We'll email you at these times to remind you to study
You can set up to 7 reminders per week
We'll email you at these times to remind you to study
Case Study should be linked to this with various industries concern will bring more viewable picture in study which is a real time exp concern
management issues and security issues for controlling IT are:backup,keeping to the budget, project management and control over data
I don't seem able to work 2 of the slides correctly - on the slide of management issues, I click on the second issue but the budget issue comes up (so budget is listed as issue 2 and issue 3). On the test area slide, I can't get the virus icon into the test area at all
Information on the slides is inadequate
Management Issues and Security Issues
Many of you will eventually be responsible for systems in your functional areas of business. What are the issues you will confront in this role?
It is extremely important to have backup for systems, including off-site data storage. When terrorists bombed the World Trade Centre in 1992, firms with backup data quickly set up systems in other parts of the East Coast and were back in business. Firms without backup had a much more difficult time recovering from this disaster.
Personal computers have created a host of security problems because they are so accessible. As a manager, you will have to decide how much security is necessary to safeguard the data and systems for which you are responsible.
3 Keeping to the Budget
The appetite users have for technology seems to be insatiable. Yet, the organization cannot afford to buy all the technology users want, at least not in any one year. How will you exert budgetary control and set priorities for acquiring hardware and software, and developing new systems?
4 Project Management
As mentioned earlier, IT projects frequently lose control. If you have the ultimate responsibility for a development project, you will need to be sure the project is under control. Consider using a project management system to track and monitor progress so there will not be unpleasant surprises in place of a finished system.
5 Control over Data
The accuracy of data used in making decisions is always an important management consideration. As we develop more distributed databases, accuracy and consistency among different copies of the same data will become a critical control issue.
Security Issues: Viruses, Worms and Other Creatures
The proliferation of personal computers and the development of communications networks gave rise to a category of programs that can only be called malicious. It can be difficult to control and protect against these programs.
Click the orange boxes to read more about each virus.
Needs Host Program
A program with a logic bomb "explodes" when some event triggers it. This explosion usually destroys the host computer's files. The logic bomb gets into the computer through a Trojan horse or by a virus. Logic bombs are the favourite tool of disgruntled employees who want to get back at their employers. Logic bombs can also be used for ransom. The person planting the bomb will reveal its location if the organization meets his or her demands.
A Trojan horse is hidden in a useful piece of code. Once this bit of hidden code is inside a user's computer, it becomes active in some way and executes malicious acts or subverts the system. One Trojan horse application subverts security in a computer so an unauthorized user can gain access to it.
Some people consider bacteria to be a virus, but bacteria do not require a host program to infect a system. A bacterium program replicates itself. It acquires as much computer time as possible and in doing so, slows down the host system. The bacterium program may also try to fill up disk space.
A worm travels through a network from one computer to another. If the computer containing a worm is on a network, the worm searches for other computers that are connected. Finding a victim, the worm establishes a communications link and downloads itself to the new computer. Although the worm may do no overt damage, it can quickly overload a network. The only known remedy is to shut down the network, expunge the worms, and restart the network.
Types of Virus
Place the different viruses into the test area to read a case study about each one. To clear, replace the virus.
TEST AREA - Caution!
The Christmas Bacteria
The Christmas bacteria got into a university network called Bitnet a few years ago. It displayed a Christmas tree on the infected machine and used the mail distribution system to send a copy of itself to every user currently connected to the network. The bacterium program grew geometrically and quickly slowed the network to a crawl. Again, the solution was to shut down the network and find and purge each copy of the program.
The Morris Worm
The Morris Worm is one of the best known computer viruses to ever be released. In 1998, a university student called Robert Morris wrote and released a worm virus which was estimated to have infected over ten percent of all of the computers on the internet (the internet was estimated to consist of about 60,000 computers. Morris was the first person to be convicted under new laws governing information and the internet. Morris is now an associate professor at MIT, which is where he originally released the worm!
Log in to save your progress and obtain a certificate in Alison’s free Understanding Information Control for IT Managers online course
Sign up to save your progress and obtain a certificate in Alison’s free Understanding Information Control for IT Managers online course
Please enter you email address and we will mail you a link to reset your password.