Thursday, September 3, 2009

MIS_ASSIGNMENT 5

Assignment 5
Based on your adopted organization(s), identify and discuss barriers in their IS/IT implementations....

Within the systems development cycle, there is always
Two one sided faces to be considered…

*Implementing and adoption of an Information System is a good catch for it offer a new features for the organizations development.
* But through this implementation, it is not deniable that there are some barriers exist as one of its cause and impacts.

Now let me share to you some important typical views and factual information regarding with the issue of the barriers in IT/IS which is considered as apart of hierarchical learning and development process in our chosen field of
specialization.

bounce Short live discussions…..bounce


The following discussions and deliberations are intactly detailed the barriers of IT/IS implementations exclusive within the NCCC and Ansuico Company.[/b]


bounce 1.)NCCC Department store bounce


Barriers are……….

1.) Delay/Slow (time-consuming) Connection

-According to the NCCC’s Hardware and Software Security Supervisor. This kind o barrier was a common reported issue that their company deals with. The existence of delay slow connection is usually occurring specially in the networking.

Subjective to this kind of barrier(problem). How the company’s management working in to it?

Relating to the Assignment 1, it had been mentioned the departments in NCCC Company that responsible for the company’s operations and transactions. This are:

*ICT- acts as the first handler of the management.

*Operation Group- concern within the business operations including the system implementation.

*Applications Group- liable for the maintenance of the management applied systems.

*Hardware and Software Security Group- responsible for implementing a suitable infrastructures within the company’s usage.

In correlation, the HS supervisor mentioned that the responsible for this kind of barrier is the Applications Group and the rest will serve as the supporting teams.


2.) Security in the applied system

Concerning in this another type of barrier, the task was given now to the HS Group.

Security in the systems means…..

is to devise ways to prevent the weaknesses from being exploited. To understand what preventive measures make the most sense, we consider what we mean when we say that a system is "secure."

When we talk about computer security, we mean that we are addressing three important aspects of any computer-related system: confidentiality, integrity, and availability.

Confidentiality ensures that computer-related assets are accessed only by authorized parties. That is, only those who should have access to something will actually get that access. By "access," we mean not only reading but also viewing, printing, or simply knowing that a particular asset exists. Confidentiality is sometimes called secrecy or privacy.
Integrity means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, changing, changing status, deleting, and creating.

Availability means that assets are accessible to authorized parties at appropriate times. In other words, if some person or system has legitimate access to a particular set of objects, that access should not be prevented. For this reason, availability is sometimes known by its opposite, denial of service.


The security problem occurs, if there’s a new system to be applied and implemented in the management. Why?
Because, applying a new OS is not a simple thing. It needs a higher level of awareness, enough knowledge and preparations to ride in a right track.


bounce Sanctions are…….

*It’s really a need to upgrade everything in the new OS, because if not, the security in their systems will be affected.
*There are possible features that cannot be adopt and applied.

bounce Other effects on the system:

*Record Record Loss
*Software Vulnerabilities
*Software Deletion
*Software Theft
*Data Vulnerabilities
*Trojan horse: a program that overtly does one thing while covertly doing another
*virus: a specific type of Trojan horse that can be used to spread its "infection" from one computer to another
*trapdoor: a program that has a secret entry point
*information leaks in a program: code that makes information accessible to unauthorized people or programs

So pertaining in this things, it much better to have a higher level of learnings and knowledge for the company’s benefits and advantages.

bounce ANSUICO COMPANY bounce

Common barriers that the company deal with are…..

1.) Brownout

Well, this kind of barrier is not a big deal issue, because it normally in unexpected time or place. But then it cause some harm, especially in manipulating and updating the companies record from time to time.

Brownout..............

is a drop in voltage in an electrical power supply, so named because it typically causes lights to dim. Systems supplied with three-phase electric power also suffer brownouts if one or more phases are absent, at reduced voltage, or incorrectly phased. Such malfunctions are particularly damaging to electric motors.[/center]

Effects of a brownout


Different types of electric devices respond in different ways to an undervoltage condition. Some are severely impacted while other devices may not be affected at all.
Resistive devices vary their heat output based on the supplied voltage. An incandescent lamp will dim due to the lower heat emission from the filament. No damage occurs but functionality is reduced. (Over voltage results in a much brighter lamp and rapid failure due to increased heat emission.)
Commutated electric motors (also called universal motors) vary their speed in response to voltage changes, so they will slow down during a brownout. This does not harm the motor but will reduce the speed of the device operated by the motor.
AC induction motors and three-phase motors will draw more current to compensate for the decreased voltage, which may lead to overheating and damage of the insulation on the motor's field windings.
A linear power supply (consisting of a transformer and diodes) will produce a lower voltage for electronic circuits, resulting in slower oscillation and frequency rates. In a CRT television, this can be seen as the screen image shrinking in size and becoming dim and fuzzy. The device will also attempt to draw more current, potentially resulting in overheating.
A switching power supply may be minimally affected if it was designed to compensate for over/under-voltage. However this is highly design-dependent, and it can malfunction and destroy itself if operated outside its normal voltage range.

2.)Virus

bounce What is a computer virus?bounce

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

According to the Hr manager, they also deal with this kind of barrier in their systems and the one who is responsible in this problem is the MIS department.

The MIS dept will now generate some possible solutions to overcome this problem. Then whatever the MIS dept had been mandated and implemented, all we can do is to follow for our department and companies benefits as well as to the employees.

Damaging effects of virus:

* Restriction among data tracking
* Disabled the functions in the current system use.
*Restriction among stored records, data and valuable informations.

Note :
These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date anti virus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

To remove a computer virus, follow these steps:

1.Install the latest updates from Microsoft Update on the computer.
2.Update the anti virus software on the computer. Then, perform a thorough scan of the computer by using the anti virus software.
3.Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer.

No comments:

Post a Comment