Sie sind auf Seite 1von 30

IT DEPARTMENT

IT DEPARTMENT
(SHIP MANAGEMENT)
 Isthe application of computers to store,
study, retrieve, transmit and manipulate
data, or information, often in the context of a
business or other enterprise.

 Itrefers to anything related to computing


technology, such as networking, hardware,
software, the internet or the people that
work with these technologies.
COMPUTER SYSTEM
Defined as the combination of
hardware, software, user and data.
are the electronic and
mechanical parts
 Processor
 Main memory

 Secondary memory

 Input devices

 Output devices
are the data and the
computer programs.
 Governance includes responsibility (being
held accountable for a specific duty, task, or
decision); authority (the power to influence
behavior); communication (exchanging
information); and empowering (giving official
authority to act).

 Governance also involves establishing


measurement and control mechanisms to
enable people to carry out their roles and
responsibilities.
1. Structural Component – Support
the goal of the Business, people who
help manage those activities.

2. Process Component – Decision-


making rights.
1. STRATEGIC ALIGNMENT
2. VALUE DELIVERY
3. RESOURCE MANAGEMENT
4. RISK MANAGEMENT
● Is system software that manages computer
hardware and software resources and provides
common services for computer programs.

● All computer programs, excluding firmware,


require an operating system to function.
 SINGLE-AND MULTI-TASKING

A single tasking system can only run one


program at a time, while a multi-
tasking operating system allows more than
one program to be running in concurrency.
 Single-user operating systems have no
facilities to distinguish users, but may
allow multiple programs to run in tandem.
 A multi-user operating system extends the
basic concept of multi-tasking with
facilities that identify processes and
resources, such as disk space, belonging
to multiple users, and the system permits
multiple users to interact with the system
at the same time
A distributed operating system manages a
group of distinct computers and makes
them appear to be a single computer.
 The development of networked computers
that could be linked and communicate with
each other gave rise to distributed
computing.
 Distributed computations are carried out on
more than one machine. When computers in
a group work in cooperation, they form a
distributed system
 In an OS, distributed and cloud
computing context, templating refers to
creating a single virtual machine image as a
guest operating system, then saving it as a
tool for multiple running virtual machines.
 The technique is used both
in virtualization and cloud computing
management, and is common in large
server warehouses
 re designed to be used in embedded
computer systems.
 They are designed to operate on small
machines like PDAs with less autonomy.
 They are able to operate with a limited
number of resources.
 They are very compact and extremely
efficient by design.
 Windows CE and Minix 3 are some
examples of embedded operating systems
 is an operating system that guarantees to
process events or data by a specific moment
in time.
 A real-time operating system may be
single- or multi-tasking, but when
multitasking, it uses specialized scheduling
algorithms so that a deterministic nature of
behavior is achieved
 operating system is one in which the
services that a typical operating system
provides, such as networking, are provided
in the form of libraries.
 These libraries are composed with the
application and configuration code to
construct
A very large and
expensive computer ca
pable of supporting
hundreds, or even
thousands,
of users simultaneously.
is a small, relatively
inexpensive computer with
a microprocessor as
its central processing unit
PROCEDURE FOR IT CHANGE MANAGEMENT
 is often associated with ITIL
( Information Technology Infrastructure
Library), but the origins of change as an
IT management process predate ITIL
considerably, at least according to the
IBM publication A Management System
for the Information Business
 Approved by management
 Implemented with a minimized and
accepted risk to existing IT infrastructure
 Results in a new status of one or
more configuration items (CIs)
 Provides increased value to the business
(increased revenue, avoided cost, or
improved service) from the use of the new
or enhanced IT systems.
SOMETIMES SHORTENED TO INFOSEC, IS THE
PRACTICE OF PREVENTING UNAUTHORIZED
ACCESS, USE, DISCLOSURE, DISRUPTION,
MODIFICATION, INSPECTION, RECORDING OR
DESTRUCTION OF INFORMATION
IT IS A GENERAL TERM THAT CAN BE USED
REGARDLESS OF THE FORM THE DATA MAY TAKE
 The steps Information Security will take if
informed of a copyright infringement that
has happened via the network

1. LEGAL AND REGULATORY COMPLIANCE

1. COMPLAIANCE WITH INTERNATIONAL


INFORMATION SECURITY STANDARD ISO
27001
1. Logs containing personal or sensitive
personal data
2. Logs date do not contain personally-
identifying data.
3. Time convention.
4. Legal and Regulatory Compliance.
5. ISO 27001 Controls
 Account Expiry
 Extensions
 Review
 Legal and Regulatory Compliance.
 Compliance with International
Information Security Standart ISO
27001
 Any system in a public area that is the source of a
virus outbreak will be blocked from the network as
soon as the infection is reported, then physically
removed and replaced. This will happen within an
hour of Information Security becoming aware that it
is the victim of virus outbreak.

POBLEMS
LEGAL AND REGULATORY COMPLIANCE.
COMPLIANCE WITH INTERNATIONAL INFORMATION
SECURITY STANDARD ISO 27001
BY: JADE ARROYO
AND MARK ANTHONY BONGAT