Tuesday, 28 June 2011

ISOM - How IT/IS can give benefits and disadvantages

Information System Organization Management

How IT/IS can give benefits and disadvantages
1.   Education
2.   Growth of organization
3.   Interpersonal skills of a person/individual

1.   Education
Advantages:- 
  • Online distance learning
With distance learning courses, students can complete their course work from just about anywhere, provided there’s a computer and Internet connection. This allows students to work when and where it is more convenient for them without having to squeeze in scheduled classes to an already busy life.

  • Availability
The information technology allows the availability as the system can be used 24 hours / 7 day a weeks. The students can download the slides and the question paper from the site all the time as long as the students is connected to the  Internet.

Disadvantages:-
  • lack of interaction.
You aren't in a classroom and don't have the opportunity to hear questions and discussion from other students. This isn't always an issue, depending on the subject of the online education course you are taking, but it could be an important factor in deciding whether an online education is the best option when seeking out opportunities for learning new skills or gaining new training.

  •  Not concentration
The students don't concentration to study, they just having a good mood to have more entertainment.

2. Growth of Organization
 
Advantages:-
  •  Communication
As a growing organization, the communication would be one of the important parts of its daily operation. By using the IT, the organization may contact with other business partners in oversea easily.
  • Time and cost
IT helps an organization to save its time and cost. For example they use email to communicate with the customer or client. And they doesn't need to send letter now use e-letter to communicate.

Disadvantages:-
  • Fraud of online transaction
Easily conduct transactions on the Internet will facilitate also cause a prohibited transaction such as transaction or transactions contraband drugs.
  • Security risks
It may bring a lot of security issues to the organization such as virus attack, hackers threats and etc.

3.   Interpersonal skills of a person / individual
Advantages:-

  • Explore by using the internet

Can search alot of information, resources, news, latest technologies, skills and etc by using the internet.
  • Good communication way
Individual may communicates with others through the internet easily such as Email, Facebook, MSN, and etc. Individual may contacts with his / her friends who is in other country easily with all the communication tools.

Disadvantages:-
  • Time consumption
Individual may used more of his/her time for using the IT resources such as surfing the internet. Individual may sit all the day in front of the computer for surfing the internet.
  • Health risk
Spend alot of time by using the computer, this may bring the health problem to him/  her such as radiation.

Tuesday, 21 June 2011

Disaster Recovery Plan

Disaster Recovery
 
Disaster recovery planning is an ongoing process, not a static document or software program.There are four important phases to the recovery planning process.

    Risk and Business Impact Analysis
This analysis prioritizes a company's business functions and resources, and identifies the critical business functions those that must continue, while others can be restored later.This phase also identifies steps that prevent minor events from becoming disasters.
        Strategic Planning

This step evaluates a wide range of recovery alternatives for critical business functions.We help our clients balance initial and ongoing costs with recovery time frames for each strategy.With an objective comparison of costs and benefits, our clients can make informed decisions regarding their recovery capabilities.
    Business Continuation Plan Documentation
This documentation phase organizes employees into recovery action teams.Each team will have specific objectives, resources and procedures to activate their recovery.Companies choose from the best format for their business continuation plans by business function, product line or specific location.

       Testing, Training and Maintenance

This phase exercises a company's evolving recovery capabilities and familiarizes its employees with their roles for plan implementation. Without testing and training, the plan is just a document.An effective plan is as dynamic as the company, so it demands updating as changes occur.

Tuesday, 7 June 2011

Security Measure for assignment

Question
Relate the following questions to your selected IS/IT discussed in your assignment

1. what is/are the potential/ current risk identified? 

2.What is/are the consequences of (1)?
3.Which security measures might be suitable / to be recommended in solving(2)? 

Please prepare the draft of requirement No.3 of the assignment question and post in on blog.

*Aim of this is to help  you to figure out how you should be writing the section on 'Risk, Security and Disaster Recovery Plan in your assignment.


Risk
Risks to the system:
  • The virus infections which may cause the computer unable to work.
  •  It attacks by hackers; the hackers can try to gain unauthorized access to the system in order to compromise system and data integrity, availability or confidentiality.
  • Theft of data by insiders. They might steal the company’s or the student data and sell it to other competitors company.

Security
Securities that can be taken to reduce the risk are:-
  • Use the anti-virus software and make sure the software is always up-to-date. 
  •   Make sure that the firewall is on.
  •  Need to control the employee access to the system by using the password.
  • Make sure there is least than 2 computers that are able to use in the Studio. To in case one of the computers was breaks down, and there is still another one that can be functioning.
Recovery
Disaster recovery plan is in case something happen, the company needs to do backup to protect the company important data. By the new system Student Record System, it needs to create another backup file to in case there is anything happen.