Develop IT systems for Recruitment Group 5 Shafali Vedangi Sunita Annie Vivek Dominica D

Need for Information System An Information system is a system for acquiring, organizing, storing, manipulating & transmitting information. Reqiured at two levels 1.Managerial Self Control To manage Performance of others To co-ordinate across functions Report his performance to his superiors

2. Organization Monitor and evaluate performance Take corrective action Reward Co-ordinate across functions in the organization Types of Information Needed Strategic Tactical Operational

Data Collection Data Cycle Data Capture Data Entry Storing of Data Editing & Validation of Data Data Access & Sharing Updating Data Disposal

SDLC & SCOPE INCREMENTAL / EVOLUTOINARY MODELS 1 st Increment – Requirements & Job ID 2 nd Increment – Searching & Uploading Resumes / Information 3 rd Increment - Contacting & Analysis of the candidates 4 th Increment – Interview Scheduling 5 th Increment – Generating Offer Letter

Scope of the software Employees will be the end users Front end Java / VB ++ Back end – SQL / Oracle

Software Testing Two Types of testing Black Box White Box

Other forms of Testing Peer Reviews Stress Testing Unit Testing Integration Testing User Acceptance Testing Code Reviews

INFORMATION SECURITY Objective of Information Security CIA Confidentiality Integrity Availability Threats to Information Security Natural Manmade Hardware / Software

Types of controls Physical IT related Document related Application specific control Disaster Recovery / BCP Hard Disk crash Complete Data center crippled Telecom / ISP Crashed

Future Plan Plan for reliability & High availability High Investments to help maintain products / services Forecast New technologies Gartner group’s technology forecasts a) Hype Curve b) Magic quadrant – vision for product, extend of implementation of the vision