SlideShare a Scribd company logo
1 of 7
By: Daniel Escarcega
           3rd period
SECURITY ADMINISTRATORS
 Security administrators- specialist who are charged
 with ensuring the system’s security.
Trainers
 They prepare users to receive a new information
  system even before it is put in place.
 IS personal also provide ongoing support for users.
System or network administrators.
 They keep an information system up and running.
 Organizations may have technicians, analysts, and
 programmers.
E-commerce Specialist
 They develop and implement procedures for
  businesses that need to conduct business online.
 Charged with setting up a company’s online
  infrastructure.
Database specialists
 (DBAs)
 Posses programming skills, in addition to database-
 management expertise.
Hardware Maintenance
             Technicians.
 Maintain the hardware components of an information
 system.

More Related Content

What's hot

Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Islandkimreview
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsSimeon Ogao
 
operation security
operation securityoperation security
operation securityKajalsing23
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Is Department Roles
Is Department RolesIs Department Roles
Is Department Roleserickaselina
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 

What's hot (20)

P3 m2
P3 m2P3 m2
P3 m2
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Security
SecuritySecurity
Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network securityNetwork security
Network security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Jb ia
Jb   iaJb   ia
Jb ia
 
A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
operation security
operation securityoperation security
operation security
 
Is managers
Is managersIs managers
Is managers
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Data security
Data securityData security
Data security
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Is Department Roles
Is Department RolesIs Department Roles
Is Department Roles
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Viewers also liked

Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parishDennis Maturan
 
Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parishDennis Maturan
 
Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parishDennis Maturan
 
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...Fergus Ducharme
 
our mother of perpetual help
our  mother of  perpetual  helpour  mother of  perpetual  help
our mother of perpetual helpMaria Ida Yu
 

Viewers also liked (7)

Laberinto
LaberintoLaberinto
Laberinto
 
Scan0003
Scan0003Scan0003
Scan0003
 
Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parish
 
Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parish
 
Our lady of fatima parish
Our lady of fatima parishOur lady of fatima parish
Our lady of fatima parish
 
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...
National Shrine of Our Mother of Perpetual Help, The Baclaran Church, Paranaq...
 
our mother of perpetual help
our  mother of  perpetual  helpour  mother of  perpetual  help
our mother of perpetual help
 

Similar to The information systems deoartment

Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department memberseffinsquirrel
 
Duties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffDuties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffMakaha Rutendo
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...Tammy Clark
 
system administration.pptx
system administration.pptxsystem administration.pptx
system administration.pptxODINARARCH
 
What Ability Connecton Does
What Ability Connecton DoesWhat Ability Connecton Does
What Ability Connecton Doescwg866
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPointSteven Washington
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
GSIP 2017 presentation
GSIP 2017 presentationGSIP 2017 presentation
GSIP 2017 presentationParker Lacy
 
Resume update executive it
Resume  update executive itResume  update executive it
Resume update executive itAjaya Mohanty
 
Network Support Engineer with hex64.docx
Network Support Engineer with hex64.docxNetwork Support Engineer with hex64.docx
Network Support Engineer with hex64.docxHEX64
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITintellectittechnology
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran Krishnan
 

Similar to The information systems deoartment (20)

Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department members
 
Is roles
Is rolesIs roles
Is roles
 
Is jobs
Is jobsIs jobs
Is jobs
 
Duties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffDuties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department Staff
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
system administration.pptx
system administration.pptxsystem administration.pptx
system administration.pptx
 
What Ability Connecton Does
What Ability Connecton DoesWhat Ability Connecton Does
What Ability Connecton Does
 
Cp
CpCp
Cp
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPoint
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
GSIP 2017 presentation
GSIP 2017 presentationGSIP 2017 presentation
GSIP 2017 presentation
 
Resume update executive it
Resume  update executive itResume  update executive it
Resume update executive it
 
Network Support Engineer with hex64.docx
Network Support Engineer with hex64.docxNetwork Support Engineer with hex64.docx
Network Support Engineer with hex64.docx
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
_RESUME_
_RESUME__RESUME_
_RESUME_
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect IT
 
Frank Johnston resume
Frank Johnston resumeFrank Johnston resume
Frank Johnston resume
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Network
NetworkNetwork
Network
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

The information systems deoartment

Editor's Notes

  1. Security is a sensitive issue in many organizations. Security administrators implement the organization’s strategy for password protection, remote user access to the network, user access rights to specific disks or files, etc. internet may be hacked.
  2. Trainers give the opportunity to explore the system, ask questions, and practice common tasks.
  3. Network administrators have many duties such as controlling unauthorized access, protecting data integrity, maintaining back ups, and recovering data after a disaster. PC-based LANs need full time attention and maintenance to prevent system failure.
  4. Primarily concerned with e-commerce strategy and planning, as well as building the necessary administrative infrastructure.
  5. (DBAs) may perform various essential functions, such as designed and building tables, forms, queries, and reports used throughout the organization. They have mastered the query language used by the organization’s system.
  6. They fix a paper jam in a printer and other serious problems.Upgrading PCs with new peripherals.Diagnosing problems with PCs and servers.Scanning PCs for viruses.& maintaining the network.