1 Systems Analysis & Design 7 th Edition Topic 9.

Slides:



Advertisements
Similar presentations
Systems Operation and Support
Advertisements

Systems Operation and Support
Systems Analysis and Design 9th Edition
Systems Analysis and Design 9th Edition
Chapter 2.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS MBNA
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
Systems Analysis & Design Sixth Edition Systems Analysis & Design Sixth Edition Chapter 10.
Chapter 10 Systems Operation, Support, and Security
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 12 Strategies for Managing the Technology Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
System Implementation
Introduction to Systems Analysis and Design
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 16-1 Accounting Information Systems 9 th Edition Marshall.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Systems Analysis and Design 10th Edition
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
System Implementation
November 2009 Network Disaster Recovery October 2014.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter 1 The Systems.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Prof. Mohammad Moizuddin
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Systems Analysis & Design 7 th Edition Systems Analysis & Design 7 th Edition Chapter 11.
Concepts of Database Management Sixth Edition
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
CHAPTER 9 System maintenance
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter 3: Software Maintenance Process Omar Meqdadi SE 3860 Lecture 3 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
Module 14: Configuring Server Security Compliance
CHAPTER 12 SECURING AND SUPPORTING THE SYSTEM
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 13 Post-Implementation Training.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
FLOOR CANDY.
Copyright 2002 Prentice-Hall, Inc. 1.1 Modern Systems Analysis and Design Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 1 The Systems Development.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Component 4: Introduction to Information and Computer Science Unit 9/Part f: Components and Development of Large Scale Systems.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Systems Analysis & Design 7 th Edition Systems Analysis & Design 7 th Edition Chapter 11.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Computer Security Sample security policy Dr Alexei Vernitski.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Systems Analysis & Design 7 th Edition Chapter 2.
Fundamentals of Information Systems, Sixth Edition
INFORMATION SYSTEMS SECURITY AND CONTROL.
Working at a Small-to-Medium Business or ISP – Chapter 8
Information Systems Development
SYSTEMS ANALYSIS & DESIGN
Chapter 1 The Systems Development Environment
CHAPTER 9 System maintenance
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

1 Systems Analysis & Design 7 th Edition Topic 9

2 Chapter Objectives  Explain how the systems operation, support, and security phase relates to the overall system development process  Describe user support activities, including user training and help desks  Discuss the four main types of system maintenance  Explain various techniques for managing systems operation and support

3 Chapter Objectives  Describe techniques for measuring, managing, and planning system performance  Assess system security at five levels: physical security, network security, application security, file security, and user security  Describe backup and disaster recovery  Assess future challenges for IT professionals as technology reshapes the workplace

4 Overview of Systems Support and Maintenance  The systems operation, support, and security begins when a system becomes operational and continues until the system reaches the end of its useful life  After delivering the system, the analyst has two other important tasks: he or she must support users and provide necessary maintenance to keep the system operating properly

5 User Support Activities  User Training –Additionally, new employees must be trained on the company’s information systems –Training users about system changes is similar to initial training

6 User Support Activities  Help Desk –Often called an information center (IC) –Enhance productivity and improve utilization of a company’s information resources

7 User Support Activities  Help Desk –Might have to perform the following tasks: Show a user how to create a data query or report that displays specific business information Resolve network access or password problems Demonstrate an advanced feature of a system or a commercial package Help a user recover damaged data

8 User Support Activities  Online Chat Support –Interactive support also can be delivered in the form of an online chat –Blackboard provides a chat room called a Virtual Classroom, which is an online meeting-place where students can ask questions and interact with an instructor

9 Maintenance Activities  The systems operation, support and security phase is an important component of TCO (total cost of ownership) because ongoing maintenance expenses can determine the economic life of a system  Operational costs  Maintenance expenses  Maintenance activities

10 Maintenance Activities  Four types of maintenance task can be identified –Corrective maintenance –Adaptive maintenance –Perfective maintenance –Preventative maintenance

11 Maintenance Activities Four types of maintenance task can be identified

12 Managing Systems Support  Maintenance Team –System administrator –Systems analysts Analysis Synthesis

13 Managing Systems Support  Maintenance Team –Programmers Applications programmer Systems programmer Database programmer Programmer/analyst

14 Managing Systems Support  Managing Maintenance Requests –Involves a number of steps Maintenance request Initial determination Role of the systems review committee Completion of the work User notification

15 Managing Systems Support  Establishing Priorities –In many companies, systems review committee separates maintenance requests from new systems development requests –Many IT managers believe that evaluating all projects together leads to the best possible decisions –Neither approach guarantees an ideal allocation between maintenance and new systems development

16 Managing Systems Support  Configuration Management –Configuration management (CM) –As enterprise-wide information systems grow more complex, configuration management becomes critical –Most maintenance projects require documentation changes

17 Managing Systems Support  Maintenance Releases –Maintenance release methodology –A numbering pattern distinguishes the different released –Reduces the documentation burden –But new features or upgrades are available less often –Service packs

18 Managing Systems Support  Version Control –Archived –Systems librarian –Companies can purchase software such as Serena

19 Managing Systems Support  Baseline –Systems analysts use baselines as yardsticks to document features and performance during the systems development process –Functional baseline –Allocated baseline –Product baseline

20 Managing System Performance  Performance and Workload Measurement –Metrics –Response time –Bandwidth and throughput Kbps (kilobits per second) Mbps (megabits per second) Gbps (gigabits per second)

21 Managing System Performance  Performance and Workload Measurement –Turnaround time The IT department often measures response time, bandwidth, throughput, and turnaround time to evaluate system performance both before and after changes to the system or business information requirements Management uses current performance and workload data as input for the capacity planning process

22 Managing System Performance  Capacity Planning –What-if analysis –You need detailed information about the number of transactions; the daily, weekly, or monthly transaction patterns; the number of queries; and the number, type, and size of all generated reports

23 Managing System Performance  System Maintenance Tools –Many CASE tools include system evaluation and maintenance features –In addition to CASE tools, you also can use spreadsheet and presentation software to calculate trends, perform what-if analyses, and create attractive charts and graphs to display the results

24 System Security  Physical Security –First level of security concerns the physical environment –Computer room –Computer room security Biometric scanning systems Motion sensor

25 System Security  Physical Security –Servers and desktop computers Keystroke logger Tamper-evident cases BIOS-level password Boot-level password Power-on password

26 System Security  Physical Security –Notebook computers Select an operating system that allows secure logons and BIOS-level passwords Mark or engrave the computer’s case Consider notebook models that have a built-in fingerprint reader Universal Security Slot (USS) Back up all vital data

27 System Security  Physical Security –Notebook computers Use tracking software While traveling, try to be alert to potential high-risk situations Establish stringent password protection policies

28 System Security  Network Security –Network –Network interface –Encrypted –Encrypting network traffic Unencrypted – plain text Public key encryption (PKE)

29 System Security  Network Security –Encrypting network traffic Public key Private key Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) WPA2

30 System Security  Network Security –Private networks Private network –Virtual private networks Virtual private network (VPN) Tunnel

31 System Security  Network Security –Ports and services Port Destination port Service Port scans Denial of service (DOS) Distributed denial of service (DDOS)

32 System Security  Network Security –Firewalls Firewalls can be configured to detect and respond to DOS attacks, port scans, and other suspicious activity

33 System Security  Application Security –Services Security hole Administrator – super-user Permissions –Input validation –Patches and updates Patches Third-party software Automatic update service

34 System Security  Application Security –Patches and updates Exploits Patches Third-party software Automatic update service  File Security –Permissions –User Groups

35 System Security  User Security –Privilege escalation attack –Identity management –Password protection –Social engineering Pretexting –User resistance

Backup and Disaster Recovery Backup Policies –Backup policy –Backup media Rotation schedule Offsiting –Backup Types –Retention periods 36

Backup and Disaster Recovery Backup Policies 37

Backup and Disaster Recovery Business Continuity Issues –Test plan –Business continuity plan (BCP) –Hot site –Data replication 38

39 Facing the Future: Challenges and Opportunities  Predictions –It is clear that companies will continue to face intense competition and global change, especially in the wake of economic, social, and political uncertainty –Although disruptions will occur, technology advances will spur business growth and productivity

40 Facing the Future: Challenges and Opportunities  Predictions –It is interesting to note that some observers, such as Bill Joy, wonder whether technology is moving so fast that humans will be left behind –What does seem clear is that the future world of IT must be envisioned, planned, and created by skilled professionals

41 Chapter Summary  Systems operation, security, and support covers the entire period from the implementation of an information system until the system no longer is used  A systems analyst’s primary involvement with an operational system is to manage and solve user support requests

42 Chapter Summary  Systems analysts need the same talents and abilities for maintenance work as they use when developing a new system  Configuration management is necessary to handle maintenance requests  System performance measurements include response time, bandwidth, throughput, and turnaround time