Download presentation
Presentation is loading. Please wait.
Published byLeo Wood Modified over 9 years ago
1
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague
2
2 Introduction
3
3 What Are Operations? Why Talk About Operations? Solving Operational Problems Operational Measures The Importance of Good Management
4
4 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
5
5 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
6
6 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
7
7 What’s New in Operations? 1. Companies Have Cleaned Their Operational House 2. More Operations Managers are Managing Outward 3. Operations are Being Simplified 4. Certain Operations are Being Offloaded
8
8 Outsourcing IS Functions
9
9
10
10 Outsourcing IS Functions Managing Outsourcing CASE EXAMPLE: Eastman Kodak Company CASE EXAMPLE: Honda Motor Company
11
11 Information Security Viruses Insider Abuse Laptop Theft System Penetration Denial of Service Unauthorized Access Theft of Proprietary Info Financial Fraud Telecom Fraud Sabotage Telecom Eavesdropping Active Wiretapping
12
12 Information Security 1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks 7. Trojan horse programs 8. Viruses 9. Spoofing
13
13 Security’s Five Pillars 1. Authentication 2. Identification 3. Privacy 4. Integrity 5. Nonrepudiation
14
14 Information Security Antivirus Software Firewalls Physical Security Access Control Intrusion Detection Encrypted Files Encrypted Login Reuseable Passwords Digital IDs PCMCIA Biometrics
15
15 Business Continuity Safeguarding people during a disaster Documenting business procedures Giving employees the tools and space to handle personal issues
16
16 Business Continuity Using Internal Resources Using External Resources CASE EXAMPLE: Household International
17
17 Conclusion Managing Inward vs. Managing Outward
18
18 PART II Discussion Case Managing Information Security on a Shoestring Budget
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.