Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague
2 Introduction
3 What Are Operations? Why Talk About Operations? Solving Operational Problems Operational Measures The Importance of Good Management
4 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
5 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
6 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
7 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
8 Outsourcing IS Functions
9
10 Outsourcing IS Functions Managing Outsourcing CASE EXAMPLE: Eastman Kodak Company CASE EXAMPLE: Honda Motor Company
11 Information Security Viruses Insider Abuse Laptop Theft System Penetration Denial of Service Unauthorized Access Theft of Proprietary Info Financial Fraud Telecom Fraud Sabotage Telecom Eavesdropping Active Wiretapping
12 Information Security 1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks 7. Trojan horse programs 8. Viruses 9. Spoofing
13 Security’s Five Pillars 1. Authentication 2. Identification 3. Privacy 4. Integrity 5. Nonrepudiation
14 Information Security Antivirus Software Firewalls Physical Security Access Control Intrusion Detection Encrypted Files Encrypted Login Reuseable Passwords Digital IDs PCMCIA Biometrics
15 Business Continuity Safeguarding people during a disaster Documenting business procedures Giving employees the tools and space to handle personal issues
16 Business Continuity Using Internal Resources Using External Resources CASE EXAMPLE: Household International
17 Conclusion Managing Inward vs. Managing Outward
18 PART II Discussion Case Managing Information Security on a Shoestring Budget