Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Chapter 7: Physical & Environmental Security
Module 6 – Systems Administration MIS5122: Enterprise Architecture for the IT Auditor.
Computer Security Computer Security is defined as:
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
9 - 1 Computer-Based Information Systems Control.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer 2003.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
© 2004, David Gadish, Ph.D.1 Software Engineering CIS 410 Winter 2004 Week 9 Lecture Dr. David Gadish.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
Concepts of Database Management Seventh Edition
Business Data Communications & Networking
BUSINESS DRIVEN TECHNOLOGY
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 7 System Design and Implementation System Design and.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Concepts of Database Management Sixth Edition
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Chapter 16 Alternative Avenues for Systems Acquisitions
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Introduction: Databases and Database Users
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 Definition  Components  Advantages  Limitations Contents  Definition Definition  Functions Functions.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
SCSC 311 Information Systems: hardware and software.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Information: Policy, Strategy and Systems Module Overview
Storing Organizational Information - Databases
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Systems Implementation, Operation, and Control Chapter.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
Chapter 1 Computer Technology: Your Need to Know
System Administration
Controlling Computer-Based Information Systems, Part I
Module 6 – Systems Administration
IT INFRASTRUCTURES Business-Driven Technologies
Final HIPAA Security Rule
Systems Architecture, Seventh Edition
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Chapter 14: System Administration Mark Milan

System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing an IS security policy

Strategic Planning Strategic plan – a set of long-range goals and a plan to attain those goals. The goals must include: –Services to be provided –Resources needed to provide those services The plan to address the goals are: –Strategies for developing services and a market for them. –Strategies for acquiring sufficient resources for operations and growth. –Organizational structure and control.

Capital resources are referred to as infrastructure and have the following characteristics: –Service to a large and diverse set of users. –Costs that are difficult t allocate to individual users. –Recurring need for new capital expenditures. –Significant operating costs for maintenance. Hardware and Software as Infrastructure

Providing infrastructure-based services to a wide variety of user requires adopting services standards. Standardization causes problems for users that want services near the leading edge. It is hard to standardize when dealing with hardware and software. Standards

Competitive Advantage Competitive Advantage describes a state of affairs in which one organization employs resources so as to give it a significant advantage over its competitors. The different forms includes: –Providing services that competitors are unable to provide. –Providing services of unusually high quality. –Providing services at unusually low price. –Generating services at unusually low cost.

Acquisition Process Determining and Stating Requirements Request for Proposals Evaluating Proposals

The acquisition process consists of the following process: 1.Determine the applications that the hardware/software will support. 2.Specify detailed requirements in terms of hardware and software capability and capacity. 3.Draft a request for proposals and circulate it to potential vendors. 4.Evaluate the responses to the request for proposals. 5.Contract with a vendor or vendors for purchase, installation, and/or maintenance. Acquisition Process

Determining Requirements and Evaluating Performance Modeling Concepts Computer System Models Application Demand Models Resource Availability Models Model Manipulation and Analysis Measuring Resource Demand and Utilization

Determining H/W Requirements and Evaluating Performance Determining hardware requirements for a specific set of application software is difficult: Computer systems are complex combinations of interdependent components. The configuration of operating and other system software can significantly affect raw hardware performance. The hardware and system software resources required by applications cannot always be predicted precisely.

Measuring and Utilizing Automated tools to measure resource demand and utilization include: –Hardware monitors –Software monitors –Program profilers

Security Security system measures: Protect physical resources against accidental loss or damage. Protect data and software resources against accidental loss or damage. Protect all resources against malicious tampering. Protect sensitive software and data resources against unauthorized access and accidental disclosure.

Security Access Controls - specific access controls can include restrictions on: Locations from which a user can log on to the system or access its resources. Days/times when access is granted or denied. The ability to read, write, create and delete directories and files. The ability to execute programs. The ability to access hardware resources such as printers and communication devices

Security Methods to enhance Password Controls and Security: Restrictions on the length and composition of valid passwords. Requirements that passwords periodically be changed. Analysis of password content to identify passwords that are guessed easily. Encryption of passwords in files and during transmission over a network. Restrictions on locations from which a user can access the system.

Physical Environment Electrical Power Heat Dissipation Moisture Cable Routing Fire Protection

Electric Power Fluctuations in power can cause: –Momentary power surges –Momentary power sags –Long-term voltage sags –Total loss of power

Heat Dissipation All computer equipment requires some means of heat dissipation. Many hardware devices use fans to move air through the unit. Auxiliary cooling can be provided within an individual equipment cabinet.

Moisture Excessive moisture is an enemy of electrical circuitry. Well-designed cabinets are one defense against the dangers of moisture. Humidity can be controlled automatically by optional components of heating, ventilation and air conditioning systems.

Cable Routing A raised floor is generally used in a room that contains multiple hardware cabinets, a single mainframe computer system or multiple minicomputers.

Fire Protection Carbon dioxide, fire retardant foams and powders, and various gaseous compounds are alternate methods of fire protection, but not for computer equipment. Halon gas is used around computer equipment since is does not promote condensation.

Disaster Planning and Recovery Measures Periodic data backup and storage of backups at alternate sites. Backup and storage of critical software at alternate sites. Installing of duplicate or supplementary equipment at alternate sites. Arrangements for leasing existing equipment at alternate sites, such as with another company or a service bureau.