Download presentation
Published byProsper Jennings Modified over 9 years ago
1
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 12 MIS Management Processes: Process Management, Systems Development, and Security Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
2
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Q1. What are the activities of business process management? Q2. What are the activities in the systems development life cycle (SDLC) development process? Q3. Which comes first: process or systems development? Q4. What is information systems security? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
3
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Q5. What are the components of an organization’s security program? Q6. What technical security safeguards are available? Q7. What human security safeguards are available? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
4
What Are the Activities of Business Process Management?
BPM Process Figure 12-1 Four Activities in the BPM Process Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
5
What Are the Activities of Business Process Management?
BPM Monitoring Activity Monitoring for Performance on its Objectives COBIT (Control Objectives for Information related Technology) Monitoring for Changes in the Process Environment Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
6
What Are the Activities of Business Process Management?
BPM Modeling Activity Three types of process change Increase or decrease resources Change the structure of the process Change the process’s resource AND structure Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
7
What Are the Activities of Business Process Management?
BPM Create Components Activity Create new IS components based on new process BPM Implement Process Activity Make process change operational Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
8
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? SDLC Define the system Determine requirements Design system components Create, test, and implement Maintain the system (assess process results) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
9
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? SDLC Figure 12-5 BPM Provides Requirements for Systems Development Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
10
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
8/22/2011 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
11
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Define the system Figure 12-6 SDLC: System Definition Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
12
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Determine requirements Figure 12-8 SDLC: Requirements Analysis Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
13
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Design components Figure 12-9 SDLC: Component Design Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
14
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Implement the system Figure 12-10 SDLC: Implementation Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
15
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? System conversion Pilot installation Phased installation Parallel installation Plunge installation Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
16
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Maintain the system Figure 12-12 SDLC: System Maintenance Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
17
Which Comes First: Process or Systems Development?
Business Process First Figure 12-13 Process-First Development Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
18
Which Comes First: Process or Systems Development?
Information System First Figure 12-14 Classic Five-Step Systems Development Life Cycle Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
19
Which Comes First: Process or Systems Development?
Another Factor: Off-the-Shelf Software And the Answer Is… Business processes first Both + Project Mgmt Iterating Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
20
What Is Information Systems Security?
Process of protecting information systems vulnerabilities from threats by creating appropriate safeguards What Are the Sources of Vulnerabilities? What Are the Types of Security Threats? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
21
What Is Information Systems Security?
What Are the Sources of Vulnerabilities? Human error and mistakes Malicious human activity Natural events and disasters Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
22
What Is Information Systems Security?
What Are the Types of Security Threats? Figure 12-15 Security Threats and Source Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
23
What Is Information Systems Security?
Process of protecting information systems vulnerabilities from threats by creating appropriate safeguards What Are the Sources of Vulnerabilities? What Are the Types of Security Threats? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
24
What Are the Components of an Organization’s Security Program?
Senior-management involvement Safeguards Figure 12-19 Security Safeguards as They Relate to the Five IS Components Planned response to security incidents Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
25
What Technical Safeguards Are Available?
Figure 12-21 Technical Safeguards Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
26
What Technical Safeguards Are Available?
Identification and Authorization Passwords Smart Cards Personal Identification Number (PINs) Biometric Authentication Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
27
What Technical Safeguards Are Available?
Encryption Keys Figure 12-22 Basic Encryption Techniques Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
28
What Technical Safeguards Are Available?
Firewalls Malware Protection Viruses, Trojan Horses, and Worms Spyware and Adware Malware Safeguards Bots, Botnets, and Bot Herders Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
29
What Technical Safeguards Are Available?
Design Secure Applications Code injection SQL injection attacks Cross-site scripting (XSS) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
30
What Technical Safeguards Are Available?
Data Safeguards Figure Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
31
What Technical Safeguards Are Available?
Figure 12-21 Technical Safeguards Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
32
What Human Security Safeguards Are Available?
Human Safeguards Human Resources Account administration Systems procedures Security monitoring Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
33
What Human Security Safeguards Are Available?
Human Resources Position Definitions Hiring and Screening Processes Dissemination and Enforcement Termination Processes Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
34
What Human Security Safeguards Are Available?
Account Administration Account Management; Password Management; and Help-Desk Policies Systems Procedures Figure Systems Procedures Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
35
What Human Security Safeguards Are Available?
Security Monitoring Activity logs Organization Response to Security Incidents Disaster Recovery Backup Sites Incident-Response Plan Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
36
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Ethics Guide Security Privacy Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
37
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Conclusion Q1. What are the activities of business process management? Q2. What are the activities in the systems development life cycle (SDLC) development process? Q3. Which comes first: process or systems development? Q4. What is information systems security? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
38
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Conclusion Q5. What are the components of an organization’s security program? Q6. What technical security safeguards are available? Q7. What human security safeguards are available? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
39
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.