Sunteți pe pagina 1din 17

m  m 


   
m
 

2 ³Information is the processed and refined


form of data that is meaningful or useful to the
recipient´.

2 Information processing is a societal activity.

2 A significant part of an individual¶s working


and personal time is spent in recording,
searching for, and absorbing information.
mome facts and figures!

2 As much as 80% of a typical executive¶s time is


spent in the processing and communication of
information.

2 More than 50% of the united states work force is


employed in jobs that primarily involve some
form of information processing like :-
documentation, report generation , analyses,
plans etc.
Importance

2 A valuable asset of any organization to achieve


its goal and securing its existence in today¶s
competitive market.

2 We can say that it works like a backbone for any


organization.
½elping facets

2 ½ardware
2 moftware
2 Database
2 Procedures (documentation at each step)
2 Operations personnel (operators, system analysts,
programmers, data administrators etc.)
  
   
 

Implement so many information system controls:

2 Physical facilities control

2 Terminal access control

2 Backup and recovery


A catastrophe

2 Time :- 6 am
2 Venue :- ½untsville, Alabana
2 Organization:- General Computer mervices (GCm), a
data processing bureau.
2 Event :- GCm caught fire at 6 am.

2 Loss:- Items like all the documentation, company


records and corporate information destroyed in this
catastrophe.
Also hardware were the biggest losses.
2 Problem :- GCm was scheduled to deliver 15
payrolls on the same day.

2 Now, what did GCm people do to manage and


survive without losing a single customer?
ë  

2 Computer and its other equipment installation


consumes few thousands to several million dollars
depending on the size of installation. mo, it
requires protection.
2 Data are mostly stored in magnetic tapes or
magnetic disk packs are highly valuable to the
organization.
2 Any type of disk damage or unauthorized access
and the potential loss from theft may destroy the
information.
Demedies

2 Division of duties (so that a single person does


not have complete control over the processing of
an application), internal and external audit review,
restricted access by operators to program
documentation and restricted access to data files
and program files.
2 In spite of centralized processing, distributed
system is implemented.
M
 

 

2 Gives the ³fail-soft´ protection.


2 Fail-soft protection :- ³The capability to continue
processing at all sites except the non functioning
one is called ³fail-soft´ protection.´
2 Disadvantage of centralized system :- If the server
³goes down´ all processing ceases.
m   
2 Fire
2 Flood
2 ½uman riots
2 Earth Quakes
2 Employee dishonesty .

2 Employee dishonesty problem can be removed from


organization by combination of careful employment
screening plus fidelity insurance.

2 From fire, flood, human riots, earth quakes like loses, the
organization must be well insurance.
G  

2 Today most of all systems are working online and


for this, uses communication networks; there
should be protection against illegal access.
2 Terminals represent access to computer, also
processing capabilities and stored data , therefore ,
there should be :
2 Password control (from password security m W ,or
computer Om).
2 Various locks to prevent unauthorized physical
presence.
^
  

2 For events like fire, natural disaster, malicious


damage or accident that destroys equipments, m W
or data, there need to be procedures to recover
from errors or failures to correct procedures.
2 The general approach to recovery is backup by
creating copies of the files.
2 Example:- If an error destroys records in a file,
backup procedures permit a previous version of a
file to be restored and the processing is repeated.
2 Backup copies of data and m W stored at off
premises.

2 Arrangement of backup sites and facilities .


2 Backup and recovery plan should be established.
2 The backup may be in the form of diskettes or
cassettes with which data should be copied each
night from the organizations.
2 The backup copies should be stored in a secure
locations.
½ow GCm¶s problem was solved?

2 At 10 am GCm operating unit was established at four employee¶s


homes.

2 Customers were informed about the fact and the entire processing
was continued without any break.

2 Cause of muccess:-
2 Nearly all the GCm m W programs were accessible because a
³backup system´ was housed.

2 Within 10 days ,GCm¶s hardware vendors (insurance company)


had supplied them the needed equipments.
m  m 


   
m