What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
IS Network and Telecommunications Risks
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 12 Strategies for Managing the Technology Infrastructure.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
1 Chapter 7 IT Infrastructures Business-Driven Technology
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Key.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Key.
System Analysis and Design
© Copyright 2011 John Wiley & Sons, Inc.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Design Strategy - Distributed Systems System Architectures CSIS3600 Systems Analysis and Design.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Virtual Private Network
The Client/Server Database Environment
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Systems Analysis and Design 5th Edition Chapter 7. Moving into Design Alan Dennis, Barbara Haley Wixom, and Roberta Roth 7-0© Copyright 2011 John Wiley.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Class 5 Computer Software. Outline System Software Application Software (“Applications”) Markup languages for Internet (HTML, XML) User Interface Client-Server.
Invitation to Computer Science 5th Edition
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Chapter 7: Moving into Design Chapter 8: Architecture Design
Slide 1 Physical Architecture Layer Design Chapter 13.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 5th Edition Copyright © 2015 John Wiley & Sons, Inc. All rights.
Reasons for New Systems Syarat untuk user tidak terpenuhi / Unfulfilled User Requirements New Technology Competition Tetapi kebanyakan Perencanaan strategik.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
The Database Approach Muhammad Nasir
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
Systems Analysis and Design
Systems Analysis and Design
Data and database administration
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
System Design Chapter 8 PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights.
Moving into Design Chapter 8.
Workgroup Technology Partners
Security in Networking
Systems Analysis and Design
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems Analysis and Design
Systems Analysis and Design
Presentation transcript:

What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful design builds on what we have learned in analysis and transforms that knowledge into a working system. Design is still planning as the system need not be developed during this phase.

Design Strategies Custom development (build from scratch) Purchase and customize Outsource development

Custom Development PROS – Allows flexibility and creativity – Builds technical skills and functional knowledge in- house – Best ‘fit’ CONS – Requires significant time and effort – May exacerbate existing backlogs – May require missing skills – Often costs more – Often takes more time – Risk of project failure

Packaged Software Include small single-function tools All-encompassing enterprise resource planning (ERP) systems Rarely a perfect fit with business needs May allow for customization – Manipulation of system parameters – Changing way features work – Synchronizing with other application interfaces

Outsourcing Hiring an external vendor, developer, or service provider May reduce costs or add value Risks include possibly – Losing confidential information – Losing control over future development – Losing control over future cost structure – Losing learning opportunities

Outsourcing Contracts There are Three types: Time and Arrangement: – Pay for what is needed to get job done. Flexible but risk of large bill at the end. Fixed-price – Certainty regarding payment but very little flexibility in delivering IS support. ‘You get what you ask for.’ Value-added – Outsourcer shares in benefits gained from the system.

Selecting a Design Strategy Consider each of the following: – Business need – In-house experience – Project skills – Project management – Time frame

Key Definitions The architecture design consists of plans for the hardware, software, communications, security, and global support for the new application The designers must decide if processing will occur in the server (server-based), at the personal computer (client-based), or in some combination of these (client-server based).

Key Definitions The network model shows major components of the system, where they are located and how they will be connected to one another. The hardware and software specifications describe these components in detail and aid those responsible for purchase and acquisition of these products.

Architectures Server based Client based Client-server based – thick versus thin client – cloud computing

Server-Based Computing (and, essentially, Thin-Client Computing)

Client-Based Computing

Client-Server-Based Computing

Client-Server Attributes Typical Pros – Compatible with web- based system design – Scaleable – Work with multiple vendors/products – No central point of failure Typical Cons/Limits – Complexity – New programming languages and techniques (stress for personnel) – More complex to update

Identifying Threats to the System A threat is any potential adverse occurrence that can do harm to the application or its data Threats come from internal as well as external sources Categories of threats – Disruptions, destruction and disaster Viruses fall into this category – Unauthorized access

Most Common Threats

Creating Controls A control is something that mitigates or stops a threat Controls include – redundancy – fault tolerant servers – disaster recovery plans – anti-virus software

Additional Controls Include A security policy ‘Social Engineering’ Passwords and encryption – What you have – What you know – What you are Firewalls – wired, wireless controls

Current Threats Malware Delivery – Software Updates – Banner Ads (‘malvertising’) – Downloadable documents – Man-in-the-middle – Keyloggers

The threat of open WiFi ‘Sidejacking’ – packet sniffers intercept traffic between two html parties and steal the session cookie – Firesheep is an application that supports this as an extension of the Firefox browser requires Firefox browser use cannot read https sessions