Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Transcript of Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Managing Operations
Chapter 8
Information Systems Management In Practice 6E
McNurlin & Sprague
2
Introduction
3
What Are Operations?
Why Talk About Operations?
Solving Operational Problems
Operational Measures
The Importance of Good Management
4
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
5
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
6
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
7
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
8
Outsourcing IS Functions
9
Outsourcing IS Functions
10
Outsourcing IS Functions
Managing Outsourcing
CASE EXAMPLE: Eastman Kodak Company
CASE EXAMPLE: Honda Motor Company
11
Information SecurityViruses
Insider Abuse
Laptop Theft
System Penetration
Denial of Service
Unauthorized Access
Theft of Proprietary Info
Financial Fraud
Telecom Fraud
Sabotage
Telecom Eavesdropping
Active Wiretapping
12
Information Security
1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks7. Trojan horse programs 8. Viruses9. Spoofing
13
Security’s Five Pillars
1. Authentication
2. Identification
3. Privacy
4. Integrity
5. Nonrepudiation
14
Information SecurityAntivirus Software
Firewalls
Physical Security
Access Control
Intrusion Detection
Encrypted Files
Encrypted Login
Reuseable Passwords
Digital IDs
PCMCIA
Biometrics
15
Business Continuity
Safeguarding people during a disaster
Documenting business procedures
Giving employees the tools and space to handle personal issues
16
Business Continuity
Using Internal Resources
Using External Resources
CASE EXAMPLE: Household International
17
Conclusion
Managing Inward vs. Managing Outward
18
PART II Discussion Case
Managing Information Security on a Shoestring Budget