University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Risk of Change: Networks and Software COMM80: Risk Assessment of Systems Change.

Slides:



Advertisements
Similar presentations
Pamela Norris Project Manager Kraft Kennedy & Lesser, Inc.
Advertisements

Information Management and Technology
How to Buy…. What do I want to buy? What do I want?… A desktop or a mobile computer (notebook or tablet) What is the purpose? Where am I going to use.
Wandsworth Education Remote Support Presentation By Keith Woolf and Andrew Britton.
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
C Leading edge applications John Bosnell Point Topic 31 January 2005.
Company Confidential WiFiSPARK Limited The Benefits of Wireless Networking Matt O’Donovan WiFiSPARK Limited Tel :
Bloxx - the hard working Internet filtering appliance which locks out unproductive web material through multiple layers – in a single unit that’s easy.
Introduction to the World of Computers
University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 11 Risk Mitigation and Contingency Planning COMM80: Risk Assessment of Systems Change.
Small Office Service Serial Router Connects Internal Stations to Shared Broadband Access Service Small Office Serial Router Shared Broadband Line ISP.
University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 14 The RAMESES Method. COMM80: Risk Assessment of Systems Change Unit 14.
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Copyright Course Technology Chapter 14: Executing.
Copyright Course Technology 1999
Introduction to VPN for MVS. Presented by Kevin D. Burney Computer Systems and Network Architect Office of the Vice Chancellor of Budget and Finance.
Site License Advisory Team February 28, 2014 meeting.
Current Network Schema Router Internet Switch PC.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
TEqLOGIC Logic Portal Desktop. 2 What you don’t want What you do want How to get there Benefits What to do next What We Will Cover…
1 Technology Coordinator Meeting Humanities 019 Friday, March 29, 2002.
RIVERINA COMMUNITY COLLEGE ONLINE LEARNING CENTRE Presented by Debby Priest 2004.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Windows To Linux Migration A Presentation to the St. Charles LUG By Fred Smith We help you Network, Across the Office, or Around the World!!! Computers.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Networks.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
July June 2014 Presented by Leah Howard & Ryan White Upper Dublin School District Educational Technology Plan.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
WEBMASTER 3224 PHYSICAL VS LOGICAL COMPONENTS OF THE INTERNET AND NETWORKS.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Spyware: Prevention vs. Elimination, a comparison in efficiency.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Remote Access Awareness Session Presentation to staff 22 July – 11:00.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Small Peer-Peer PC Network No dedicated (full- time) server User PCs supply services to each other So user PCs act both as clients and as servers.
National Diploma Unit 4 Introduction to Software Development Program specification & development.
Communication Methods
WINS Monthly Meeting 02/04/2011
Summer Work. Stuff Wot We Have Dun Reinstalled software on all curriculum PCs All admin PCs upgraded to Windows 7 Fixed wireless issues in English & Langs.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Online Canon Printer Support & Customer Services
Making the Cloud Less Cloudy
Upgrading your Internet Connection
ExpressRoute for Office 365 Training
HP Printer Customer Support. In today’s technology era, we are surrounded with lots of devices/gadgets which we use in our day to day life. Now, we are.
Webroot Antivirus As far as you all know that Webroot is a reputed brand in the international Security software market. It’s provides excellent.
ExpressRoute for Office 365 Training
Select or enter a Customer
CYBERSAFETY & Personal information
About EverydayComply A Solution designed to:
Copyright Course Technology 2001
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Presentation transcript:

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Risk of Change: Networks and Software COMM80: Risk Assessment of Systems Change Unit 12

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Objectives of Session Coverage To appreciate the impact networks and systems have on one another. To be aware of the need for risk assessment of these aspects.

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 The Impact of Network Failure Network Failure Data Loss

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Dealing with the Risk United we stand, Divided we fall (fail). So where is risk assessment of networks covered?

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Software Change Affected by the Network: Bandwith Example Framing Technology! (200 staff). Based in old Victorian hospital ward, Invested heavily in network installation. Call centre takes orders for bespoke picture frames.Use networked software. Moving to purpose built premises in one year. No more spend on the existing building.

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Software System Upgrade: –Written and tested in software consultancy’s premises. Worked fine. –At Framing Technology! performance was so poor that it was immediately withdrawn. –Upgraded PCs: didn’t help. –The network bandwidth could not support the requirements of the new software. Software Change Affected by the Network: Bandwith Example

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Software Change Affected by the Network: Network Security. Solaplex Windows:10 in factory, 5 in office. Bought in purchase order system. Peer to peer network environment. Software installed on all office PCs: data only on purchase order clerk’s PC. Implemented in March, operated well.

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 June: PO clerk away for 3 week break, un-contactable. Machines were powered down before he went. The following week data couldn’t be accessed: password unavailable. Impact: Delay in paying invoices, damaged reputation. Software Change Affected by the Network: Network Security.

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 Network Change Affecting Software System Wearhill University : –Business development unit (BDU) reps work from home and customers’ premises. –Heavily reliant on s. Network Project: –High speed internet connections to home, freephone number to ISP. –Access restricted to reps PCs: different addresses from those on campus. –System a success and within budget.

University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 12 University Network Change: –University “blacklisted” by ISPs: poor security allowed “spamming”. –Access restricted to on campus or dial-in users. –BDU reps couldn’t dial-in or access their via their ISP. –Network team wouldn’t change setup. –BDU’s “locked out”. Network change impacted on the BDU’s software and business. Network Change Affecting Software System