Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

MIS 22 Disaster Management

2,059 views

Published on

The presentation of 'Management Information System' subject of TEIT under 'University of Pune' INDIA.
Author and Teacher: Tushar B Kute http://www.tusharkute.com
tbkute@gmail.com

Published in: Education
  • Be the first to comment

MIS 22 Disaster Management

  1. 1. Management information system<br />Third Year Information Technology<br />Part 22 <br />Disaster Management<br />Tushar B Kute,<br />Sandip Institute of Technology and Research Centre, Nashik<br />http://www.tusharkute.com<br />
  2. 2. Disaster management<br />The disaster management plan ensures that company recovers from the disaster without much damage.<br />Because of need to continue functioning in emergency situations, disaster management plans are often multi-layered and can address many issues of security.<br />The basic purpose of DMP is to ensure that the system starts working from where it has stopped and there is no loss of data.<br />
  3. 3. Disaster management plan<br />Identify the critical areas.<br />Calculate the probability of the occurrence of risk.<br />Identify the critical data, programs, software and files which need to be saved.<br />Identify the areas which could be carried out manually<br />Get the system rolling.<br />Identify the loopholes in the systems.<br />Insure company against all possible risks.<br />Identify the areas which have not lived up to expectation.<br />Test the DMP to ensure that all steps are in place and all risks have been covered.<br />
  4. 4. System controls and audits<br />Why controls are required?<br />To ensure that system work as per expectations.<br />To ensure the quality<br />To ensure information integrity and accuracy.<br />Types of controls-<br />Information system<br />Procedure<br />Physical facilities<br />
  5. 5. Information system controls<br />Input stage (Data entry)<br />Processing<br />Hardware<br />Software <br />Storage <br />Output<br />
  6. 6. Procedure controls<br />Standard procedures and documentation<br />Authorization<br />Separation and identification of duties.<br />
  7. 7. Physical controls<br />Physical protection<br />Insurance<br />Computer failure<br />
  8. 8. Auditing of information system<br />It is required to check operating of system as per the plan and check the loopholes in system.<br />The information should be periodically checked, examined or audited by an internal auditor and in addition to internal auditing there are external auditors from external firms.<br />Types of audits-<br />Auditing around the computer.<br />Auditing in the computer.<br />
  9. 9. Contingency management<br />Contingency management supports systems to operate effectively without excessive interruption by establishing thorough plans, procedures and technical measures that can enable system to be recovered quickly and effectively following a service disruption of disaster.<br />
  10. 10. IT Contingency management process<br />Develop a contingency planning policy statement.<br />Conduct the business impact analysis (BIA)<br />Identify preventive controls<br />Develop recovery strategies.<br />Develop an IT contingency plan.<br />Plan testing, training and exercises.<br />Plan maintenance.<br />
  11. 11. references<br />http://en.wikipedia.org<br />Tushar B Kute,<br />Sandip Institute of Technology and Research Centre, Nashik<br />http://www.tusharkute.com<br />

×