SlideShare a Scribd company logo
1 of 47
Download to read offline
Systems Analysis and Design
9th Edition
Chapter 12
Managing Systems Support and
Security
Phase Description
• Systems Operation, Support, and Security is the
final phase in the systems development life cycle
• You will support and maintain the system, handle
security issues, protect the integrity of the system
and its data, and be alert to any signs of
obsolescence
• The deliverable for this phase is an operational
system that is properly maintained, supported,
and secured
2
Chapter Objectives
• Explain the systems support and security
phase
• Describe user support activities, including user
training and help desks
• Define the four types of maintenance
• Explain various techniques for managing
systems maintenance and support
3
Chapter Objectives
• Describe techniques for
measuring, managing, and planning system
performance
• Explain risk management concepts
• Assess system security at six levels: physical
security, network security, application
security, file security, user security, and
procedural security
4
Chapter Objectives
• Describe backup and disaster recovery
• List factors indicating that a system has
reached the end of its useful life
• Assess future challenges and opportunities for
IT professionals
• Develop a strategic plan for career
advancement and strong IT credentials
5
Introduction
• Managing systems support and security
involves three main concerns: user
expectations, system performance, and
security requirements
• Successful, robust systems often need the
most support
• In most organizations, more than half of all IT
department effort goes into supporting
existing systems
6
Overview
• The systems support and security phase
begins when a system becomes operational
and continues until the system reaches the
end of its useful life
• After delivering the system, the IT team
focuses on support and maintenance tasks
7
User Support
• User Training
– Additionally, new
employees must be trained
on the company’s
information systems
– User training package
– Training users about
system changes is similar
to initial training
– Objective is to show users
how the system can help
them perform their jobs
8
User Support
• Help Desks
– Enhance productivity
and improve utilization
of a company’s
information resources
– The help desk is a central
contact point for all IT
maintenance activities
– Can utilize many types of
automated support
9
User Support
• Outsourcing Issues
– Offshore call centers can trim expenses and free
up valuable human resources for product
development
– Critical factors might include phone wait times,
support staff performance, and online support
tools
10
Maintenance Tasks
11
Maintenance Tasks
• Corrective Maintenance
– Diagnoses and corrects errors in an operational
system
– Respond to errors in various ways, depending on
nature
– Worst-case situation is a system failure
– When the system is operational again, the
maintenance team determines the cause, analyzes
the problem, and designs a permanent solution
12
Maintenance Tasks
• Adaptive Maintenance
– Adds enhancements to an operational system and
makes the system easier to use
– The procedure for minor adaptive maintenance is
similar to routine corrective maintenance
– Can be more difficult than new systems
development because the enhancements must
work within the constraints of an existing system
13
Maintenance Tasks
• Perfective Maintenance
– Involves changing an operational system to make
it more efficient, reliable and maintainable
– Cost-effective during the middle of the system’s
operational life
– Programs that need a large number of
maintenance changes usually are good candidates
for reengineering
– The more a program changes, the more likely it is
to become inefficient and difficult to maintain
14
Maintenance Tasks
• Preventive Maintenance
– Requires analysis of areas where trouble is likely
to occur
– IT department normally initiates preventive
maintenance
– Often results in increased user
satisfaction, decreased downtime, and reduced
TCO
– Sometimes does not receive the high priority that
it deserves
15
Maintenance Management
• The Maintenance Team
– System administrator
– Systems analysts
– Programmers
– Organizational issues
16
Maintenance Management
• Maintenance Requests
– Involve a series of steps
– All work must be covered by a specific request
– Initial determination
– The systems review committee
– Task completion
– User notification
17
Maintenance Management
• Establishing Priorities
– In many companies, systems review committee
separates maintenance requests from new
systems development requests
– Some IT managers believe that evaluating all
projects together leads to the best possible
decisions
– Object is to have a procedure that balances new
development and necessary maintenance work
18
Maintenance Management
• Configuration
Management
– As enterprise-wide
information systems
grow more
complex, configuration
management becomes
critical
– Also helps to organize
and handle
documentation
19
Maintenance Management
• Maintenance Releases
– A numbering pattern
distinguishes the
different releases
– Reduces the
documentation burden
– Service packs
• Version Control
– Archived
– Essential part of system
documentation
20
Maintenance Management
• Baselines
– Systems analysts use baselines as yardsticks to
document features and performance during the
systems development process
– Functional baseline
– Allocated baseline
– Product baseline
21
System Performance Management
• Fault Management
– The more complex the
system, the more
difficult it can be to
analyze symptoms and
isolate a cause
– The best strategy is to
prevent problems by
monitoring system
performance and
workload
22
System Performance Management
• Performance and Workload Measurement
– Benchmark testing
– Metrics
– Response time
– Bandwidth and throughput
• Kbps (kilobits per second)
• Mbps (megabits per second)
• Gbps (gigabits per second)
23
System Performance Management
• Performance and Workload Measurement
– Turnaround time
– The IT department often measures response
time, bandwidth, throughput, and turnaround
time to evaluate system performance both before
and after changes to the system or business
information requirements
– Management uses current performance and
workload data as input for the capacity planning
process
24
System Performance Management
• Capacity Planning
– What-if analysis
– Need detailed
information
– Need an accurate
forecast of future
business activities
– Should develop
contingency plans based
on input from users and
management
25
System Performance Management
• System Maintenance Tools
– Many CASE tools include system evaluation and
maintenance features
– In addition to CASE tools, you also can use
spreadsheet and presentation software to
calculate trends, perform what-if analyses, and
create attractive charts and graphs to display the
results
26
System Security Overview
• Security is a vital part of
every computer system
• System Security
Concepts
– CIA triangle
– Integrity
– Availability
– Security policy
27
System Security Overview
• Risk Management
– Absolute security is not a
realistic goal
– Risk identification -
exploit
– Risk assessment - risk
– Risk control
• Avoidance, mitigation,
transference, acceptance
28
System Security Overview
• Attacker Profiles and Attacks
– An attack might be launched by a disgruntled
employee, or a hacker who is 10,000 miles away
– Attackers break into a system to cause damage,
steal information, or gain recognition, among
other reasons
29
Security Levels
• Must consider six
separate but
interrelated levels
• Physical Security
– First level of security
concerns the physical
environment
– Physical access to a
computer represents an
entry point into the
system and must be
controlled and protected
30
Security Levels
• Physical Security
– Operations center
security
– Servers and desktop
computers
– Notebook computers
31
Security Levels
• Network Security
– Network
– Network interface
– Encrypted
– Encrypting network
traffic
32
Security Levels
• Network Security
– Wireless networks
– Private networks
– Virtual private networks
– Ports and services
– Firewalls
33
Security Levels
• Application Security
– Services
– Hardening
– Application permissions
– Input validation
– Patches and updates
– Software Logs
34
Security Levels
• File Security
– Permissions
• Read a file
• Write a file
• Execute a file
• Read a directory
• Write a directory
– User Groups
35
Security Levels
• User Security
– Privilege escalation
attack
– Identity management
– Password protection
– Social engineering
36
Security Levels
• User Security
– User resistance
– New technologies
• Security token
• Procedural Security
– Operational security
– Dumpster diving
– Paper shredders
37
Backup and Disaster Recovery
• Backup Policies
– Backup policy
– Backup media
• Rotation schedule
• Offsiting
– Backup Types
– Retention periods
38
Backup and Disaster Recovery
• Backup Policies
39
Backup and Disaster Recovery
• Business Continuity Issues
– Test plan
– Business continuity plan (BCP)
– Hot site
– Data replication
40
System Obsolescence
• At some point every system becomes obsolete
• Systems operation and support continues until
a replacement system is installed
• At some point in a system’s operational life,
maintenance costs start to increase, users
begin to ask for more features and capability,
new systems requests are submitted, and the
SDLC begins again
41
Future Challenges and Opportunities
• Predictions
– The highest priorities will be the safety and
security of corporate operations, environmental
concerns, and bottom-line TCO
– Gartner, Inc. is a leading IT consulting firm that is
famous for forecasting industry trends
– Author Randall Stross notes that the enormous
amount of energy needed to drive cloud
computing, including Google’s servers, has raised
serious environmental concerns
42
Future Challenges and Opportunities
• Strategic planning for IT professionals
– Working backwards from your long-term
goals, you can develop intermediate mile stones
and begin to manage your career just as you
would manage an IT project
– Planning a career is not unlike planting a tree that
takes several years to reach a certain height
43
Future Challenges and Opportunities
• IT Credentials and
Certification
– Credentials
– Certification
– In addition to Microsoft,
many other IT industry
leaders offer
certification, including
Cisco, Novell, Oracle,
and Sun Microsystems
44
Future Challenges and Opportunities
• Critical Thinking Skills
– Soft skills
– Certiport, Inc. and the
Educational Testing
Service (ETS) introduced
the iCritical Thinking
certification exam
– Individual and team-
based exercises can
strengthen critical
thinking skills
45
Chapter Summary
• Systems support and security covers the entire
period from the implementation of an
information system until the system no longer is
used
• A systems analyst’s primary involvement with an
operational system is to manage and solve user
support requests
• Systems analysts need the same talents and
abilities for maintenance work as they use when
developing a new system
• Security is a vital part of every computer system
46
Chapter Summary
• All information systems eventually become
obsolete
• An IT professional should have a strategic career
plan that includes long-term goals and
intermediate milestones
• An important element of a personal strategic plan
is the acquisition of IT credentials and
certifications that document specific knowledge
and skills
• Chapter 12 complete
47

More Related Content

Similar to chapter12-120827115424-phpapp01.pdf

Creation of Information Systems.pptx
Creation of Information Systems.pptxCreation of Information Systems.pptx
Creation of Information Systems.pptxjoelphillipGranada2
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systemsOnline
 
IS740 Chapter 12
IS740 Chapter 12IS740 Chapter 12
IS740 Chapter 12iDocs
 
Chapter 4 Requirements ModelInformation Technology Project Management - part ...
Chapter 4 Requirements ModelInformation Technology Project Management - part ...Chapter 4 Requirements ModelInformation Technology Project Management - part ...
Chapter 4 Requirements ModelInformation Technology Project Management - part ...AxmedMaxamuudYoonis
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)yukidiagnosticimagin
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systemsAlonzee Tash
 
Unit-1 part 2.pptx
Unit-1 part 2.pptxUnit-1 part 2.pptx
Unit-1 part 2.pptxHKShab
 
chapter04-120827115356-phpapp01.pdf
chapter04-120827115356-phpapp01.pdfchapter04-120827115356-phpapp01.pdf
chapter04-120827115356-phpapp01.pdfAxmedMaxamuud6
 
Presilient Worldwide at a Glance
Presilient Worldwide at a GlancePresilient Worldwide at a Glance
Presilient Worldwide at a GlanceKrystanne
 
01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.pptiqbal051663
 
Cibm workshop2 chapter ten
Cibm  workshop2 chapter tenCibm  workshop2 chapter ten
Cibm workshop2 chapter tenShaheen Khan
 
Project Management for Information System Development
Project Management for Information System DevelopmentProject Management for Information System Development
Project Management for Information System DevelopmentNabilaNuzhat
 

Similar to chapter12-120827115424-phpapp01.pdf (20)

9780324665284_PPT_ch13.ppt
9780324665284_PPT_ch13.ppt9780324665284_PPT_ch13.ppt
9780324665284_PPT_ch13.ppt
 
Creation of Information Systems.pptx
Creation of Information Systems.pptxCreation of Information Systems.pptx
Creation of Information Systems.pptx
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systems
 
IS740 Chapter 12
IS740 Chapter 12IS740 Chapter 12
IS740 Chapter 12
 
Chapter 4 Requirements ModelInformation Technology Project Management - part ...
Chapter 4 Requirements ModelInformation Technology Project Management - part ...Chapter 4 Requirements ModelInformation Technology Project Management - part ...
Chapter 4 Requirements ModelInformation Technology Project Management - part ...
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
Sadchap01
Sadchap01Sadchap01
Sadchap01
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systems
 
Unit-1 part 2.pptx
Unit-1 part 2.pptxUnit-1 part 2.pptx
Unit-1 part 2.pptx
 
chapter04-120827115356-phpapp01.pdf
chapter04-120827115356-phpapp01.pdfchapter04-120827115356-phpapp01.pdf
chapter04-120827115356-phpapp01.pdf
 
Lec01.pptx
Lec01.pptxLec01.pptx
Lec01.pptx
 
Presilient Worldwide at a Glance
Presilient Worldwide at a GlancePresilient Worldwide at a Glance
Presilient Worldwide at a Glance
 
Lec # 1 chapter 2
Lec # 1 chapter 2Lec # 1 chapter 2
Lec # 1 chapter 2
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt
 
Mis chapter 8
Mis chapter 8Mis chapter 8
Mis chapter 8
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
 
Presenation
PresenationPresenation
Presenation
 
Cibm workshop2 chapter ten
Cibm  workshop2 chapter tenCibm  workshop2 chapter ten
Cibm workshop2 chapter ten
 
Project Management for Information System Development
Project Management for Information System DevelopmentProject Management for Information System Development
Project Management for Information System Development
 

More from AxmedMaxamuud6

chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfAxmedMaxamuud6
 
chapter03-120827115353-phpapp02.pdf
chapter03-120827115353-phpapp02.pdfchapter03-120827115353-phpapp02.pdf
chapter03-120827115353-phpapp02.pdfAxmedMaxamuud6
 
chapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfchapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfAxmedMaxamuud6
 
chapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdfchapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdfAxmedMaxamuud6
 
chapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfchapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfAxmedMaxamuud6
 
chapter06-120827115400-phpapp01.pdf
chapter06-120827115400-phpapp01.pdfchapter06-120827115400-phpapp01.pdf
chapter06-120827115400-phpapp01.pdfAxmedMaxamuud6
 
chapter09-120827115409-phpapp01.pdf
chapter09-120827115409-phpapp01.pdfchapter09-120827115409-phpapp01.pdf
chapter09-120827115409-phpapp01.pdfAxmedMaxamuud6
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptAxmedMaxamuud6
 

More from AxmedMaxamuud6 (8)

chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdf
 
chapter03-120827115353-phpapp02.pdf
chapter03-120827115353-phpapp02.pdfchapter03-120827115353-phpapp02.pdf
chapter03-120827115353-phpapp02.pdf
 
chapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfchapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdf
 
chapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdfchapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdf
 
chapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfchapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdf
 
chapter06-120827115400-phpapp01.pdf
chapter06-120827115400-phpapp01.pdfchapter06-120827115400-phpapp01.pdf
chapter06-120827115400-phpapp01.pdf
 
chapter09-120827115409-phpapp01.pdf
chapter09-120827115409-phpapp01.pdfchapter09-120827115409-phpapp01.pdf
chapter09-120827115409-phpapp01.pdf
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

chapter12-120827115424-phpapp01.pdf

  • 1. Systems Analysis and Design 9th Edition Chapter 12 Managing Systems Support and Security
  • 2. Phase Description • Systems Operation, Support, and Security is the final phase in the systems development life cycle • You will support and maintain the system, handle security issues, protect the integrity of the system and its data, and be alert to any signs of obsolescence • The deliverable for this phase is an operational system that is properly maintained, supported, and secured 2
  • 3. Chapter Objectives • Explain the systems support and security phase • Describe user support activities, including user training and help desks • Define the four types of maintenance • Explain various techniques for managing systems maintenance and support 3
  • 4. Chapter Objectives • Describe techniques for measuring, managing, and planning system performance • Explain risk management concepts • Assess system security at six levels: physical security, network security, application security, file security, user security, and procedural security 4
  • 5. Chapter Objectives • Describe backup and disaster recovery • List factors indicating that a system has reached the end of its useful life • Assess future challenges and opportunities for IT professionals • Develop a strategic plan for career advancement and strong IT credentials 5
  • 6. Introduction • Managing systems support and security involves three main concerns: user expectations, system performance, and security requirements • Successful, robust systems often need the most support • In most organizations, more than half of all IT department effort goes into supporting existing systems 6
  • 7. Overview • The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life • After delivering the system, the IT team focuses on support and maintenance tasks 7
  • 8. User Support • User Training – Additionally, new employees must be trained on the company’s information systems – User training package – Training users about system changes is similar to initial training – Objective is to show users how the system can help them perform their jobs 8
  • 9. User Support • Help Desks – Enhance productivity and improve utilization of a company’s information resources – The help desk is a central contact point for all IT maintenance activities – Can utilize many types of automated support 9
  • 10. User Support • Outsourcing Issues – Offshore call centers can trim expenses and free up valuable human resources for product development – Critical factors might include phone wait times, support staff performance, and online support tools 10
  • 12. Maintenance Tasks • Corrective Maintenance – Diagnoses and corrects errors in an operational system – Respond to errors in various ways, depending on nature – Worst-case situation is a system failure – When the system is operational again, the maintenance team determines the cause, analyzes the problem, and designs a permanent solution 12
  • 13. Maintenance Tasks • Adaptive Maintenance – Adds enhancements to an operational system and makes the system easier to use – The procedure for minor adaptive maintenance is similar to routine corrective maintenance – Can be more difficult than new systems development because the enhancements must work within the constraints of an existing system 13
  • 14. Maintenance Tasks • Perfective Maintenance – Involves changing an operational system to make it more efficient, reliable and maintainable – Cost-effective during the middle of the system’s operational life – Programs that need a large number of maintenance changes usually are good candidates for reengineering – The more a program changes, the more likely it is to become inefficient and difficult to maintain 14
  • 15. Maintenance Tasks • Preventive Maintenance – Requires analysis of areas where trouble is likely to occur – IT department normally initiates preventive maintenance – Often results in increased user satisfaction, decreased downtime, and reduced TCO – Sometimes does not receive the high priority that it deserves 15
  • 16. Maintenance Management • The Maintenance Team – System administrator – Systems analysts – Programmers – Organizational issues 16
  • 17. Maintenance Management • Maintenance Requests – Involve a series of steps – All work must be covered by a specific request – Initial determination – The systems review committee – Task completion – User notification 17
  • 18. Maintenance Management • Establishing Priorities – In many companies, systems review committee separates maintenance requests from new systems development requests – Some IT managers believe that evaluating all projects together leads to the best possible decisions – Object is to have a procedure that balances new development and necessary maintenance work 18
  • 19. Maintenance Management • Configuration Management – As enterprise-wide information systems grow more complex, configuration management becomes critical – Also helps to organize and handle documentation 19
  • 20. Maintenance Management • Maintenance Releases – A numbering pattern distinguishes the different releases – Reduces the documentation burden – Service packs • Version Control – Archived – Essential part of system documentation 20
  • 21. Maintenance Management • Baselines – Systems analysts use baselines as yardsticks to document features and performance during the systems development process – Functional baseline – Allocated baseline – Product baseline 21
  • 22. System Performance Management • Fault Management – The more complex the system, the more difficult it can be to analyze symptoms and isolate a cause – The best strategy is to prevent problems by monitoring system performance and workload 22
  • 23. System Performance Management • Performance and Workload Measurement – Benchmark testing – Metrics – Response time – Bandwidth and throughput • Kbps (kilobits per second) • Mbps (megabits per second) • Gbps (gigabits per second) 23
  • 24. System Performance Management • Performance and Workload Measurement – Turnaround time – The IT department often measures response time, bandwidth, throughput, and turnaround time to evaluate system performance both before and after changes to the system or business information requirements – Management uses current performance and workload data as input for the capacity planning process 24
  • 25. System Performance Management • Capacity Planning – What-if analysis – Need detailed information – Need an accurate forecast of future business activities – Should develop contingency plans based on input from users and management 25
  • 26. System Performance Management • System Maintenance Tools – Many CASE tools include system evaluation and maintenance features – In addition to CASE tools, you also can use spreadsheet and presentation software to calculate trends, perform what-if analyses, and create attractive charts and graphs to display the results 26
  • 27. System Security Overview • Security is a vital part of every computer system • System Security Concepts – CIA triangle – Integrity – Availability – Security policy 27
  • 28. System Security Overview • Risk Management – Absolute security is not a realistic goal – Risk identification - exploit – Risk assessment - risk – Risk control • Avoidance, mitigation, transference, acceptance 28
  • 29. System Security Overview • Attacker Profiles and Attacks – An attack might be launched by a disgruntled employee, or a hacker who is 10,000 miles away – Attackers break into a system to cause damage, steal information, or gain recognition, among other reasons 29
  • 30. Security Levels • Must consider six separate but interrelated levels • Physical Security – First level of security concerns the physical environment – Physical access to a computer represents an entry point into the system and must be controlled and protected 30
  • 31. Security Levels • Physical Security – Operations center security – Servers and desktop computers – Notebook computers 31
  • 32. Security Levels • Network Security – Network – Network interface – Encrypted – Encrypting network traffic 32
  • 33. Security Levels • Network Security – Wireless networks – Private networks – Virtual private networks – Ports and services – Firewalls 33
  • 34. Security Levels • Application Security – Services – Hardening – Application permissions – Input validation – Patches and updates – Software Logs 34
  • 35. Security Levels • File Security – Permissions • Read a file • Write a file • Execute a file • Read a directory • Write a directory – User Groups 35
  • 36. Security Levels • User Security – Privilege escalation attack – Identity management – Password protection – Social engineering 36
  • 37. Security Levels • User Security – User resistance – New technologies • Security token • Procedural Security – Operational security – Dumpster diving – Paper shredders 37
  • 38. Backup and Disaster Recovery • Backup Policies – Backup policy – Backup media • Rotation schedule • Offsiting – Backup Types – Retention periods 38
  • 39. Backup and Disaster Recovery • Backup Policies 39
  • 40. Backup and Disaster Recovery • Business Continuity Issues – Test plan – Business continuity plan (BCP) – Hot site – Data replication 40
  • 41. System Obsolescence • At some point every system becomes obsolete • Systems operation and support continues until a replacement system is installed • At some point in a system’s operational life, maintenance costs start to increase, users begin to ask for more features and capability, new systems requests are submitted, and the SDLC begins again 41
  • 42. Future Challenges and Opportunities • Predictions – The highest priorities will be the safety and security of corporate operations, environmental concerns, and bottom-line TCO – Gartner, Inc. is a leading IT consulting firm that is famous for forecasting industry trends – Author Randall Stross notes that the enormous amount of energy needed to drive cloud computing, including Google’s servers, has raised serious environmental concerns 42
  • 43. Future Challenges and Opportunities • Strategic planning for IT professionals – Working backwards from your long-term goals, you can develop intermediate mile stones and begin to manage your career just as you would manage an IT project – Planning a career is not unlike planting a tree that takes several years to reach a certain height 43
  • 44. Future Challenges and Opportunities • IT Credentials and Certification – Credentials – Certification – In addition to Microsoft, many other IT industry leaders offer certification, including Cisco, Novell, Oracle, and Sun Microsystems 44
  • 45. Future Challenges and Opportunities • Critical Thinking Skills – Soft skills – Certiport, Inc. and the Educational Testing Service (ETS) introduced the iCritical Thinking certification exam – Individual and team- based exercises can strengthen critical thinking skills 45
  • 46. Chapter Summary • Systems support and security covers the entire period from the implementation of an information system until the system no longer is used • A systems analyst’s primary involvement with an operational system is to manage and solve user support requests • Systems analysts need the same talents and abilities for maintenance work as they use when developing a new system • Security is a vital part of every computer system 46
  • 47. Chapter Summary • All information systems eventually become obsolete • An IT professional should have a strategic career plan that includes long-term goals and intermediate milestones • An important element of a personal strategic plan is the acquisition of IT credentials and certifications that document specific knowledge and skills • Chapter 12 complete 47