Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Similar presentations


Presentation on theme: "Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall"— Presentation transcript:

1 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 12 MIS Management Processes: Process Management, Systems Development, and Security Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

2 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Q1. What are the activities of business process management? Q2. What are the activities in the systems development life cycle (SDLC) development process? Q3. Which comes first: process or systems development? Q4. What is information systems security? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

3 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Q5. What are the components of an organization’s security program? Q6. What technical security safeguards are available? Q7. What human security safeguards are available? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

4 What Are the Activities of Business Process Management?
BPM Process Figure 12-1 Four Activities in the BPM Process Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

5 What Are the Activities of Business Process Management?
BPM Monitoring Activity Monitoring for Performance on its Objectives COBIT (Control Objectives for Information related Technology) Monitoring for Changes in the Process Environment Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

6 What Are the Activities of Business Process Management?
BPM Modeling Activity Three types of process change Increase or decrease resources Change the structure of the process Change the process’s resource AND structure Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

7 What Are the Activities of Business Process Management?
BPM Create Components Activity Create new IS components based on new process BPM Implement Process Activity Make process change operational Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

8 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? SDLC Define the system Determine requirements Design system components Create, test, and implement Maintain the system (assess process results) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

9 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? SDLC Figure 12-5 BPM Provides Requirements for Systems Development Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

10 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
8/22/2011 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

11 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Define the system Figure 12-6 SDLC: System Definition Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

12 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Determine requirements Figure 12-8 SDLC: Requirements Analysis Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

13 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Design components Figure 12-9 SDLC: Component Design Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

14 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Implement the system Figure 12-10 SDLC: Implementation Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

15 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? System conversion Pilot installation Phased installation Parallel installation Plunge installation Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

16 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
What Are the Activities of the Systems Development Life Cycle (SDLC) Development Process? Maintain the system Figure 12-12 SDLC: System Maintenance Activity Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

17 Which Comes First: Process or Systems Development?
Business Process First Figure 12-13 Process-First Development Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

18 Which Comes First: Process or Systems Development?
Information System First Figure 12-14 Classic Five-Step Systems Development Life Cycle Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

19 Which Comes First: Process or Systems Development?
Another Factor: Off-the-Shelf Software And the Answer Is… Business processes first Both + Project Mgmt Iterating Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

20 What Is Information Systems Security?
Process of protecting information systems vulnerabilities from threats by creating appropriate safeguards What Are the Sources of Vulnerabilities? What Are the Types of Security Threats? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

21 What Is Information Systems Security?
What Are the Sources of Vulnerabilities? Human error and mistakes Malicious human activity Natural events and disasters Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

22 What Is Information Systems Security?
What Are the Types of Security Threats? Figure 12-15 Security Threats and Source Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

23 What Is Information Systems Security?
Process of protecting information systems vulnerabilities from threats by creating appropriate safeguards What Are the Sources of Vulnerabilities? What Are the Types of Security Threats? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

24 What Are the Components of an Organization’s Security Program?
Senior-management involvement Safeguards Figure 12-19 Security Safeguards as They Relate to the Five IS Components Planned response to security incidents Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

25 What Technical Safeguards Are Available?
Figure 12-21 Technical Safeguards Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

26 What Technical Safeguards Are Available?
Identification and Authorization Passwords Smart Cards Personal Identification Number (PINs) Biometric Authentication Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

27 What Technical Safeguards Are Available?
Encryption Keys Figure 12-22 Basic Encryption Techniques Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

28 What Technical Safeguards Are Available?
Firewalls Malware Protection Viruses, Trojan Horses, and Worms Spyware and Adware Malware Safeguards Bots, Botnets, and Bot Herders Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

29 What Technical Safeguards Are Available?
Design Secure Applications Code injection SQL injection attacks Cross-site scripting (XSS) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

30 What Technical Safeguards Are Available?
Data Safeguards Figure Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

31 What Technical Safeguards Are Available?
Figure 12-21 Technical Safeguards Data Safeguards Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

32 What Human Security Safeguards Are Available?
Human Safeguards Human Resources Account administration Systems procedures Security monitoring Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

33 What Human Security Safeguards Are Available?
Human Resources Position Definitions Hiring and Screening Processes Dissemination and Enforcement Termination Processes Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

34 What Human Security Safeguards Are Available?
Account Administration Account Management; Password Management; and Help-Desk Policies Systems Procedures Figure Systems Procedures Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

35 What Human Security Safeguards Are Available?
Security Monitoring Activity logs Organization Response to Security Incidents Disaster Recovery Backup Sites Incident-Response Plan Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

36 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Ethics Guide Security Privacy Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

37 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Conclusion Q1. What are the activities of business process management? Q2. What are the activities in the systems development life cycle (SDLC) development process? Q3. Which comes first: process or systems development? Q4. What is information systems security? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

38 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Conclusion Q5. What are the components of an organization’s security program? Q6. What technical security safeguards are available? Q7. What human security safeguards are available? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

39 Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall


Download ppt "Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall"

Similar presentations


Ads by Google