SlideShare una empresa de Scribd logo
1 de 7
UNDERSTANDING ISSUES     Unit 2
RELATING TO THE USE OF   Operational
                         Issues
         INFORMATION
OPERATIONAL ISSUES

• Security of information
• Health and safety
• Organisational policies
• Costs for development, modification,
 training, system upgrades
• Continuance planning
SECURITY OF INFORMATION

 Loss of data can have disastrous consequences for an
  organisation.
 They must have systems in place to enable them to recover from
  a situation where data may have been stolen or damaged.
 It can be deliberate or accidental damage, it could be a virus or a
  natural disaster.
 Anti virus software, firewalls and data encryption are amongst
  the methods used to protect the software.
 A regular and secure system for backing up information is
  needed with the backed up data being stored away from the site.
HEALTH AND SAFETY

 All organisations must have a Health and Safety Policy
 In IT There are regulations that apply to screens and monitors,
  their positioning and usage.
 Keyboards, mice, chairs and tables must be appropriately
  positioned.
 Computer users are entitled to free eye tests.
 They should have regular breaks away from the computer.
ORGANISATIONAL POLICIES

 As well as a Code of Practice and Non Disclosure Agreements
  some organisations have policies that dictate which staff can
  have access to particular information
 They will have a policy telling staff what they should do if they
  are aware that any data is incorrect.
COSTS

 Any new IT developments will involve costs.
     Buying equipment
     Installing the system
     User testing and training
     Maintenance
 Modern IT systems are complex and staff will require training.
 To ensure their systems are effective experts in both business
  and IT will be required.
BUSINESS CONTINUANCE PLANS

 Organisations depend on their IT systems and system failure can
  have major cost implications.
 They should have a BCP to enable them to overcome any system
  failure as quickly as possible.
 A good example is to provide a dual network, attaching alternate
  computers to each network. Then, if there is a complete failure
  of one network, half the computers will continue to work.

Más contenido relacionado

La actualidad más candente

Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Introduction to Information System Security
Introduction  to Information System SecurityIntroduction  to Information System Security
Introduction to Information System Securitychauhankapil
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Siti Mustiani
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASISDermot Clarke
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standardsWilson Musyoka
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Iinformation security
Iinformation securityIinformation security
Iinformation securityamitmujumdar
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 

La actualidad más candente (20)

Implementing security
Implementing securityImplementing security
Implementing security
 
Introduction to Information System Security
Introduction  to Information System SecurityIntroduction  to Information System Security
Introduction to Information System Security
 
P3 m2
P3 m2P3 m2
P3 m2
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standards
 
Information Security
Information SecurityInformation Security
Information Security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Absolutemanagea4
Absolutemanagea4Absolutemanagea4
Absolutemanagea4
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Iinformation security
Iinformation securityIinformation security
Iinformation security
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 

Destacado

2 written communication
2 written communication2 written communication
2 written communicationMrsNunn
 
Planning
PlanningPlanning
PlanningMrsNunn
 
Graphic File Formats
Graphic  File  FormatsGraphic  File  Formats
Graphic File Formatsaidanbd
 
File types pro forma
File types pro formaFile types pro forma
File types pro formaJessStanton_
 
Intro to robotics
Intro to roboticsIntro to robotics
Intro to roboticsMarc Dy
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in itMrsNunn
 
Lewis Hill File types pro forma(1)
Lewis Hill File types pro forma(1)Lewis Hill File types pro forma(1)
Lewis Hill File types pro forma(1)Lewis Hill
 

Destacado (7)

2 written communication
2 written communication2 written communication
2 written communication
 
Planning
PlanningPlanning
Planning
 
Graphic File Formats
Graphic  File  FormatsGraphic  File  Formats
Graphic File Formats
 
File types pro forma
File types pro formaFile types pro forma
File types pro forma
 
Intro to robotics
Intro to roboticsIntro to robotics
Intro to robotics
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in it
 
Lewis Hill File types pro forma(1)
Lewis Hill File types pro forma(1)Lewis Hill File types pro forma(1)
Lewis Hill File types pro forma(1)
 

Similar a Lesson 3

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcareRay Treurniet
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
6 computer systems
6 computer systems6 computer systems
6 computer systemshccit
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxmccormicknadine86
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 

Similar a Lesson 3 (20)

Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
itgc.pptx
itgc.pptxitgc.pptx
itgc.pptx
 
IT Policy
IT Policy IT Policy
IT Policy
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
P3
P3P3
P3
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 

Más de MrsNunn

Page Plans
Page PlansPage Plans
Page PlansMrsNunn
 
Delivery formats
Delivery formatsDelivery formats
Delivery formatsMrsNunn
 
Production process
Production processProduction process
Production processMrsNunn
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtaeMrsNunn
 
Questioningv2
Questioningv2Questioningv2
Questioningv2MrsNunn
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1MrsNunn
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriersMrsNunn
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the websiteMrsNunn
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media siteMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 

Más de MrsNunn (20)

Page Plans
Page PlansPage Plans
Page Plans
 
Delivery formats
Delivery formatsDelivery formats
Delivery formats
 
Production process
Production processProduction process
Production process
 
Sources
SourcesSources
Sources
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtae
 
Questioningv2
Questioningv2Questioningv2
Questioningv2
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriers
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the website
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media site
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 

Lesson 3

  • 1. UNDERSTANDING ISSUES Unit 2 RELATING TO THE USE OF Operational Issues INFORMATION
  • 2. OPERATIONAL ISSUES • Security of information • Health and safety • Organisational policies • Costs for development, modification, training, system upgrades • Continuance planning
  • 3. SECURITY OF INFORMATION  Loss of data can have disastrous consequences for an organisation.  They must have systems in place to enable them to recover from a situation where data may have been stolen or damaged.  It can be deliberate or accidental damage, it could be a virus or a natural disaster.  Anti virus software, firewalls and data encryption are amongst the methods used to protect the software.  A regular and secure system for backing up information is needed with the backed up data being stored away from the site.
  • 4. HEALTH AND SAFETY  All organisations must have a Health and Safety Policy  In IT There are regulations that apply to screens and monitors, their positioning and usage.  Keyboards, mice, chairs and tables must be appropriately positioned.  Computer users are entitled to free eye tests.  They should have regular breaks away from the computer.
  • 5. ORGANISATIONAL POLICIES  As well as a Code of Practice and Non Disclosure Agreements some organisations have policies that dictate which staff can have access to particular information  They will have a policy telling staff what they should do if they are aware that any data is incorrect.
  • 6. COSTS  Any new IT developments will involve costs.  Buying equipment  Installing the system  User testing and training  Maintenance  Modern IT systems are complex and staff will require training.  To ensure their systems are effective experts in both business and IT will be required.
  • 7. BUSINESS CONTINUANCE PLANS  Organisations depend on their IT systems and system failure can have major cost implications.  They should have a BCP to enable them to overcome any system failure as quickly as possible.  A good example is to provide a dual network, attaching alternate computers to each network. Then, if there is a complete failure of one network, half the computers will continue to work.