Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 12: Managing System Support and Security, by: hajarmat - Coggle…
CHAPTER 12: Managing System Support and Security
user support
user training
new employees must be trained on company
information system
about system changes is similar to initial training
to show user how the system can help them perform job
help desk
enhance productivity& improve utilization of company ifo
utilize many type of automated support
outsourcing issues
maintanance task
corrective maintanace
diagnose&correct errors
respond to error
worst-case situation is a system failure
adaptive maintenance
add enhancement to operational system&makes
system easier to use
can be more difficult than new system development
perfective maintenance
involves changing an operational system
to make it more efficient
cost-effective during middle of sysetm operational life
more program change more to become inefficient and difficult to maintain
maintenance
management
request
involve series step
all work must covered by specific request
task completion
user notification
initial determination
establish priorities
configuration
management
help organize and handle
documentation
maintenance
release
reduce documentation burden
service packs
version control
archived
essential part of system documentation
baseline
allocaet baseline
functional baseline
product baseline
sysetm analyst use it as yardstick to
document feature and prformance
system performance
management
fault management
more complex the system more difficult
to analyze symptom&isolate cause
performance&workload
measurement
benchmark testing
matrics
response time
bandwidth&throughput
turnaround time
capacity
planning
what-if analysis
need detailed information
need accurate forecast of future
business activities
system maintenance
tools
CASE tools
system security
security is vital part of
every computer system
system security concepts
CIA triangle
integrity
availabality
security policy
risk management
absolute security not a realistic goal
risk identification-exploit
risk assesment-risk
risk control
attacker profile&attack
break into system cause
damage,steal
info/gain recognition
security level
consider 6 separate but interrelated level
physical security
network security
application security
procedural security
file security
user security
backup&disaster recovery
policies
policy
media
type
retention periods
business continuity issues
test plan
BCP
hot site
data replication
by: hajarmat