Auditoria. AGENDA Innovatec Services Chicoche Systems Chicoche Systems Services Critical Asset Worksheet for people Critical Asset Worksheet for Information.

Slides:



Advertisements
Similar presentations
Faruk Çubukçu Get Your IT Manager Title samples,
Advertisements

Organizing Information Technology Resources
IT Organizational Chart Moçambique Leaf Tobacco. Organizing Around a Complete Team To help in this process, at MLT we adopted a complete team-based IT.
Supervision in Organizations
Security and Personnel
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.
© Prentice Hall CHAPTER 1 Managing IT in an E-World.
IS Careers, Jobs and Organizational Roles. Contemplative Questions  Would I enjoy a career in IS?  What type of positions are available in IT?  In.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 10 Managing the Delivery of Information Services.
Objectives Explain the key role of a systems analyst in business
Factors to be taken into account when designing ICT Security Policies
CHAPTER 9 DEVELOPING BUSINESS/IT STRATEGIES. IT Planning Planning an information system doesn’t start with bits, and bytes, or a Web site. It starts with.
Roles of IT Personnel Unit Customer Service This is a facility that helps customers with wide-ranging questions relating to a specific company,
Be An Effective Manager
1 Information Management & Systems History, current status, and future of the IM&S program at USC Upstate. Dr. Ron Fulbright Chair, IMS
1. 2 Technology in Action Technology in Focus: Careers in IT Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
You will be responsible for professional and technical work related to network and telecommunications solutions (Local Area Network/ Wireless, Wide Area.
Organizing Information Technology Resources
2 nd floor Ayodhya Annex, Nr. Hotel Pai-Prakash, Vishrambag Sangli  Creative Vision  Simplified Life  Make it Amazing  
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Implementing Security Education, Training, and Awareness Programs
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
This is the best Power Point Template ever. It comes with over 5 styles of colors and include lots of features. Serving New England Businesses Since 1988.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
AUDITORÍA THE APPCO. VOLUME 8: CRITICAL ASSET FOR PEOPLE.
{ EduSolutions Auditoria.  EduSolutions background  EduSolutions Description  EduSolutions Organizational Structure  EduSolutions System   Critical.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
تأسست سنة Agenda Brief of New Vision Company Our Partnerships Our Projects Our Services Our Partnerships.
IT Infrastructure for Business
Threat Assessment in a Logical Environment U.S. Financial Infrastructure Physical to Logical environment Protection and Threat Assessment Safe School.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Team # 7 Tanaz Mozafari Kunal Mhaske Yanjing Chu Shin Sesthalao.
VENDORS, CONSULTANTS AND USERS. WHY CAN’T COMPANIES DEVELOP THEIR OWN ERP PACKAGES? To develop an ERP package is a complex & time consuming activity which.
Central Executive Restructuring: An Introduction to the Plans
Presented By: Ann Kaminstein, Esq. DV Initiative, Inc. Domestic Violence Workplace Training Challenges.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
My audience will be excited to learn the basics of what a network systems & data communications analyst does.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA Concentrations June 24, 2008 Cisco Confidential.
Staff Assessment Technology Services Department Palmyra Area School District.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
Information Security tools for records managers Frank Rankin.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
Required Financial Audit Specialist for a Utility Company – Dubai Job Brief : The candidate should possess the following qualification / experience / skills.
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Chapter 15 Telecommunication Department Management.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Be An Effective Manager
Managing the Delivery of Information Services
BUSINESS CONTINUITY BY HUI ZHENG.
Decrypting Data Compliance in China
Information Technology (IT) Department
Unit 7 – Organisational Systems Security
Agenda Workforce Development Coaching Mentoring
Information Systems Management
ECT 589: E-Commerce Management
Recommendations for Portal Systems from Green Team
Information Systems Management
Presentation transcript:

Auditoria

AGENDA Innovatec Services Chicoche Systems Chicoche Systems Services Critical Asset Worksheet for people Critical Asset Worksheet for Information

INNOVATEC We are a young company formed by a trained multidisciplinary group of people with whom your institution, company, shop, service or project can support you in the area of ​​Information Technology.

INNOVATEC SERVICES Software Factory: Development of software designed to solve specific customer problems. Web design: We develop portals with custom design Technical Support: Our team of technicians offer a quick solution to the problems of our customers.

CHICOCHE SYSTEMS BACKGROUND

Chicoche Systems is a specialized company in the area of ​​telecommunications in Villahermosa Tabasco.

CHICOCHE SYSTEMS SERVICES Specialized Support Security Services Network Design Network Implementation Voice and Unified Communications Wireless Services Video Services TelePresence Services Routing services Switching services

VOLUME 8: CRITICAL ASSET FOR PEOPLE

Chicoche systems organizational structure

ORGANIZATIONAL STRUCTURE The company has 5 main Departments: CEO. The Networks Department, which consists of four sub departments: Network design and implementation, voice, wireless and requirements. The Systems area consist of two sub departments: Informatics security and systems. The Help Desk department. The Administrative Area consist of five sub departments: Sales, Human Resources, Accounting, Physic Security and Quartermaster.

PEOPLE ASSETS They’ve got 50 employees A total of 17 differents jobs

CRITICAL PEOPLE CEO : Manager Networks Department : Chief of Networks Department Systems Area : Chief of the Systems Area Help Desk Department : Chief of Help Desk Administrative Area : Chief of Administrative Area

WHAT ARE THE SECURITY REQUIREMENTS FOR THESE PERSONS? In general, the experience, knowledge and skills that provide this group of people, it is necessary to avoid the performance and productivity of the company are affected.

ABSENCE OF PEOPLE. Key people taking a temporary absence. Key people leaving the organization permanently. Threats affecting a third-party or service provider

Good Things Chicoche systems has a good organizational structure. Chicoche systems have well established functions of almost all the employees.

BAD THINGS Chicoche systems don’t has a plan for what to do if an employee don't go to work. Not enough information about each department functions.

RECOMMENDATIONS Established contingency plan in case of an employee does not attend to work. Establish the tasks of each area. Established functions of all the employees.

Critical asset for Information Client information. Finance information. Project information. Sensible information that your company needs for work.

NETWORK ACCESS INFORMATION Good things The company has a privacy policy. Bad points. There are no rules of restriction of information. There is not well established who uses the internal information. There is no protection for the information against external people.

Recommendations Implement user politics to access to the information on the website. Get a firewall.

Human actors using physical access Bad Things The company doesn’t have security systems The company doesn’t have an insurance in case of robbery. The company doesn’t have politics about the how protect the equipment. Good Things The company have security against external people. The company have physical restrictions. Recommendations The company should improve its security using security systems.

System problems/Other problems Good things. There is established the help desk is going to attend a problems. Bad things The company don’t have plans for lost of information and for infrastructure problems. The company don’t have plans about natural disaster. The company don’t have plans about a emergency power.

Recommendations There are no sufficient information about if a system fails. The company should sign up an insurance service. The company should make a natural disaster plan. The company should consider an emergency power supply.

Other Problems The company has a plan in case of infrastructure problems.