SlideShare a Scribd company logo
1 of 8
CHANGE MANAGEMENT PROCESS
⚫ The change management process is the sequence of steps or
activities that a change management team or project leader
would follow to apply change management to a project or
change. a change management process that contains the
following three parts.:
⚫ Preparing for change (Preparation, assessment and
strategy development)
⚫ Managing change (Detailed planning and change
management implementation)
⚫ Reinforcing change (Data gathering, corrective action and
recognition)
CONTROL IN INFORMATION
SYSTEM
CONTROL IN INFORMATION SYSTEM
⚫ To ensure secure and efficient operation of information systems, an
organization institutes a set of procedures and technological measures
called controls.
⚫ Implemented through: -
 Policies
 Procedures
 Standards
⚫ Control must be thought about through all stages of information
systems analysis, construction and maintenance.
TYPES OF CONTROL
 Physical Controls: -
 It refer to the protection of computer facilities and other IS
resources. This includes protecting computer hardware,
computer software, database, computer networks.etc
 Technical Controls: -
 controls which are implemented in the application of IS itself.
These types of controls include access controls, data security
controls, communication controls etc.
 Administrative Controls: -
 controls which include clear guidelines, policies of the
organisations with regards to the use and deployment of IS
resources are very important in protecting ISs.
 For example: - email policy, internet use policy, access
privileges of employees,
 General Controls: -
 These controls are implemented so as to ensure that
ISs are protected from Various potential threats.
 For example: - system development controls like
budgeting, schedule, quality etc.
 Application Controls: -
 the application controls, as the name implies, are
embedded within the application itself. These controls
are usually written as validation rules. These controls
are popularly known as input controls, processing
controls, and output controls.
IS SECURITY THREATS
1. Human errors/failures: - unintentional errors made by
authorised user.
2. Manipulation of data/systems: - deliberate acts of some
persons or organisations, designed to harm the data or
information systems of an organisation.
3. Theft of data/systems: - deliberate attempt of some person to
steal the important data of an organisation.
4. Destruction from virus: - A Virus is computer code that has
been inserted into a piece of software. Upon execution of the
software the virus is also executed.
5. Natural disasters: - forces of nature that cannot be prevented
or controlled. Such as fire, flood, earthquake, Lightning etc.
IS SECURITY THREATS
1. Human errors/failures: - unintentional errors made by
authorised user.
2. Manipulation of data/systems: - deliberate acts of some
persons or organisations, designed to harm the data or
information systems of an organisation.
3. Theft of data/systems: - deliberate attempt of some person to
steal the important data of an organisation.
4. Destruction from virus: - A Virus is computer code that has
been inserted into a piece of software. Upon execution of the
software the virus is also executed.
5. Natural disasters: - forces of nature that cannot be prevented
or controlled. Such as fire, flood, earthquake, Lightning etc.

More Related Content

Similar to CHANGE MANAGEMENT PROCESS.pptx

Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxToxicHawk
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxhamzaalkhairi802
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentjenito21
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components iiAshish Desai
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 

Similar to CHANGE MANAGEMENT PROCESS.pptx (20)

Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
R.a 1
R.a 1R.a 1
R.a 1
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 

More from rajalakshmi5921

Module_-_3_Product_Mgt_&_Pricing[1].pptx
Module_-_3_Product_Mgt_&_Pricing[1].pptxModule_-_3_Product_Mgt_&_Pricing[1].pptx
Module_-_3_Product_Mgt_&_Pricing[1].pptxrajalakshmi5921
 
mental health education for learners.pdf
mental health education for  learners.pdfmental health education for  learners.pdf
mental health education for learners.pdfrajalakshmi5921
 
General Nurses Role in child mental CAP.pptx
General Nurses Role in  child mental CAP.pptxGeneral Nurses Role in  child mental CAP.pptx
General Nurses Role in child mental CAP.pptxrajalakshmi5921
 
Role of Family in Mental Health welbeing.pptx
Role of Family in Mental Health welbeing.pptxRole of Family in Mental Health welbeing.pptx
Role of Family in Mental Health welbeing.pptxrajalakshmi5921
 
Developmental disorders in children .pptx
Developmental disorders in children .pptxDevelopmental disorders in children .pptx
Developmental disorders in children .pptxrajalakshmi5921
 
Bangaluru Water crisis problem solving method.pptx
Bangaluru Water crisis problem solving method.pptxBangaluru Water crisis problem solving method.pptx
Bangaluru Water crisis problem solving method.pptxrajalakshmi5921
 
The efforts made by Karnataka government not enough.pptx
The efforts made by Karnataka government not enough.pptxThe efforts made by Karnataka government not enough.pptx
The efforts made by Karnataka government not enough.pptxrajalakshmi5921
 
business excellence in technology and industry
business excellence in technology and industrybusiness excellence in technology and industry
business excellence in technology and industryrajalakshmi5921
 
employablility training mba mca students to get updated
employablility training mba mca students to get updatedemployablility training mba mca students to get updated
employablility training mba mca students to get updatedrajalakshmi5921
 
EDAB Module 5 Singular Value Decomposition (SVD).pptx
EDAB Module 5 Singular Value Decomposition (SVD).pptxEDAB Module 5 Singular Value Decomposition (SVD).pptx
EDAB Module 5 Singular Value Decomposition (SVD).pptxrajalakshmi5921
 
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSSupport Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSrajalakshmi5921
 
Business Administration Expertise.pptx
Business Administration Expertise.pptxBusiness Administration Expertise.pptx
Business Administration Expertise.pptxrajalakshmi5921
 
R basics for MBA Students[1].pptx
R basics for MBA Students[1].pptxR basics for MBA Students[1].pptx
R basics for MBA Students[1].pptxrajalakshmi5921
 
employablility training mba mca.pptx
employablility training mba mca.pptxemployablility training mba mca.pptx
employablility training mba mca.pptxrajalakshmi5921
 
Singular Value Decomposition (SVD).pptx
Singular Value Decomposition (SVD).pptxSingular Value Decomposition (SVD).pptx
Singular Value Decomposition (SVD).pptxrajalakshmi5921
 
variableselectionmodelBuilding.ppt
variableselectionmodelBuilding.pptvariableselectionmodelBuilding.ppt
variableselectionmodelBuilding.pptrajalakshmi5921
 
Statistical Learning and Model Selection (1).pptx
Statistical Learning and Model Selection (1).pptxStatistical Learning and Model Selection (1).pptx
Statistical Learning and Model Selection (1).pptxrajalakshmi5921
 
How to obtain and install R.ppt
How to obtain and install R.pptHow to obtain and install R.ppt
How to obtain and install R.pptrajalakshmi5921
 
scm second module ppt.ppt
scm second module ppt.pptscm second module ppt.ppt
scm second module ppt.pptrajalakshmi5921
 

More from rajalakshmi5921 (20)

Module_-_3_Product_Mgt_&_Pricing[1].pptx
Module_-_3_Product_Mgt_&_Pricing[1].pptxModule_-_3_Product_Mgt_&_Pricing[1].pptx
Module_-_3_Product_Mgt_&_Pricing[1].pptx
 
mental health education for learners.pdf
mental health education for  learners.pdfmental health education for  learners.pdf
mental health education for learners.pdf
 
General Nurses Role in child mental CAP.pptx
General Nurses Role in  child mental CAP.pptxGeneral Nurses Role in  child mental CAP.pptx
General Nurses Role in child mental CAP.pptx
 
Role of Family in Mental Health welbeing.pptx
Role of Family in Mental Health welbeing.pptxRole of Family in Mental Health welbeing.pptx
Role of Family in Mental Health welbeing.pptx
 
Developmental disorders in children .pptx
Developmental disorders in children .pptxDevelopmental disorders in children .pptx
Developmental disorders in children .pptx
 
Bangaluru Water crisis problem solving method.pptx
Bangaluru Water crisis problem solving method.pptxBangaluru Water crisis problem solving method.pptx
Bangaluru Water crisis problem solving method.pptx
 
The efforts made by Karnataka government not enough.pptx
The efforts made by Karnataka government not enough.pptxThe efforts made by Karnataka government not enough.pptx
The efforts made by Karnataka government not enough.pptx
 
business excellence in technology and industry
business excellence in technology and industrybusiness excellence in technology and industry
business excellence in technology and industry
 
employablility training mba mca students to get updated
employablility training mba mca students to get updatedemployablility training mba mca students to get updated
employablility training mba mca students to get updated
 
EDAB Module 5 Singular Value Decomposition (SVD).pptx
EDAB Module 5 Singular Value Decomposition (SVD).pptxEDAB Module 5 Singular Value Decomposition (SVD).pptx
EDAB Module 5 Singular Value Decomposition (SVD).pptx
 
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSSupport Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
 
Business Administration Expertise.pptx
Business Administration Expertise.pptxBusiness Administration Expertise.pptx
Business Administration Expertise.pptx
 
R basics for MBA Students[1].pptx
R basics for MBA Students[1].pptxR basics for MBA Students[1].pptx
R basics for MBA Students[1].pptx
 
RRCE MBA students.pptx
RRCE MBA students.pptxRRCE MBA students.pptx
RRCE MBA students.pptx
 
employablility training mba mca.pptx
employablility training mba mca.pptxemployablility training mba mca.pptx
employablility training mba mca.pptx
 
Singular Value Decomposition (SVD).pptx
Singular Value Decomposition (SVD).pptxSingular Value Decomposition (SVD).pptx
Singular Value Decomposition (SVD).pptx
 
variableselectionmodelBuilding.ppt
variableselectionmodelBuilding.pptvariableselectionmodelBuilding.ppt
variableselectionmodelBuilding.ppt
 
Statistical Learning and Model Selection (1).pptx
Statistical Learning and Model Selection (1).pptxStatistical Learning and Model Selection (1).pptx
Statistical Learning and Model Selection (1).pptx
 
How to obtain and install R.ppt
How to obtain and install R.pptHow to obtain and install R.ppt
How to obtain and install R.ppt
 
scm second module ppt.ppt
scm second module ppt.pptscm second module ppt.ppt
scm second module ppt.ppt
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

CHANGE MANAGEMENT PROCESS.pptx

  • 1. CHANGE MANAGEMENT PROCESS ⚫ The change management process is the sequence of steps or activities that a change management team or project leader would follow to apply change management to a project or change. a change management process that contains the following three parts.: ⚫ Preparing for change (Preparation, assessment and strategy development) ⚫ Managing change (Detailed planning and change management implementation) ⚫ Reinforcing change (Data gathering, corrective action and recognition)
  • 2.
  • 4. CONTROL IN INFORMATION SYSTEM ⚫ To ensure secure and efficient operation of information systems, an organization institutes a set of procedures and technological measures called controls. ⚫ Implemented through: -  Policies  Procedures  Standards ⚫ Control must be thought about through all stages of information systems analysis, construction and maintenance.
  • 5. TYPES OF CONTROL  Physical Controls: -  It refer to the protection of computer facilities and other IS resources. This includes protecting computer hardware, computer software, database, computer networks.etc  Technical Controls: -  controls which are implemented in the application of IS itself. These types of controls include access controls, data security controls, communication controls etc.  Administrative Controls: -  controls which include clear guidelines, policies of the organisations with regards to the use and deployment of IS resources are very important in protecting ISs.  For example: - email policy, internet use policy, access privileges of employees,
  • 6.  General Controls: -  These controls are implemented so as to ensure that ISs are protected from Various potential threats.  For example: - system development controls like budgeting, schedule, quality etc.  Application Controls: -  the application controls, as the name implies, are embedded within the application itself. These controls are usually written as validation rules. These controls are popularly known as input controls, processing controls, and output controls.
  • 7. IS SECURITY THREATS 1. Human errors/failures: - unintentional errors made by authorised user. 2. Manipulation of data/systems: - deliberate acts of some persons or organisations, designed to harm the data or information systems of an organisation. 3. Theft of data/systems: - deliberate attempt of some person to steal the important data of an organisation. 4. Destruction from virus: - A Virus is computer code that has been inserted into a piece of software. Upon execution of the software the virus is also executed. 5. Natural disasters: - forces of nature that cannot be prevented or controlled. Such as fire, flood, earthquake, Lightning etc.
  • 8. IS SECURITY THREATS 1. Human errors/failures: - unintentional errors made by authorised user. 2. Manipulation of data/systems: - deliberate acts of some persons or organisations, designed to harm the data or information systems of an organisation. 3. Theft of data/systems: - deliberate attempt of some person to steal the important data of an organisation. 4. Destruction from virus: - A Virus is computer code that has been inserted into a piece of software. Upon execution of the software the virus is also executed. 5. Natural disasters: - forces of nature that cannot be prevented or controlled. Such as fire, flood, earthquake, Lightning etc.