SlideShare a Scribd company logo
1 of 14
Our group members:
        • Hanif Hafifi
       • Syed Syafiq
            • Farikin
      • Nur Hidayah
          • Kusuma
        • Suwaibah
THE
                 COMMON
                 PROBLEM..
VIRUS
WHAT IS VIRUS?
   A virus takes advantage of the resources
    available on an infected system to do some
    or all of the following to destroy data; and
    possibly to embarrass the owner of the
    system by distributing documents found on
    the victim system's hard drive.

   Some viruses only cause computers to
    make strange beeps at certain times, while
    other viruses can permanently destroy the
    data.

   Most viruses now include some mechanism
    for propagating themselves to other
How to solve this problems?
 Keep your antivirus software up to
  date by updating its virus definition list
  regularly, or setting it to automatically
  update
 Don't open any suspicious
  attachments, especially if you don't
  know why they were sent to you.
  Immediately delete these suspect files
  and be careful to avoid accidentally
  double-clicking a file, causing it to
  execute. Make sure your email
  program is not set to automatically
  open attachments.
Next problem is??????
Problem of information
management
 1. Situations where meeting the
  information need, or information
  processing -- is non-trivial and
  requires application of specialized
  skills, resources and system
  development.
 2. Situations where present
  information management in
  organization does not satisfy the
  needs.
How to solve this
problems??
   Promoting the understanding of
    information importance in the
    organization — This is very
    important. If people in the
    organization do not realize the
    importance od data and information,
    and what are immediate as well as
    indirect effects of good and bad
    information management, then IT
    will not be used to its full potential.
   Improving the organization of existing
    information — Often, we do not need
    build a new IT system. Instead, we can
    take the information at hand and bring
    it to better shape, using various
    techniques, some of those are very
    simple. This strategy can be
    considered at any time; it can bring
    quick return at low cost.
   „Informatization” of the process — A
    general strategy of identifying
    information processing operations in a
    work process and building IT solutions
    to supply these operations with
    information and high quality and low
    cost. Making processes more
    information-intensive has become
    practical necessity in virtually all areas
    of life today.
THANK YOU!!!

TERIMA KASIH!!!

 KHOBKHUN!!!
Information of management

More Related Content

Viewers also liked

Presenting to the c suite csw pdx
Presenting to the c suite csw pdxPresenting to the c suite csw pdx
Presenting to the c suite csw pdxtoscafasso
 
Job and Competence Catalogue
Job and Competence CatalogueJob and Competence Catalogue
Job and Competence CatalogueAU Career
 
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental Bangsa
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental BangsaMakna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental Bangsa
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental BangsaMirda DC
 
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголтOyuntuya Ochirbat
 
Brainstorming
BrainstormingBrainstorming
Brainstormingci_bele
 

Viewers also liked (9)

Breadvertising
BreadvertisingBreadvertising
Breadvertising
 
Presenting to the c suite csw pdx
Presenting to the c suite csw pdxPresenting to the c suite csw pdx
Presenting to the c suite csw pdx
 
P5utda day1
P5utda day1P5utda day1
P5utda day1
 
Job and Competence Catalogue
Job and Competence CatalogueJob and Competence Catalogue
Job and Competence Catalogue
 
Weight Watchers
Weight Watchers Weight Watchers
Weight Watchers
 
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental Bangsa
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental BangsaMakna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental Bangsa
Makna Pembukaan UUD 1945 sebagai Kaidah Pokok Fundamental Bangsa
 
建築の遺伝子
建築の遺伝子建築の遺伝子
建築の遺伝子
 
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт
5.4 хүнсний нэмэлтүүд ба бохирдуулагчийн тухай ойлголт
 
Brainstorming
BrainstormingBrainstorming
Brainstorming
 

Similar to Information of management

Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfTechSoup
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxDondonGoles
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security PitfallsDaniel Rivas
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdflundamiko
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit vpanibatla neeta
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...Health IT Conference – iHT2
 
Lesson 4
Lesson 4Lesson 4
Lesson 4MrsNunn
 
Lesson 4
Lesson 4Lesson 4
Lesson 4MrsNunn
 

Similar to Information of management (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdf
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 
Honey pots
Honey potsHoney pots
Honey pots
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdf
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit v
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 

Information of management

  • 1. Our group members: • Hanif Hafifi • Syed Syafiq • Farikin • Nur Hidayah • Kusuma • Suwaibah
  • 2.
  • 3. THE COMMON PROBLEM.. VIRUS WHAT IS VIRUS?
  • 4. A virus takes advantage of the resources available on an infected system to do some or all of the following to destroy data; and possibly to embarrass the owner of the system by distributing documents found on the victim system's hard drive.  Some viruses only cause computers to make strange beeps at certain times, while other viruses can permanently destroy the data.  Most viruses now include some mechanism for propagating themselves to other
  • 5. How to solve this problems?
  • 6.  Keep your antivirus software up to date by updating its virus definition list regularly, or setting it to automatically update  Don't open any suspicious attachments, especially if you don't know why they were sent to you. Immediately delete these suspect files and be careful to avoid accidentally double-clicking a file, causing it to execute. Make sure your email program is not set to automatically open attachments.
  • 8. Problem of information management  1. Situations where meeting the information need, or information processing -- is non-trivial and requires application of specialized skills, resources and system development.  2. Situations where present information management in organization does not satisfy the needs.
  • 9. How to solve this problems??
  • 10. Promoting the understanding of information importance in the organization — This is very important. If people in the organization do not realize the importance od data and information, and what are immediate as well as indirect effects of good and bad information management, then IT will not be used to its full potential.
  • 11. Improving the organization of existing information — Often, we do not need build a new IT system. Instead, we can take the information at hand and bring it to better shape, using various techniques, some of those are very simple. This strategy can be considered at any time; it can bring quick return at low cost.
  • 12. „Informatization” of the process — A general strategy of identifying information processing operations in a work process and building IT solutions to supply these operations with information and high quality and low cost. Making processes more information-intensive has become practical necessity in virtually all areas of life today.