SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
What is Information?
 “Information is the processed and refined
form of data that is meaningful or useful to the
recipient”.
 Information processing is a societal activity.
 A significant part of an individual’s working
and personal time is spent in recording,
searching for, and absorbing information.
Some facts and figures!
 As much as 80% of a typical executive’s time is
spent in the processing and communication of
information.
 More than 50% of the united states work force is
employed in jobs that primarily involve some
form of information processing like :-
documentation, report generation , analyses,
plans etc.
Importance
 A valuable asset of any organization to achieve
its goal and securing its existence in today’s
competitive market.
 We can say that it works like a backbone for any
organization.
Helping facets
 Hardware
 Software
 Database
 Procedures (documentation at each step)
 Operations personnel (operators, system analysts,
programmers, data administrators etc.)
What we do for their proper safeguarding?
Implement so many information system controls:
 Physical facilities control
 Terminal access control
 Backup and recovery
A catastrophe
 Time :- 6 am
 Venue :- Huntsville, Alabana
 Organization:- General Computer Services (GCS), a
data processing bureau.
 Event :- GCS caught fire at 6 am.
 Loss:- Items like all the documentation, company
records and corporate information destroyed in this
catastrophe.
Also hardware were the biggest losses.
 Problem :- GCS was scheduled to deliver 15
payrolls on the same day.
 Now, what did GCS people do to manage and
survive without losing a single customer?
Physical facilities control
 Computer and its other equipment installation
consumes few thousands to several million dollars
depending on the size of installation. So, it
requires protection.
 Data are mostly stored in magnetic tapes or
magnetic disk packs are highly valuable to the
organization.
 Any type of disk damage or unauthorized access
and the potential loss from theft may destroy the
information.
Remedies
 Division of duties (so that a single person does
not have complete control over the processing of
an application), internal and external audit review,
restricted access by operators to program
documentation and restricted access to data files
and program files.
 In spite of centralized processing, distributed
system is implemented.
Advantage of distributed system
 Gives the “fail-soft” protection.
 Fail-soft protection :- “The capability to continue
processing at all sites except the non functioning
one is called “fail-soft” protection.”
 Disadvantage of centralized system :- If the server
“goes down” all processing ceases.
Some other facets
 Fire
 Flood
 Human riots
 Earth Quakes
 Employee dishonesty .
 Employee dishonesty problem can be removed from
organization by combination of careful employment
screening plus fidelity insurance.
 From fire, flood, human riots, earth quakes like loses, the
organization must be well insurance.
Terminal access control
 Today most of all systems are working online and
for this, uses communication networks; there
should be protection against illegal access.
 Terminals represent access to computer, also
processing capabilities and stored data , therefore ,
there should be :
 Password control (from password security S/W ,or
computer OS).
 Various locks to prevent unauthorized physical
presence.
Backup and Recovery
 For events like fire, natural disaster, malicious
damage or accident that destroys equipments, S/W
or data, there need to be procedures to recover
from errors or failures to correct procedures.
 The general approach to recovery is backup by
creating copies of the files.
 Example:- If an error destroys records in a file,
backup procedures permit a previous version of a
file to be restored and the processing is repeated.
 Backup copies of data and S/W stored at off
premises.
 Arrangement of backup sites and facilities .
 Backup and recovery plan should be established.
 The backup may be in the form of diskettes or
cassettes with which data should be copied each
night from the organizations.
 The backup copies should be stored in a secure
locations.
How GCS’s problem was solved?
 At 10 am GCS operating unit was established at four employee’s
homes.
 Customers were informed about the fact and the entire processing
was continued without any break.
 Cause of Success:-
 Nearly all the GCS S/W programs were accessible because a
“backup system” was housed.
 Within 10 days ,GCS’s hardware vendors (insurance company)
had supplied them the needed equipments.
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

Weitere ähnliche Inhalte

Was ist angesagt?

Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemuday sharma
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)Gary Fincher
 
MerrittOneTechnologies Managed Services
MerrittOneTechnologies Managed ServicesMerrittOneTechnologies Managed Services
MerrittOneTechnologies Managed Servicesguest97895bc
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcareRay Treurniet
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)Gary Fincher
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
IT6701-Information Management Unit 5
IT6701-Information Management Unit 5IT6701-Information Management Unit 5
IT6701-Information Management Unit 5SIMONTHOMAS S
 
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in HealthcareMedigate
 

Was ist angesagt? (17)

Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
 
MerrittOneTechnologies Managed Services
MerrittOneTechnologies Managed ServicesMerrittOneTechnologies Managed Services
MerrittOneTechnologies Managed Services
 
Managed services
Managed servicesManaged services
Managed services
 
Information Security
Information SecurityInformation Security
Information Security
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Executive information system
Executive information systemExecutive information system
Executive information system
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
IT6701-Information Management Unit 5
IT6701-Information Management Unit 5IT6701-Information Management Unit 5
IT6701-Information Management Unit 5
 
Crisis management
Crisis managementCrisis management
Crisis management
 
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
 
Database security
Database securityDatabase security
Database security
 

Andere mochten auch (19)

Agile cost estimation
Agile cost estimationAgile cost estimation
Agile cost estimation
 
Java interview questions
Java interview questionsJava interview questions
Java interview questions
 
Database design and implimentaion
Database design and implimentaionDatabase design and implimentaion
Database design and implimentaion
 
B trees
B treesB trees
B trees
 
Des algorithm
Des algorithmDes algorithm
Des algorithm
 
Brain device moves objects by thought
Brain device moves objects by thoughtBrain device moves objects by thought
Brain device moves objects by thought
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Blu ray disc
Blu ray discBlu ray disc
Blu ray disc
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Edge
EdgeEdge
Edge
 
Dna computing
Dna computingDna computing
Dna computing
 
Code division duplexing
Code division duplexingCode division duplexing
Code division duplexing
 
Hd dvd
Hd dvdHd dvd
Hd dvd
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
Continuous distributions
Continuous distributionsContinuous distributions
Continuous distributions
 
C# interview quesions
C# interview quesionsC# interview quesions
C# interview quesions
 
Daknet
DaknetDaknet
Daknet
 
Augumented reallity
Augumented reallityAugumented reallity
Augumented reallity
 

Ähnlich wie Information system availibility control

Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup SystemCSCJournals
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"efrid630
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information SystemNirajan Silwal
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 

Ähnlich wie Information system availibility control (20)

Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Computer security
Computer securityComputer security
Computer security
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Disaster recovery enw
Disaster recovery enwDisaster recovery enw
Disaster recovery enw
 
Mis
MisMis
Mis
 

Mehr von Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 
Hbase
HbaseHbase
Hbase
 
H base
H baseH base
H base
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 
Configure h base hadoop and hbase client
Configure h base hadoop and hbase clientConfigure h base hadoop and hbase client
Configure h base hadoop and hbase client
 
I pv6
I pv6I pv6
I pv6
 
Inventory system
Inventory systemInventory system
Inventory system
 

Information system availibility control

  • 2. What is Information?  “Information is the processed and refined form of data that is meaningful or useful to the recipient”.  Information processing is a societal activity.  A significant part of an individual’s working and personal time is spent in recording, searching for, and absorbing information.
  • 3. Some facts and figures!  As much as 80% of a typical executive’s time is spent in the processing and communication of information.  More than 50% of the united states work force is employed in jobs that primarily involve some form of information processing like :- documentation, report generation , analyses, plans etc.
  • 4. Importance  A valuable asset of any organization to achieve its goal and securing its existence in today’s competitive market.  We can say that it works like a backbone for any organization.
  • 5. Helping facets  Hardware  Software  Database  Procedures (documentation at each step)  Operations personnel (operators, system analysts, programmers, data administrators etc.)
  • 6. What we do for their proper safeguarding? Implement so many information system controls:  Physical facilities control  Terminal access control  Backup and recovery
  • 7. A catastrophe  Time :- 6 am  Venue :- Huntsville, Alabana  Organization:- General Computer Services (GCS), a data processing bureau.  Event :- GCS caught fire at 6 am.  Loss:- Items like all the documentation, company records and corporate information destroyed in this catastrophe. Also hardware were the biggest losses.
  • 8.  Problem :- GCS was scheduled to deliver 15 payrolls on the same day.  Now, what did GCS people do to manage and survive without losing a single customer?
  • 9. Physical facilities control  Computer and its other equipment installation consumes few thousands to several million dollars depending on the size of installation. So, it requires protection.  Data are mostly stored in magnetic tapes or magnetic disk packs are highly valuable to the organization.  Any type of disk damage or unauthorized access and the potential loss from theft may destroy the information.
  • 10. Remedies  Division of duties (so that a single person does not have complete control over the processing of an application), internal and external audit review, restricted access by operators to program documentation and restricted access to data files and program files.  In spite of centralized processing, distributed system is implemented.
  • 11. Advantage of distributed system  Gives the “fail-soft” protection.  Fail-soft protection :- “The capability to continue processing at all sites except the non functioning one is called “fail-soft” protection.”  Disadvantage of centralized system :- If the server “goes down” all processing ceases.
  • 12. Some other facets  Fire  Flood  Human riots  Earth Quakes  Employee dishonesty .  Employee dishonesty problem can be removed from organization by combination of careful employment screening plus fidelity insurance.  From fire, flood, human riots, earth quakes like loses, the organization must be well insurance.
  • 13. Terminal access control  Today most of all systems are working online and for this, uses communication networks; there should be protection against illegal access.  Terminals represent access to computer, also processing capabilities and stored data , therefore , there should be :  Password control (from password security S/W ,or computer OS).  Various locks to prevent unauthorized physical presence.
  • 14. Backup and Recovery  For events like fire, natural disaster, malicious damage or accident that destroys equipments, S/W or data, there need to be procedures to recover from errors or failures to correct procedures.  The general approach to recovery is backup by creating copies of the files.  Example:- If an error destroys records in a file, backup procedures permit a previous version of a file to be restored and the processing is repeated.
  • 15.  Backup copies of data and S/W stored at off premises.  Arrangement of backup sites and facilities .  Backup and recovery plan should be established.  The backup may be in the form of diskettes or cassettes with which data should be copied each night from the organizations.  The backup copies should be stored in a secure locations.
  • 16. How GCS’s problem was solved?  At 10 am GCS operating unit was established at four employee’s homes.  Customers were informed about the fact and the entire processing was continued without any break.  Cause of Success:-  Nearly all the GCS S/W programs were accessible because a “backup system” was housed.  Within 10 days ,GCS’s hardware vendors (insurance company) had supplied them the needed equipments.