730 likes | 972 Views
Systems Analysis and Design. Systems Support and Security. Phase Description. Systems Operation, Support, and Security is the final phase in the systems development life cycle
E N D
Systems Analysisand Design Systems Support and Security
Phase Description • Systems Operation, Support, and Security is the final phase in the systems development life cycle • You will support and maintain the system, handle security issues, protect the integrity of the system and its data, and be alert to any signs of obsolescence • The deliverable for this phase is an operational system that is properly maintained, supported, and secured
Introduction • Managing systems support and security involves three main concerns: user expectations, system performance, and security requirements • Successful, robust systems often need the most support • In most organizations, more than half of all IT department effort goes into supporting existing systems
Overview • The systems operation, support, and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life • After delivering the system, the IT team focuses on support and maintenance tasks
User Support • Initial Training, during system implementation • User Training • New employees must be trained on the company’s information systems • User training package can be developed • Training users about system changes is similar to initial training • Objective is to show users how the system can help them perform their jobs
User Support • Help Desks • Often called an information center (IC) • Enhance productivity and improve utilization of a company’s information resources • Might have to perform the following tasks: • Show a user how to create a data query or report that displays specific business information • Resolve network access or password problems • Demonstrate an advanced feature of a system or a commercial package • Help a user recover damaged data
Maintenance Tasks • The systems operation, support and security phase is an important component of TCO (total cost of ownership) because ongoing maintenance expenses can determine the economic life of a system • Operational costs are relatively constant • Maintenance expenses vary over time
Maintenance Tasks • Four types of maintenance task can be identified • Corrective maintenance • Adaptive maintenance • Perfective maintenance • Preventative maintenance
Maintenance Tasks • Corrective Maintenance • Diagnoses and corrects errors in an operational system • Respond to errors in various ways, depending on nature and severity of the problem • In a typical procedure, a user submits a systems request that is evaluated, prioritized and scheduled
Maintenance Tasks • Corrective Maintenance • For more serious situations, a user submits a systems request with supporting evidence • Worst-case situation is a system failure • When the system is operational again, the maintenance team determines the cause, analyzes the problem, and designs a permanent solution
Maintenance Tasks • Adaptive Maintenance • Adds enhancements to an operational system and makes the system easier to use • The procedure for minor adaptive maintenance is similar to routine corrective maintenance • Can be more difficult than new systems development because the enhancements must work within the constraints of an existing system
Maintenance Tasks • Perfective Maintenance • Involves changing an operational system to make it more efficient, reliable and maintainable • Can improve system reliability • Cost-effective during the middle of the system’s operational life • Programs that need a large number of maintenance changes usually are good candidates for reengineering because the more a program changes, the more likely it is to become inefficient and difficult to maintain
Maintenance Tasks • Preventive Maintenance • Requires analysis of areas where trouble is likely to occur • IT department normally initiates preventative maintenance • Often results in increased user satisfaction, decreased downtime, and reduced TCO • Sometimes does not receive the high priority that it deserves
Maintenance Management • Requires effective management, quality assurance and cost control • To achieve these goals, companies use various strategies • In addition, firms use version control and baselines to track system releases and analyze the system’s life cycle
Maintenance Management • The Maintenance Team • System administrator • Systems analysts • Analysis • Synthesis • Programmers • Applications programmer • Systems programmer • Database programmer • Programmer/analyst
Maintenance Management • The Maintenance Team • Organizational issues • IT managers often divide systems analysts and programmers into two groups: one group performs new system development, and the other group handles maintenance • Many analysts feel that maintenance work is less attractive than developing new systems • One disadvantage of rotation is that it increases overhead costs
Maintenance Management • Maintenance Requests • Involve a series of steps • All work must be covered by a specific request
Maintenance Management • Establishing Priorities • In many companies, systems review committee separates maintenance requests from new systems development requests • Some IT managers believe that evaluating all projects together leads to the best possible decisions • Object is to have a procedure that balances new development and necessary maintenance work
Maintenance Management • Configuration Management is a process for controlling changes in system requirements during software development or after system becomes operational • As enterprise-wide information systems grow more complex, configuration management becomes critical • Also helps to organize and handle documentation
Maintenance Management • Maintenance Releases • With maintenance release methodology all noncritical changes are held until they can be implemented at the same time. • Each change is documented and installed as a new version of the system called maintenance release • A numbering pattern distinguishes the different released
Maintenance Management • Version Control • Version control tracks system releases • Old version is archived
Maintenance Management • Baselines • Systems analysts use formal reference points called baselines to measure and document system characteristics at a specific time • Functional baseline, beginning of project • Allocated baseline, end of design phase • Product baseline, beginning of system operation
System Performance Management • Today, companies use complex networks and client/server systems to support business needs • To ensure satisfactory support for business operations, the IT department must manage system faults and interruptions, measure system performance and workload, and anticipate future needs
System Performance Management • Fault Management • The more complex the system, the more difficult it can be to analyze symptoms and isolate a cause • The best strategy is to prevent problems by monitoring system performance and workload
System Performance Mgmt. • Performance and Workload Measurement • Benchmark testing, use of standards • Metrics such as number of transactions for a given time period • Response time • Bandwidth (amount of data transferred in a fixed time period) and throughput (actual system performance under specific conditions) • Turnaround time measures time between request submission and its fulfillment
System Performance Management • Capacity Planning • Monitors current activity and oerformance levels, anticipates future activity and forecasts resources needed to provide desired levels • Detailed information about the number of transactions; the daily, weekly, or monthly transaction patterns; the number of queries; and the number, type, and size of all generated reports are required
System Security Overview • Security is a vital part of every computer system • System Security Concepts, CIA triangle • Confidentiality: protect information from unauthorized disclosure • Integrity: Prevent unauthorized users to create, modify or delete information • Availability: Ensure authorized users to have timely and reliable access
System Security Overview • Risk Management • Absolute security is not a realistic goal • Risk management uses risk identification, risk assessment and risk control
System Security Overview • A threat is an internal or external entity that could endanger an asset (hardware, software, people, etc.) of a company. • Vulnerability is a securit weakness • Exploit is an attack that takes advantage of a vulnerability • Risk is the impact of an attack multiplied by the likelihood of a vulnerability being exploited
System Security Overview • Avoidance eliminates risk by adding protective safeguards (firewall) • Mitigation reduces impact by careful planning and preparation (disaster recovery plan) • Transference shifts the risk to another asset or party (insurance company) • Acceptance means that nothing is done
System Security Overview • An attack is a hostile act that targets the system • Attacker Profiles and Attacks • An attack might be launched by a disgruntled employee, or a hacker who is 10,000 miles away • Attackers break into a system to cause damage, steal information, or gain recognition, among other reasons
Security Levels • Physical Security • Physical access to a computer represents an entry point into the system and must be controlled and protected • Operations center security • Biometric scanning systems • Servers and desktop computers • Keystroke logger • Tamper-evident cases (alarm when unlocked) • BIOS-level, Boot-level, or Power-on password • Uninterruptible power supply (UPS)
Security Levels • Physical Security - Notebook computers • Select an operating system that allows secure logons and BIOS-level passwords • Mark or engrave the computer’s case (make less desirable for resell) • Built-in fingerprint reader • Universal Security Slot (USS) that can be fastened to an alarm • Back up all vital data • Use tracking software • While traveling, try to be alert to potential high-risk situations • Establish stringent password protection policies
Security Levels • Network Security • Data can be encrypted • Unencrypted – plain text • Private key encryption, symmetric, single key is used and known by both sender and receiver beforehand • Public key encryption (PKE), asymmetric, each user has a pair of keys