SlideShare a Scribd company logo
1 of 48
Information Systems Based on Type of Decisions
• Systems that support operational, tactical, and strategic
decision are broadly classified into the following categories:
•
•
•
Transaction processing systems (TPS)
Management information systems (MIS)
Intelligent support systems (ISS), which include decision
support systems
(EIS), and expert
(DSS), executive
systems (ES)
information systems
2-7
Functional Information Systems
• Information systems can also be classified
according to function in these four areas:
•
•
•
•
Marketing
Manufacturing and service
Accounting and finance
Human resources
2-9
EIS OAS
MIS
TPS DSS ES
Functional Systems
Dss EIS
MIS
TPS ES
CUSTOMER
GIS EDI
Figure1: Functional Information System
Marketing Information System
A system that meets the marketing information needs of an organization.
•
• Customer-oriented and work toward achieving the strategic sales and marketing plan
• Aim is to gain instantaneous access to global market information
• Primary goal of retaining existing customers and attracting new ones
• Can't be standardized for all companies. Every company has its own
• Marketing system must be tailored to match the marketing policies, procedures and practices
each company.
of
• A very popular marketing information system is one that automates sales and marketing functions.
• Such systems capture valuable customer information and hence can improve productivity, enhance
customer service and create better sales and marketing strategies.
• Are influenced by and influence the strategic business plan and the strategic marketing plan.
.-
. Strategic Business Plan
de
Strategic Sales & Marketing Plan
dr
Strategic Information Plan
d
Market information System
,r
Sales Management
Marketing Mix (Product, place,
price, promotion)
D a t a b a s e s
External .
-
,-
...
..-. Market Intelligence
Market Analysis
I
..
Internal
Market Research
Customer Analysis
Forecasting
Figure2: Marketing Information System
Feedback
Benefits of Marketing Information System
Benefits of Marketing Information System
 Provides employees with information that helps companies capture niche
markets in highly competitive
 Helps in sales forecasting.
 Able to provide demand forecast. Helps in achieving a company's goal.
 Marketing Information system have a deep and direct influence on the
quality of customer service.
 Assists the marketing manager to maintain the better relationship with
valuable customer.
Manufacturing Information System
A system that supports the manufacturing functions of:
•
•
•
•
•
purchasing, receiving, quality control
inventory management, material requirement planning,
Production scheduling and plant design.
Applies to both manufacturing and service industries
capacity planning
Manufacturing should be viewed within the broad context of delivering
both goods and services since a manufacturer of automobile parts and a
travel agency are likely to have manufacturing information system.
Production system is a subset of manufacturing information system.
Production system pertains to the production of goods and services.
It specially addresses information needs relating to raw materials,
equipment, manpower and other issues related to production of goods
and services.
•
•
•
Strategic Business Plan
Strategic Manufacturing Plan
Strategic Information Plan
-
-
Manufacturing
dr
Manufacturing information System J r
. Services
d
Purchasing
Receiving
Databases
~
Quality Control
External -
- ~
,~
Inventory
-
~ Material R
equirement Planning
Capacity Planning
-
-
~
Internal
Scheduling
Facilities Layout
Figure3: Manufacturing Information System
Benefits Mfg. Information System
• Helps supplier to store such as Home Depot
Hardware.
Reduces operating cost and inventory levels
To achieve strategic goal of company
and Ace
•
•
Financial and Accounting Information System(FAIS)
• Provides information related to the accounting and financial activities
an organization
Includes a large number of subsystems that address the
operational, tactical and strategic information needs of the business
Includes some subsystems such as budgeting, cash and asset
of
•
•
management, capital budgeting, portfolio
account receivable, inventory control and
Other subsystems include record keeping,
analysis, general ledger,
payroll systems.
account analysis, cash
•
management, financial analysis, leasing options, insurance underwriting,
insurance claims processing and investment management.
Financial instit ut ion like bank, uses specialized F
AIS, such as commercial
loan analyzers, credit approval system, commercial account rating system,
credit applicat ion system, automated teller cont rol and securit ies trading.
•
Strategic Business Plan
Strategic Financial Plan
d
Strategic Information Plan
•
Financial & Accounting
Information Systems
General Ledger
Databases
Asset management
Order entry, Accounts Receivables, Accounts payable
External
Inventory control, Payroll, Cash management, Capital
management, Investment management
Internal
Long-range Forecasting
Business Intelligence
Figure5: Financial & Accounting Information System
Human Resource Information System (HRIS)
• Supports the planning, control, coordination, administration and
management of an organization's human resources.
HRIS includes a large number of subsystems that address the informat ion
needs of various human resource functions.
They provide managers with information, policies and procedures
concerning recruiting, layoffs, employee evaluation, promotion,
termination,transfer, salary equity monitoring, job
•
•
descriptions and responsibilities, training, affirmative action and
employment opportunities.
An HRIS also determines how hiring and training decisions made
personnel department can increase sales revenues.
equal
• by the
Strategic Business Plan
Strategic Human Resource Plan
Strategic Information Plan
Human Resource Information
Systems
Personnel
D a t a b a s e s
Payroll
r Benefits
External
Equity Monitoring
Internal
Recruitment
Compliance systems
Manpower Planning
Figure6: H u m a n R e s o u r c e In f o r m a t i o n S ys t em
Developing Cross-functional System
Today, the emphasis is on building cross-functional systems that facilitate
the flow of information among all units in an organization. Some critics to
develop a Cross-functional System are:
1. Decision-making should not be compartmentalized in functional areas,
but should instead be viewed in the context of the entire organization
2. A close link is made in between information system and functional
system.
3. System must be designed in such a way that it can work combinely with
both the systems
For example, a report of the number of people who worked overtime
last month or the number of machines that operated during the night
shift last month (manufacturing) are often the output of an MIS.
12-15
Strategic Information
Systems
12-16
12-17
12-18
Definition of SIS
 Researchers have classified IS into
three categories:
Systems that support business
functions
Systems that support strategic
planning such as DSS and EIS
Systems that are a part of a
firm’s strategy
12-19
Definition of SIS Contd…
 Strategic Information System (SIS)
A system that delivers information
products and services that play a
direct and prominent role in helping
the firm achieve its strategic goals.
12-20
Definition of SIS Contd…
An SIS also supplies an organization with
Business Intelligence or competitive
information
 Business Intelligence
Business Intelligence consists of internal
and external data used to assess and
analyze opportunities and threats in
business environment
12-21
Types of SIS
SIS can be external or internal systems.
External strategic systems are used primarily by
external entities in the business environment,
such as customers, suppliers, and distributors.
Benefits to the customer:
1. Increased customer satisfaction
2. Increased customer control
3. Reduction in transaction costs (shipping and
handling costs)
12-22
Types of SIS Contd…
SIS can be external or internal systems.
Internal Strategic Systems are used by employees
within the organization and do not have a value-
added component. They focus on issues such as
improving the quality of products and services
and enhancing the decision-making capabilities
of managers.
Benefits to the Organization:
1. Increased market share
2. Reduction of processing costs
3. Ability to charge higher prices because of
value-added component
4. Increase in profit margins
12-23
Examples of SIS
An example for a SIS is the Automated Teller
Machine (ATM) first introduced by Citibank in
1977. This completely revolutionized the system
in banking industry and forever changed the way
people conducted financial transactions.
ATMs were strategic systems because the only
alternative to ATMs would require banks to open
branch offices at a large number of convenient
locations and these offices would have to remain
open for 24hrs per day, 7 days per week, to
provide the same level of service as ATMs.
12-24
Strategic Information Systems Plan (SISP)
 Strategic Business Plan:
A plan that identifies a company’s goals as a means
of achieving the organizational mission; also
includes what is popularly referred to as SWOT
analysis.
 Strategic Information Systems Plan (SISP):
Identifies the information systems and technologies
that are vital to support a firm’s business strategy;
derived from the strategic business plan.
-Is like a road map that helps IS managers to
identify any potential gaps between what is available
and what should be available to promote good
decision making.
12-25
Strategic Information Systems Plan (SISP) Contd…
The SISP should specifically target the following four
areas:
- Aligning IS investment with business goals
- Exploiting information technologies for competitive
edge
- Ensuring the efficient management of IS resources
-Developing technology policies and practices
12-26
Strategies for Developing an SIS
Steps involved in developing an SISP:
 Establish the purpose of the plan and develop a broad outline
describing what the plan will address.
 Update the strategic business plan and the goals of the
business. Reassess the current business environment
 Identify the existing information systems including hardware,
software, and networking capabilities. Determine future
information needs and systems
 Identify the new systems, projects, and capabilities required to
meet the changing environment and changing information
needs.
 Identify the resources required to implement the plan and to
win the support of top management for the plan.
An organization should ask two important questions before
investing in strategic systems:
- Is the project financially feasible?
- Is the project technically feasible?
12-27
Steps to Ensure Success of Strategic Systems
Re-engineering:
Re-evaluating and radically redesigning the way in which a
company does business; driven by the question, “Why do
we do what we do?”
 Technology decisions should be grounded in a clear
understanding of the processes that drive the technology.
 Strategic systems should be driven by strategic alliances
between trading partners
 Continuous improvement and investment in strategic
systems are essential for their long-term success
 The organizational culture should encourage some risk
taking
 Users must be fully trained if the full potential of the
strategic system is to be achieved
12-28
Potential Barriers for Developing an SIS
 Development (Definition) Barriers:
- Generating Workable ideas requires leadership and teamwork
- Many innovative ideas are technically feasible
- Many innovative ideas are prohibitively expensive
-Many ideas die because they lack a sufficient market.
 Implementation Barriers:
- Telecommunications increases the complexity of implementing
SIS
- Multiple systems are difficult to integrate
- SIS systems often require inter-organizational cooperation
- State-of-the-art technologies are difficult to implement
 Maintenance Barriers:
- Competitors can copy SIS
- Unanticipated demand can overwhelm the usefulness of an SIS
- Applications can be expensive to maintain or enhance
- High exit barriers can cause devastating losses.
12-29
Securing
Information
Systems
12-30
Computer Security
 The process of protecting and
safeguarding hardware, software,
networks, physical facilities, data,
and personnel from accidental,
intentional, or natural disasters.
12-31
Common Types of Security
Violations
 Company data theft by employees
 Gaining access to information stored on computer
networks by cracking passwords
 Industrial espionage by criminals eavesdropping on
wireless communications or on LANs and Internet
connections
 Deliberate, unauthorized modification of software
 Theft of employees’ identities to make outrageous or illegal
statements on the Internet
 Starting or fueling rumors on the Internet that are designed
to harm the company
 Denial of service attacks in which people call a toll-free
number or send an e-mail but the number stays perpetually
busy or they are denied access
12-32
Awareness of Security Violations
0
60
50
10
40
30
20
70
Yes No Unknown
53%
69%
9%
14%
38%
17%
1996
1998
Has your organization been the target of information espionage?
Source: Warroom Research, Inc., Annapolis, Md.
12-33
Why Information Systems Are
Vulnerable
 Increased Access to the System
 Key sources of security breaches are employees,
authorized external users such as suppliers, and
crackers outside the business
 Increased System Complexity
 Information systems today are much more
complex than systems even a few years ago
– the software has many more functions and features and
the hardware has integrated components, all of which
must work together to provide overall system security
– each operating system has its own security features, so
switching to a new operating system can throw previous
security measures into disarray
12-34
Why Information Systems Are
Vulnerable (cont.)
 Cyber Terrorism on the Internet
 The Internet is a haven for those engaging in
security misdeeds
 The Internet connects two million host computers
and provides access to a rich and extensive set
of data and information to millions of users, with
the numbers increasing by 15 percent every
month
 Networks Are the Weakest Link in the Chain
 “Networks are essentially sieves to anyone with
minor technical skills, and the desire to retrieve
other peoples’ information”
12-35
Why Information Systems Are
Vulnerable (cont.)
 Complacent Management
 Top managers are often reluctant to invest
in security because it is difficult to see the
effect it has on the ‘bottom line”
12-36
The Three Categories of Security
Breaches
Types of Security
Breaches Description
Accidental or unintentional
errors
Accidents relating to hardware and software.
Employees can also cause unintentional
security breaches.
Most common type of security violation, in
which individuals intentionally decode
passwords.
Breaking into computer hardware such as
modems, faxes, and cellular phones.
Infected software that behaves in unexpected
and undesirable ways.
Tornadoes, earthquakes, and other disasters
that cause computer systems to fail.
Intentional errors
Cracking passwords
Breaking into
computer hardware
Software virus
Natural disasters
12-37
Techniques for Reducing Accidental
Security Breaches
WAYS TO REDUCE
ACCIDENTAL SECURITY
BREACHES
Introduce Hardware
Tracking Methods
Establish and Enforce
Clear Security Policies
and Procedures
Training and
Educating Users
12-38
Eight Symptoms of a Software Virus
 Inexplicable loss of free memory
 Unusually long program loading or execution
times
 Changes in program or file size
 Malfunctioning print routines
 Computer freezing
 Unusual messages or beeps
 Computer rebooting in the midst of a process
 Corrupt files
12-39
Computer Security Controls
 Policies, procedures, tools,
techniques, and methods designed
to reduce security breaches, system
destruction, and system errors from
accidental, intentional, and natural
disasters.
12-40
Classifications of Security Controls
SECURITY CONTROLS
Examples:
•Documentation
•Encryption
•Firewalls
Examples:
•Passwords
•Smart cards
•Biometric
identification
•Backups
Development Controls
Examples:
•Fire alarms
•Security personnel
•Restricted access
to a facility
•Devices that monitor
temperature
Physical Facility
Controls
Application Controls
12-41
Application Controls
 Passwords
 Many companies require employees to change their
passwords frequently
 Employees should use hard-to-guess or randomly
generated passwords
 Smart cards
 A plastic card with an embedded chip that provides users
with a new password each time they log on
12-42
Application Controls (cont.)
 Biometric identification techniques
 Rely on body parts to validate that the user can access the
system
– finger prints
– retinal scans
– voice recognition
 Backup
 Treat information like gold
 Establish a backup routine
 Keep your backups in a safe place
12-43
Development Controls
 Documentation
 Written set of documents that explain in detail the
reasoning behind processes, procedures, and other details
– The more detailed the documentation, the better off the company
will be in the future
 Encryption
 Converts data into a secret code before they are
transmitted over the network
12-44
Physical Facility Controls
 Physical Facility Controls are the policies
and procedures that control the physical
environment in which systems reside
 Posting security personnel
 Installing fire alarms
 Security alarms
 Hidden cameras
 Requiring users to wear badges or use smart
cards to gain access to a building
12-45
Disaster Recovery Plan (DRP)
There are seven steps in developing a DRP
 Identify specific situations that are classified as a disaster
 Name the individuals who have the right and the
responsibility to declare a disaster
 Identify specific steps for declaring a disaster
 Inventory all crucial corporate assets, functions, and
resources that are essential to operate the business
 Specify the general course of action the business will take
when disaster strikes
 Develop a specific course of action that each employee
must take to make the company operational when disaster
strikes
 Identify resources required to recover from the disaster,
including money, time, personnel, and facilities
12-46
Business Guidelines for Security
Success
 Recognize the Symptoms of Security Breaches
 Unknown accounts added to the system and file server
 An unusual number of log-on failures and dial-in attempts
 Unexpected system or network crashes
 Unauthorized changes to system software and system files
 High system activity when no users are logged on, especially during
off-peak hours
12-47
Business Guidelines for Security
Success (cont.)
 Be Watchful of Disgruntled Employees
 Disgruntled employees, or those who have been fired, are often
likely to cause security breaches
 Establish clear policies and legal agreements with fired employees
 Involve Law Enforcement When You Suspect a Security
Breach
 Call police immediately
 Train employees not to erase or destroy files that the suspected
employee used or created
 Cooperate with law enforcement
 Quantify damages to assist with prosecution
12-48
Business Guidelines for Security
Success (cont.)
 Build Security Partnerships
 Security depends on partnerships with suppliers and
customers, and sometimes the government
 Convince Top Management That Security Is Not an
Option
 41% of survey participants reported that their company
doesn’t have formal security policies
 More than half said they lack disaster recovery plans
 More than a third said they don’t monitor their networks for
suspicious activity
 Fewer than one in five use encryption technology to
safeguard sensitive information

More Related Content

Similar to Applications of Management Information System.pptx

Unit 5- Marketing Information System
Unit 5- Marketing Information SystemUnit 5- Marketing Information System
Unit 5- Marketing Information Systemprachimba
 
IS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computterIS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computterdharmikmangukiya2
 
Introduction to management information system in costing
Introduction to management information system in costingIntroduction to management information system in costing
Introduction to management information system in costingomkarbhujbal6
 
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptx
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptxGEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptx
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptxMaheshPatil527151
 
Decision making with information system
Decision making with information systemDecision making with information system
Decision making with information systemOnline
 
Decision making with is
Decision making with isDecision making with is
Decision making with isOnline
 
Marketing Information System (MkIS)
Marketing Information System (MkIS)Marketing Information System (MkIS)
Marketing Information System (MkIS)Hem Pokhrel
 
Business and Marketing Information System
Business and Marketing Information SystemBusiness and Marketing Information System
Business and Marketing Information SystemMarkEzreal
 
Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...Ashish Hande
 
Types of Information systems tps to EIS.pptx
Types of Information systems tps to EIS.pptxTypes of Information systems tps to EIS.pptx
Types of Information systems tps to EIS.pptxAdityaDubewar2
 
Management Information System.pptx
Management Information System.pptxManagement Information System.pptx
Management Information System.pptxMahimapatel84
 
Management Inforrnation System
Management Inforrnation SystemManagement Inforrnation System
Management Inforrnation SystemFaiza Afzal
 
Is There Any Difference Between MIS and ERP (1).pdf
Is There Any Difference Between MIS and ERP (1).pdfIs There Any Difference Between MIS and ERP (1).pdf
Is There Any Difference Between MIS and ERP (1).pdfAppdeveloper10
 

Similar to Applications of Management Information System.pptx (20)

Unit 5- Marketing Information System
Unit 5- Marketing Information SystemUnit 5- Marketing Information System
Unit 5- Marketing Information System
 
IS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computterIS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computter
 
Introduction to management information system in costing
Introduction to management information system in costingIntroduction to management information system in costing
Introduction to management information system in costing
 
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptx
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptxGEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptx
GEDY126-MANAGEMENT-INFORMATION-SYSTEM-Dr.S.Saravanan.pptx
 
Mis1
Mis1Mis1
Mis1
 
Mis1
Mis1Mis1
Mis1
 
Management information system (an overview)
Management information system (an overview)Management information system (an overview)
Management information system (an overview)
 
Decision making with information system
Decision making with information systemDecision making with information system
Decision making with information system
 
Decision making with is
Decision making with isDecision making with is
Decision making with is
 
Marketing Information System (MkIS)
Marketing Information System (MkIS)Marketing Information System (MkIS)
Marketing Information System (MkIS)
 
Chapter7
Chapter7Chapter7
Chapter7
 
Business and Marketing Information System
Business and Marketing Information SystemBusiness and Marketing Information System
Business and Marketing Information System
 
Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...
 
management information system module2
management information system module2management information system module2
management information system module2
 
Types of Information systems tps to EIS.pptx
Types of Information systems tps to EIS.pptxTypes of Information systems tps to EIS.pptx
Types of Information systems tps to EIS.pptx
 
Management Information System.pptx
Management Information System.pptxManagement Information System.pptx
Management Information System.pptx
 
Management Inforrnation System
Management Inforrnation SystemManagement Inforrnation System
Management Inforrnation System
 
All in one mis
All in one misAll in one mis
All in one mis
 
All in one mis
All in one misAll in one mis
All in one mis
 
Is There Any Difference Between MIS and ERP (1).pdf
Is There Any Difference Between MIS and ERP (1).pdfIs There Any Difference Between MIS and ERP (1).pdf
Is There Any Difference Between MIS and ERP (1).pdf
 

More from Roshni814224

Business Information Systems in firms.pptx
Business Information Systems in firms.pptxBusiness Information Systems in firms.pptx
Business Information Systems in firms.pptxRoshni814224
 
Strategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptStrategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptRoshni814224
 
Management Information System Applications.pptx
Management Information System Applications.pptxManagement Information System Applications.pptx
Management Information System Applications.pptxRoshni814224
 
The Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxThe Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxRoshni814224
 
Integrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptIntegrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptRoshni814224
 
Data models in Database Management Systems.ppt
Data models in Database Management Systems.pptData models in Database Management Systems.ppt
Data models in Database Management Systems.pptRoshni814224
 
Transaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxTransaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxRoshni814224
 
Computer System Software Component Details.pptx
Computer System Software Component Details.pptxComputer System Software Component Details.pptx
Computer System Software Component Details.pptxRoshni814224
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxRoshni814224
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Information Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxInformation Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxRoshni814224
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxRoshni814224
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
relational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptrelational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptRoshni814224
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptxRoshni814224
 
Normalization in Database Management System.pptx
Normalization in Database Management System.pptxNormalization in Database Management System.pptx
Normalization in Database Management System.pptxRoshni814224
 
Introduction to Database Management System.ppt
Introduction to Database Management System.pptIntroduction to Database Management System.ppt
Introduction to Database Management System.pptRoshni814224
 
Computer system Hardware components.pptx
Computer system Hardware components.pptxComputer system Hardware components.pptx
Computer system Hardware components.pptxRoshni814224
 
Foundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptFoundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptRoshni814224
 
Global e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxGlobal e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxRoshni814224
 

More from Roshni814224 (20)

Business Information Systems in firms.pptx
Business Information Systems in firms.pptxBusiness Information Systems in firms.pptx
Business Information Systems in firms.pptx
 
Strategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptStrategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.ppt
 
Management Information System Applications.pptx
Management Information System Applications.pptxManagement Information System Applications.pptx
Management Information System Applications.pptx
 
The Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxThe Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptx
 
Integrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptIntegrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.ppt
 
Data models in Database Management Systems.ppt
Data models in Database Management Systems.pptData models in Database Management Systems.ppt
Data models in Database Management Systems.ppt
 
Transaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxTransaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptx
 
Computer System Software Component Details.pptx
Computer System Software Component Details.pptxComputer System Software Component Details.pptx
Computer System Software Component Details.pptx
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Information Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxInformation Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptx
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
relational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptrelational model in Database Management.ppt.ppt
relational model in Database Management.ppt.ppt
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
 
Normalization in Database Management System.pptx
Normalization in Database Management System.pptxNormalization in Database Management System.pptx
Normalization in Database Management System.pptx
 
Introduction to Database Management System.ppt
Introduction to Database Management System.pptIntroduction to Database Management System.ppt
Introduction to Database Management System.ppt
 
Computer system Hardware components.pptx
Computer system Hardware components.pptxComputer system Hardware components.pptx
Computer system Hardware components.pptx
 
Foundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptFoundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .ppt
 
Global e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxGlobal e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptx
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

Applications of Management Information System.pptx

  • 1. Information Systems Based on Type of Decisions • Systems that support operational, tactical, and strategic decision are broadly classified into the following categories: • • • Transaction processing systems (TPS) Management information systems (MIS) Intelligent support systems (ISS), which include decision support systems (EIS), and expert (DSS), executive systems (ES) information systems 2-7
  • 2. Functional Information Systems • Information systems can also be classified according to function in these four areas: • • • • Marketing Manufacturing and service Accounting and finance Human resources 2-9
  • 3. EIS OAS MIS TPS DSS ES Functional Systems Dss EIS MIS TPS ES CUSTOMER GIS EDI Figure1: Functional Information System
  • 4. Marketing Information System A system that meets the marketing information needs of an organization. • • Customer-oriented and work toward achieving the strategic sales and marketing plan • Aim is to gain instantaneous access to global market information • Primary goal of retaining existing customers and attracting new ones • Can't be standardized for all companies. Every company has its own • Marketing system must be tailored to match the marketing policies, procedures and practices each company. of • A very popular marketing information system is one that automates sales and marketing functions. • Such systems capture valuable customer information and hence can improve productivity, enhance customer service and create better sales and marketing strategies. • Are influenced by and influence the strategic business plan and the strategic marketing plan.
  • 5. .- . Strategic Business Plan de Strategic Sales & Marketing Plan dr Strategic Information Plan d Market information System ,r Sales Management Marketing Mix (Product, place, price, promotion) D a t a b a s e s External . - ,- ... ..-. Market Intelligence Market Analysis I .. Internal Market Research Customer Analysis Forecasting Figure2: Marketing Information System Feedback
  • 6. Benefits of Marketing Information System Benefits of Marketing Information System  Provides employees with information that helps companies capture niche markets in highly competitive  Helps in sales forecasting.  Able to provide demand forecast. Helps in achieving a company's goal.  Marketing Information system have a deep and direct influence on the quality of customer service.  Assists the marketing manager to maintain the better relationship with valuable customer.
  • 7. Manufacturing Information System A system that supports the manufacturing functions of: • • • • • purchasing, receiving, quality control inventory management, material requirement planning, Production scheduling and plant design. Applies to both manufacturing and service industries capacity planning Manufacturing should be viewed within the broad context of delivering both goods and services since a manufacturer of automobile parts and a travel agency are likely to have manufacturing information system. Production system is a subset of manufacturing information system. Production system pertains to the production of goods and services. It specially addresses information needs relating to raw materials, equipment, manpower and other issues related to production of goods and services. • • •
  • 8. Strategic Business Plan Strategic Manufacturing Plan Strategic Information Plan - - Manufacturing dr Manufacturing information System J r . Services d Purchasing Receiving Databases ~ Quality Control External - - ~ ,~ Inventory - ~ Material R equirement Planning Capacity Planning - - ~ Internal Scheduling Facilities Layout Figure3: Manufacturing Information System
  • 9. Benefits Mfg. Information System • Helps supplier to store such as Home Depot Hardware. Reduces operating cost and inventory levels To achieve strategic goal of company and Ace • •
  • 10. Financial and Accounting Information System(FAIS) • Provides information related to the accounting and financial activities an organization Includes a large number of subsystems that address the operational, tactical and strategic information needs of the business Includes some subsystems such as budgeting, cash and asset of • • management, capital budgeting, portfolio account receivable, inventory control and Other subsystems include record keeping, analysis, general ledger, payroll systems. account analysis, cash • management, financial analysis, leasing options, insurance underwriting, insurance claims processing and investment management. Financial instit ut ion like bank, uses specialized F AIS, such as commercial loan analyzers, credit approval system, commercial account rating system, credit applicat ion system, automated teller cont rol and securit ies trading. •
  • 11. Strategic Business Plan Strategic Financial Plan d Strategic Information Plan • Financial & Accounting Information Systems General Ledger Databases Asset management Order entry, Accounts Receivables, Accounts payable External Inventory control, Payroll, Cash management, Capital management, Investment management Internal Long-range Forecasting Business Intelligence Figure5: Financial & Accounting Information System
  • 12. Human Resource Information System (HRIS) • Supports the planning, control, coordination, administration and management of an organization's human resources. HRIS includes a large number of subsystems that address the informat ion needs of various human resource functions. They provide managers with information, policies and procedures concerning recruiting, layoffs, employee evaluation, promotion, termination,transfer, salary equity monitoring, job • • descriptions and responsibilities, training, affirmative action and employment opportunities. An HRIS also determines how hiring and training decisions made personnel department can increase sales revenues. equal • by the
  • 13. Strategic Business Plan Strategic Human Resource Plan Strategic Information Plan Human Resource Information Systems Personnel D a t a b a s e s Payroll r Benefits External Equity Monitoring Internal Recruitment Compliance systems Manpower Planning Figure6: H u m a n R e s o u r c e In f o r m a t i o n S ys t em
  • 14. Developing Cross-functional System Today, the emphasis is on building cross-functional systems that facilitate the flow of information among all units in an organization. Some critics to develop a Cross-functional System are: 1. Decision-making should not be compartmentalized in functional areas, but should instead be viewed in the context of the entire organization 2. A close link is made in between information system and functional system. 3. System must be designed in such a way that it can work combinely with both the systems For example, a report of the number of people who worked overtime last month or the number of machines that operated during the night shift last month (manufacturing) are often the output of an MIS.
  • 16. 12-16
  • 17. 12-17
  • 18. 12-18 Definition of SIS  Researchers have classified IS into three categories: Systems that support business functions Systems that support strategic planning such as DSS and EIS Systems that are a part of a firm’s strategy
  • 19. 12-19 Definition of SIS Contd…  Strategic Information System (SIS) A system that delivers information products and services that play a direct and prominent role in helping the firm achieve its strategic goals.
  • 20. 12-20 Definition of SIS Contd… An SIS also supplies an organization with Business Intelligence or competitive information  Business Intelligence Business Intelligence consists of internal and external data used to assess and analyze opportunities and threats in business environment
  • 21. 12-21 Types of SIS SIS can be external or internal systems. External strategic systems are used primarily by external entities in the business environment, such as customers, suppliers, and distributors. Benefits to the customer: 1. Increased customer satisfaction 2. Increased customer control 3. Reduction in transaction costs (shipping and handling costs)
  • 22. 12-22 Types of SIS Contd… SIS can be external or internal systems. Internal Strategic Systems are used by employees within the organization and do not have a value- added component. They focus on issues such as improving the quality of products and services and enhancing the decision-making capabilities of managers. Benefits to the Organization: 1. Increased market share 2. Reduction of processing costs 3. Ability to charge higher prices because of value-added component 4. Increase in profit margins
  • 23. 12-23 Examples of SIS An example for a SIS is the Automated Teller Machine (ATM) first introduced by Citibank in 1977. This completely revolutionized the system in banking industry and forever changed the way people conducted financial transactions. ATMs were strategic systems because the only alternative to ATMs would require banks to open branch offices at a large number of convenient locations and these offices would have to remain open for 24hrs per day, 7 days per week, to provide the same level of service as ATMs.
  • 24. 12-24 Strategic Information Systems Plan (SISP)  Strategic Business Plan: A plan that identifies a company’s goals as a means of achieving the organizational mission; also includes what is popularly referred to as SWOT analysis.  Strategic Information Systems Plan (SISP): Identifies the information systems and technologies that are vital to support a firm’s business strategy; derived from the strategic business plan. -Is like a road map that helps IS managers to identify any potential gaps between what is available and what should be available to promote good decision making.
  • 25. 12-25 Strategic Information Systems Plan (SISP) Contd… The SISP should specifically target the following four areas: - Aligning IS investment with business goals - Exploiting information technologies for competitive edge - Ensuring the efficient management of IS resources -Developing technology policies and practices
  • 26. 12-26 Strategies for Developing an SIS Steps involved in developing an SISP:  Establish the purpose of the plan and develop a broad outline describing what the plan will address.  Update the strategic business plan and the goals of the business. Reassess the current business environment  Identify the existing information systems including hardware, software, and networking capabilities. Determine future information needs and systems  Identify the new systems, projects, and capabilities required to meet the changing environment and changing information needs.  Identify the resources required to implement the plan and to win the support of top management for the plan. An organization should ask two important questions before investing in strategic systems: - Is the project financially feasible? - Is the project technically feasible?
  • 27. 12-27 Steps to Ensure Success of Strategic Systems Re-engineering: Re-evaluating and radically redesigning the way in which a company does business; driven by the question, “Why do we do what we do?”  Technology decisions should be grounded in a clear understanding of the processes that drive the technology.  Strategic systems should be driven by strategic alliances between trading partners  Continuous improvement and investment in strategic systems are essential for their long-term success  The organizational culture should encourage some risk taking  Users must be fully trained if the full potential of the strategic system is to be achieved
  • 28. 12-28 Potential Barriers for Developing an SIS  Development (Definition) Barriers: - Generating Workable ideas requires leadership and teamwork - Many innovative ideas are technically feasible - Many innovative ideas are prohibitively expensive -Many ideas die because they lack a sufficient market.  Implementation Barriers: - Telecommunications increases the complexity of implementing SIS - Multiple systems are difficult to integrate - SIS systems often require inter-organizational cooperation - State-of-the-art technologies are difficult to implement  Maintenance Barriers: - Competitors can copy SIS - Unanticipated demand can overwhelm the usefulness of an SIS - Applications can be expensive to maintain or enhance - High exit barriers can cause devastating losses.
  • 30. 12-30 Computer Security  The process of protecting and safeguarding hardware, software, networks, physical facilities, data, and personnel from accidental, intentional, or natural disasters.
  • 31. 12-31 Common Types of Security Violations  Company data theft by employees  Gaining access to information stored on computer networks by cracking passwords  Industrial espionage by criminals eavesdropping on wireless communications or on LANs and Internet connections  Deliberate, unauthorized modification of software  Theft of employees’ identities to make outrageous or illegal statements on the Internet  Starting or fueling rumors on the Internet that are designed to harm the company  Denial of service attacks in which people call a toll-free number or send an e-mail but the number stays perpetually busy or they are denied access
  • 32. 12-32 Awareness of Security Violations 0 60 50 10 40 30 20 70 Yes No Unknown 53% 69% 9% 14% 38% 17% 1996 1998 Has your organization been the target of information espionage? Source: Warroom Research, Inc., Annapolis, Md.
  • 33. 12-33 Why Information Systems Are Vulnerable  Increased Access to the System  Key sources of security breaches are employees, authorized external users such as suppliers, and crackers outside the business  Increased System Complexity  Information systems today are much more complex than systems even a few years ago – the software has many more functions and features and the hardware has integrated components, all of which must work together to provide overall system security – each operating system has its own security features, so switching to a new operating system can throw previous security measures into disarray
  • 34. 12-34 Why Information Systems Are Vulnerable (cont.)  Cyber Terrorism on the Internet  The Internet is a haven for those engaging in security misdeeds  The Internet connects two million host computers and provides access to a rich and extensive set of data and information to millions of users, with the numbers increasing by 15 percent every month  Networks Are the Weakest Link in the Chain  “Networks are essentially sieves to anyone with minor technical skills, and the desire to retrieve other peoples’ information”
  • 35. 12-35 Why Information Systems Are Vulnerable (cont.)  Complacent Management  Top managers are often reluctant to invest in security because it is difficult to see the effect it has on the ‘bottom line”
  • 36. 12-36 The Three Categories of Security Breaches Types of Security Breaches Description Accidental or unintentional errors Accidents relating to hardware and software. Employees can also cause unintentional security breaches. Most common type of security violation, in which individuals intentionally decode passwords. Breaking into computer hardware such as modems, faxes, and cellular phones. Infected software that behaves in unexpected and undesirable ways. Tornadoes, earthquakes, and other disasters that cause computer systems to fail. Intentional errors Cracking passwords Breaking into computer hardware Software virus Natural disasters
  • 37. 12-37 Techniques for Reducing Accidental Security Breaches WAYS TO REDUCE ACCIDENTAL SECURITY BREACHES Introduce Hardware Tracking Methods Establish and Enforce Clear Security Policies and Procedures Training and Educating Users
  • 38. 12-38 Eight Symptoms of a Software Virus  Inexplicable loss of free memory  Unusually long program loading or execution times  Changes in program or file size  Malfunctioning print routines  Computer freezing  Unusual messages or beeps  Computer rebooting in the midst of a process  Corrupt files
  • 39. 12-39 Computer Security Controls  Policies, procedures, tools, techniques, and methods designed to reduce security breaches, system destruction, and system errors from accidental, intentional, and natural disasters.
  • 40. 12-40 Classifications of Security Controls SECURITY CONTROLS Examples: •Documentation •Encryption •Firewalls Examples: •Passwords •Smart cards •Biometric identification •Backups Development Controls Examples: •Fire alarms •Security personnel •Restricted access to a facility •Devices that monitor temperature Physical Facility Controls Application Controls
  • 41. 12-41 Application Controls  Passwords  Many companies require employees to change their passwords frequently  Employees should use hard-to-guess or randomly generated passwords  Smart cards  A plastic card with an embedded chip that provides users with a new password each time they log on
  • 42. 12-42 Application Controls (cont.)  Biometric identification techniques  Rely on body parts to validate that the user can access the system – finger prints – retinal scans – voice recognition  Backup  Treat information like gold  Establish a backup routine  Keep your backups in a safe place
  • 43. 12-43 Development Controls  Documentation  Written set of documents that explain in detail the reasoning behind processes, procedures, and other details – The more detailed the documentation, the better off the company will be in the future  Encryption  Converts data into a secret code before they are transmitted over the network
  • 44. 12-44 Physical Facility Controls  Physical Facility Controls are the policies and procedures that control the physical environment in which systems reside  Posting security personnel  Installing fire alarms  Security alarms  Hidden cameras  Requiring users to wear badges or use smart cards to gain access to a building
  • 45. 12-45 Disaster Recovery Plan (DRP) There are seven steps in developing a DRP  Identify specific situations that are classified as a disaster  Name the individuals who have the right and the responsibility to declare a disaster  Identify specific steps for declaring a disaster  Inventory all crucial corporate assets, functions, and resources that are essential to operate the business  Specify the general course of action the business will take when disaster strikes  Develop a specific course of action that each employee must take to make the company operational when disaster strikes  Identify resources required to recover from the disaster, including money, time, personnel, and facilities
  • 46. 12-46 Business Guidelines for Security Success  Recognize the Symptoms of Security Breaches  Unknown accounts added to the system and file server  An unusual number of log-on failures and dial-in attempts  Unexpected system or network crashes  Unauthorized changes to system software and system files  High system activity when no users are logged on, especially during off-peak hours
  • 47. 12-47 Business Guidelines for Security Success (cont.)  Be Watchful of Disgruntled Employees  Disgruntled employees, or those who have been fired, are often likely to cause security breaches  Establish clear policies and legal agreements with fired employees  Involve Law Enforcement When You Suspect a Security Breach  Call police immediately  Train employees not to erase or destroy files that the suspected employee used or created  Cooperate with law enforcement  Quantify damages to assist with prosecution
  • 48. 12-48 Business Guidelines for Security Success (cont.)  Build Security Partnerships  Security depends on partnerships with suppliers and customers, and sometimes the government  Convince Top Management That Security Is Not an Option  41% of survey participants reported that their company doesn’t have formal security policies  More than half said they lack disaster recovery plans  More than a third said they don’t monitor their networks for suspicious activity  Fewer than one in five use encryption technology to safeguard sensitive information