Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 15 Managing Information. Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management.

Similar presentations


Presentation on theme: "Chapter 15 Managing Information. Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management."— Presentation transcript:

1 Chapter 15 Managing Information

2 Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management

3 Chief Information Officer Align technology with business strategy Implement state-of-art solutions Provide and improve information access

4 Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management

5 IS Department and End Users Let them sink or swim (do nothing or educating) Use the stick (policies and procedures) –Steering committee Use carrot ( incentives) Offer support –Information center –Help desk

6 Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management

7 Control and Security Logical control Physical control Data control Communication control Administration control Application control

8 Physical Control Location (traffic) Security (lock) Environmental (air) Fire Power

9 Logical Control Photo Fingerprints Voice Eye Signature Password

10 Data Control Minimal privilege Minimal exposure

11 Communication Control Firewall Decryption Encryption Private & public key

12 Administrative Control Policy Procedure Hardware Software Employee Data

13 Application Control Input control Processing control Output control

14 Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management

15 Contingency Mgmt NOT disaster recovery –Reactive, not proactive Worst case scenario –All our eggs in one basket –Natural disaster –Human error / sabotage

16 Contingency Mgmt. Methods Disaster Recovery firm –Outsource strategic function? Off-line storage Data redundancy –Replicated databases –Fragmented databases

17 Contingency Methods Back-up power generators “What if” scenarios –Military war games Scaled-down manual system Back-up / recovery procedures

18 Contingency Methods Parallel systems Processing backup facility –Cold, warm, hot site

19 Cardinal Health Redundant systems for critical order processing Redundant WAN trunks System data backed up daily –Backup media kept off-site Backup replica site –Different part of country –Switched on within 30 minutes

20 Points to Remember Chief Information Officer IS Department and End Users Control & Security Contingency Management

21 Discussion Questions What types of control do you have implemented in your organization? Tell us a Contingency Management war story –What happened? –How did the firm recover? –How could the situation have been Averted? Mitigated?

22 Assignment Review chapters 8-14 Exam 2 Group assignment Research paper & presentation


Download ppt "Chapter 15 Managing Information. Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management."

Similar presentations


Ads by Google