Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Protecting People and Information: Threats and Safeguards
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
Defining Security Issues
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MANAGING OPERATIONS Andreas Rio, M.Eng.. Managing Operation The three major operational issues discussed:  outsourcing information systems functions.
Cyber crime & Security Prepared by : Rughani Zarana.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
An Agent-based Bayesian Forecasting Model for Enhancing Network Security J. PIKOULAS, W.J. BUCHANAN, Napier University, Edinburgh, UK. M. MANNION, Glasgow.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
Security and Ethics Privacy Employment Health Crime Working
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Managing Operations Chapter 8 Information Systems Management In Practice 5E McNurlin & Sprague.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Management System Ali Saeed Khan 29 th April, 2016.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Securing Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Figure 1-7: Eavesdropping on a Dialog
Information Systems Management In Practice 5E
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Computer Security (Summary)
Presentation transcript:

Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague

2 Introduction

3 What Are Operations?  Why Talk About Operations?  Solving Operational Problems  Operational Measures  The Importance of Good Management

4 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

5 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

6 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

7 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

8 Outsourcing IS Functions

9

10 Outsourcing IS Functions  Managing Outsourcing  CASE EXAMPLE: Eastman Kodak Company  CASE EXAMPLE: Honda Motor Company

11 Information Security Viruses Insider Abuse Laptop Theft System Penetration Denial of Service Unauthorized Access Theft of Proprietary Info Financial Fraud Telecom Fraud Sabotage Telecom Eavesdropping Active Wiretapping

12 Information Security 1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks 7. Trojan horse programs 8. Viruses 9. Spoofing

13 Security’s Five Pillars 1. Authentication 2. Identification 3. Privacy 4. Integrity 5. Nonrepudiation

14 Information Security Antivirus Software Firewalls Physical Security Access Control Intrusion Detection Encrypted Files Encrypted Login Reuseable Passwords Digital IDs PCMCIA Biometrics

15 Business Continuity  Safeguarding people during a disaster  Documenting business procedures  Giving employees the tools and space to handle personal issues

16 Business Continuity  Using Internal Resources  Using External Resources  CASE EXAMPLE: Household International

17 Conclusion Managing Inward vs. Managing Outward

18 PART II Discussion Case Managing Information Security on a Shoestring Budget