Smis PPT Final
Smis PPT Final
Smis PPT Final
Presented
by:Deepak
Naveen
Sajjin
The most common assaults on information systems originate from the employees themselves.
The second largest source of errors in information system is hardware malfunction, the
Third place belongs to employees using their position in the institution for their own personal
gain, or employees using this to express their dissatisfaction or hostility to the firm or their
superiors.
Data Protection With Physical Procedures and Passwords
Kensington locks are security systems used for protecting mice and other entry and
output devices from theft.
by using protectors, sensor lights, surveillance cameras, special systems for locking
rooms and lockers used for storing computer equipment, alarm systems, and locators..
Giving limited access to employee according to his position and job description.
Setting a strong password and regularly changing it.
Keeping up to date anti virus
Temporary database in the main database
Duplicate data base in a secondary location outside the firm.
Cont.
Advantages
Complete visibility into all the important processes, across various departments of an
organization
A unified and single reporting system to analyze the statistics/status etc. in real-time,
across all functions/departments.
Advanced
Since
Systems
systems
Contd..
Disadvantages
Deployments are highly time-consuming projects may take 1-3 years (or
more) to get completed and fully functional.
Too little customization may not integrate the system with the business
process & too much customization may slow down the project and make it
difficult to upgrade.
The
Contd..
Thank You