Download presentation
Presentation is loading. Please wait.
Published byAnabel Kelley Modified over 8 years ago
1
Chapter 15 Managing Information
2
Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management
3
Chief Information Officer Align technology with business strategy Implement state-of-art solutions Provide and improve information access
4
Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management
5
IS Department and End Users Let them sink or swim (do nothing or educating) Use the stick (policies and procedures) –Steering committee Use carrot ( incentives) Offer support –Information center –Help desk
6
Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management
7
Control and Security Logical control Physical control Data control Communication control Administration control Application control
8
Physical Control Location (traffic) Security (lock) Environmental (air) Fire Power
9
Logical Control Photo Fingerprints Voice Eye Signature Password
10
Data Control Minimal privilege Minimal exposure
11
Communication Control Firewall Decryption Encryption Private & public key
12
Administrative Control Policy Procedure Hardware Software Employee Data
13
Application Control Input control Processing control Output control
14
Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management
15
Contingency Mgmt NOT disaster recovery –Reactive, not proactive Worst case scenario –All our eggs in one basket –Natural disaster –Human error / sabotage
16
Contingency Mgmt. Methods Disaster Recovery firm –Outsource strategic function? Off-line storage Data redundancy –Replicated databases –Fragmented databases
17
Contingency Methods Back-up power generators “What if” scenarios –Military war games Scaled-down manual system Back-up / recovery procedures
18
Contingency Methods Parallel systems Processing backup facility –Cold, warm, hot site
19
Cardinal Health Redundant systems for critical order processing Redundant WAN trunks System data backed up daily –Backup media kept off-site Backup replica site –Different part of country –Switched on within 30 minutes
20
Points to Remember Chief Information Officer IS Department and End Users Control & Security Contingency Management
21
Discussion Questions What types of control do you have implemented in your organization? Tell us a Contingency Management war story –What happened? –How did the firm recover? –How could the situation have been Averted? Mitigated?
22
Assignment Review chapters 8-14 Exam 2 Group assignment Research paper & presentation
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.