Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.

Similar presentations


Presentation on theme: "Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague."— Presentation transcript:

1 Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague

2 2 Introduction

3 3 What Are Operations?  Why Talk About Operations?  Solving Operational Problems  Operational Measures  The Importance of Good Management

4 4 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

5 5 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

6 6 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

7 7 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded

8 8 Outsourcing IS Functions

9 9

10 10 Outsourcing IS Functions  Managing Outsourcing  CASE EXAMPLE: Eastman Kodak Company  CASE EXAMPLE: Honda Motor Company

11 11 Information Security Viruses Insider Abuse Laptop Theft System Penetration Denial of Service Unauthorized Access Theft of Proprietary Info Financial Fraud Telecom Fraud Sabotage Telecom Eavesdropping Active Wiretapping

12 12 Information Security 1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks 7. Trojan horse programs 8. Viruses 9. Spoofing

13 13 Security’s Five Pillars 1. Authentication 2. Identification 3. Privacy 4. Integrity 5. Nonrepudiation

14 14 Information Security Antivirus Software Firewalls Physical Security Access Control Intrusion Detection Encrypted Files Encrypted Login Reuseable Passwords Digital IDs PCMCIA Biometrics

15 15 Business Continuity  Safeguarding people during a disaster  Documenting business procedures  Giving employees the tools and space to handle personal issues

16 16 Business Continuity  Using Internal Resources  Using External Resources  CASE EXAMPLE: Household International

17 17 Conclusion Managing Inward vs. Managing Outward

18 18 PART II Discussion Case Managing Information Security on a Shoestring Budget


Download ppt "Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague."

Similar presentations


Ads by Google