Beruflich Dokumente
Kultur Dokumente
7th Edition
Chapter 11
Phase Description
Systems Operation, Support, and Security is the final phase in the systems development life cycle (SDLC) You will be supporting a functioning information system You continuously will access and improve the system, and you will be alert to any signs of obsolescence You will also address multi-level security issues
2
Chapter Objectives
Explain how the systems operation, support, and security phase relates to the overall system development process Describe user support activities, including user training and help desks Discuss the four main types of system maintenance
Chapter Objectives
Explain various techniques for managing systems operation and support Describe techniques for measuring, managing, and planning system performance Assess system security at five levels: physical security, network security, application security, file security, and user security
Chapter Objectives
Describe backup and disaster recovery policies and methods List factors indicating that a system has reached the end of its useful life Assess future challenges for IT professionals as technology reshapes the workplace
Introduction
Now that the system is operational, the IT staff members must assure that it meets user expectations, supports business objectives, and is secure More than half of all IT department effort goes into supporting existing systems and making them more valuable to users
10
11
Maintenance Activities
The systems operation, support and security phase is an important component of TCO (total cost of ownership) because ongoing maintenance expenses can determine the economic life of a system Operational costs Maintenance expenses Maintenance activities
12
Maintenance Activities
Four types of maintenance task can be identified Corrective maintenance Adaptive maintenance Perfective maintenance Preventative maintenance
13
Maintenance Activities
Four types of maintenance task can be identified
14
15
16
19
20
21
22
23
24
25
26
System Security
Physical Security First level of security concerns the physical environment Computer room Computer room security
Biometric scanning systems Motion sensor
27
System Security
Physical Security Servers and desktop computers
Keystroke logger Tamper-evident cases BIOS-level password Boot-level password Power-on password
28
System Security
Physical Security Notebook computers
Select an operating system that allows secure logons and BIOS-level passwords Mark or engrave the computers case Consider notebook models that have a built-in fingerprint reader Universal Security Slot (USS) Back up all vital data
29
System Security
Physical Security Notebook computers
Use tracking software While traveling, try to be alert to potential high-risk situations Establish stringent password protection policies
30
System Security
Network Security Network Network interface Encrypted Encrypting network traffic
Unencrypted plain text Public key encryption (PKE)
31
System Security
Network Security Encrypting network traffic
Public key Private key Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) WPA2
32
System Security
Network Security Private networks
Private network
33
System Security
Network Security Ports and services
Port Destination port Service Port scans Denial of service (DOS) Distributed denial of service (DDOS)
34
System Security
Network Security Firewalls
Firewalls can be configured to detect and respond to DOS attacks, port scans, and other suspicious activity
35
System Security
Application Security Services
Security hole Administrator super-user Permissions
System Security
Application Security Patches and updates
Exploits Patches Third-party software Automatic update service
System Security
User Security Privilege escalation attack Identity management Password protection Social engineering
Pretexting
User resistance
38
39
Retention periods
40
41
System Obsolescence
Even with solid support, at some point every system becomes obsolete Signs: 1. The systems maintenance history indicates that adaptive and corrective maintenance is increasing steadily 2. Operational costs or execution times are increasing rapidly, and routine perfective maintenance does not reverse or slow the trend
42
System Obsolescence
Signs: 3. A software package is available that provides the same or additional services faster, better, and less expensively than the current system 4. New technology offers a way to perform the same or additional functions more efficiently 5. Maintenance changes or additions are difficult and expensive to perform
43
System Obsolescence
Signs: 6. Users request significant new features to support business requirements
44
45
46
48
Chapter Summary
Systems operation, security, and support covers the entire period from the implementation of an information system until the system no longer is used A systems analysts primary involvement with an operational system is to manage and solve user support requests
49
Chapter Summary
Systems analysts need the same talents and abilities for maintenance work as they use when developing a new system Configuration management is necessary to handle maintenance requests System performance measurements include response time, bandwidth, throughput, and turnaround time All information systems eventually become obsolete
50
Chapter Summary
An IT professional should have a strategic career plan that includes long-term goals and intermediate milestones An important element of a personal strategic plan is the acquisition of IT credentials and certifications that document specific knowledge and skills Chapter 11 complete
51