This document discusses management information systems and related topics. It covers external forces like competition and internal factors like the need for knowledge-intensive work that are driving changes in information systems. It also discusses the components of information systems, including input/output processes and data processing. Steps in the system development life cycle are outlined. The advantages and disadvantages of enterprise resource planning systems are listed. The distinction between system software and application software is explained. Network security defenses like firewalls and their role in protecting information are described.
2. External forces:-
Cut throat competition
Insistence on customization
Continuous tech-breakthrough
Changing capabilities of business partner
3. Internal factors:-
Pressure to increase effectiveness
Understanding of cognitive behaviour
Need of knowledge intensive work
Need to move to sharable inteligence
5. Information Systems
5
Why Do People Need Information?
Individuals - Entertainment and enlightenment
Businesses - Decision making, problem solving and
control
MIS 715 Eaton Fall 2001
8. System ??????
Generally used for group of actions, personnel &
procedures, used for processing data
Non involvement of computers – manual systems
Group of interrelated or interacting elements forming
a unified whole.
9. C] Steps in system analysis and design
(SDLC)
SYSTEM DEVELOPMENT LIFE CYCLE
Analyse
Identify Test And
Collection &
Problem Alternative Implement
Data & Select
Definition Solutions
Infrmn Best
YES
Evaluate Successful Stop
Solution
NO
16. Software refers to a program that makes
the computer to do something
meaningful. It is the planned step-by-step
instruction required to turn data into
instruction.
SOFTWARE
17. Types of software
1) System software
Includes programs that are designed carry out
general routine operation such as loading a file,
copying a file, managing memory resources Etc.
It provides support to
Running of other software
Communicating with peripheral devices
development of other software
Monitoring the uses of various hardware
resources.
22. Control against Salami Attack:
If proper auditing of accounts is done then
salami attack can be easily caught.
If proper rounding operation is done then
Salami attack will not exist.
If proper testing is done by the user it can be
prevented.
23. Firewalls
Protect from unauthorized access
Provide access to only known users
Allow the people whom the user permit
24. ELECTRONIC SIGNATURES
Electronic signatures are used to authenticate
electronic records.
Digital signatures are one type of electronic
signature.
Digital signatures satisfy three major legal
requirements –
Signer authentication, message authentication
and message integrity.
The technology and efficiency of digital signatures
makes them more trustworthy than hand written
signatures
25. EMAIL MONITORING
Employers should be aware
Org has to secure information such as trade
secrets, intellectual property, customer ,
employee and financial data
26. To keep sensitive data secure
To make a complex password use numbers ,
letters ,and symbols
27. Safe surfing
Means:
keeping ones email address private
not chatting in an open system
visiting secure sites
accepting data from only known users
downloading carefully & from known
sites
28. Frequent virus checks
Floppy disks , CD ROM, pen drives must be
scanned before running
29. Checks inflow of mails to inbox
Suspicious mails are prevented
Email filters
30. General information to be
protected from virus
Do not download from untrustworthy sources
Before start trading files ensure your client
has a safe system
Don’t download E mail until you are 100% sure
If email has an attachment with email go to
headers and look----------
If pif or src extension or .jpg.scr extension it is
a virus
31. Set computer in a safe way so it will not auto
launch files, updates, security checks, html
pages, cookies etc without your permission
Get a quality spyware program
Set up software firewall and make sure all in
LAN are set up it
Set up hard ware fire wall ie easy to set up
32. Don’t let kid on the net
on your system if you
don’t protect your
system nobody else
will------------------