SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez nos Conditions d’utilisation et notre Politique de confidentialité.
SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez notre Politique de confidentialité et nos Conditions d’utilisation pour en savoir plus.
Information Systems5 Why Do People Need Information? Individuals - Entertainment and enlightenment Businesses - Decision making, problem solving and control MIS 715 Eaton Fall 2001
Components of informationsystem/ model Control of sys perf proc i/p essi o/p ng Data processing Network resources
System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of computers – manual systems Group of interrelated or interacting elements forming a unified whole.
C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLE Analyse Identify Test And Collection &Problem Alternative Implement Data & SelectDefinition Solutions Infrmn Best YES Evaluate Successful Stop Solution NO
Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carried out easily
Inadequate requirements definition Poor ERP package selection Inadequate resources Miscalculation of time and efforts
Misfit of application software with business process Inadequate training and education Poor project design and management
7].B distinguish between systemsoftware and application software?
Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction.SOFTWARE
Types of software1) System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to Running of other software Communicating with peripheral devices development of other software Monitoring the uses of various hardware resources.
Control against Salami Attack: If proper auditing of accounts is done then salami attack can be easily caught. If proper rounding operation is done then Salami attack will not exist. If proper testing is done by the user it can be prevented.
Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user permit
ELECTRONIC SIGNATURES Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – Signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures
EMAIL MONITORING Employers should be aware Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data
To keep sensitive data secure To make a complex password use numbers , letters ,and symbols
Safe surfing Means: keeping ones email address private not chatting in an open system visiting secure sites accepting data from only known users downloading carefully & from known sites
Frequent virus checks Floppy disks , CD ROM, pen drives must be scanned before running
Checks inflow of mails to inbox Suspicious mails are preventedEmail filters
General information to beprotected from virus Do not download from untrustworthy sources Before start trading files ensure your client has a safe system Don’t download E mail until you are 100% sure If email has an attachment with email go to headers and look---------- If pif or src extension or .jpg.scr extension it is a virus
Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission Get a quality spyware program Set up software firewall and make sure all in LAN are set up it Set up hard ware fire wall ie easy to set up
Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------