Professional Documents
Culture Documents
3
1. Network Management & Monitoring
•Enterprise network management is the task of ensuring
that the networks and systems provide the required
services with the specified quality of service to the users
and other systems.
4
2. Systems Management & Monitoring
7
4. Application management and monitoring
8
5. Application integrations
10
7. Notification management & strategy
11
8. Performance & Capacity Management
Performance monitoring in this context does not simply
mean monitoring servers for CPU or disk utilisation. It is
more concerned with creating a function whereby you can
deliver performance data to teams if they require it. This
could be in the form of performance graphs/reports for
reviewing testing cycle phases, for analysing environments
during major faults/incidents, or for providing dataevidence
to support trending or capacity planning exercises.
12
9. Service management
13
10. Reporting
Effective reporting on metrics can help identify trends, show project benefits
& ultimately justify projects & resourcing. Examples of some useful types
of reporting include incident reports (tickets per team, for example),
notification reports (frequency of out-of-hours callouts), performance
& capacity reports (CPU utilisation, free disk space etc.) and ultimately service
reports (indicating service levels, SLAs etc.). Reporting is not something
that may need to be considered at the onset of an Enterprise Management
programme, but it should be considered carefully and investigated completely
when the requirement presents itself.
14
Information resource management
16
Importance of IRM
19
Technology Management is a multi-disciplinary activity that
focuses on the integration of engineering, computer science,
information technology, and business management for two
purposes:
20
Importance
• Rapid changes in technology
21
Information system planning methodologies
22
Information system planning methodologies
24
1. Corporate mission
Steps in IS planning
statement
2. Information system mission
statement
5. Operational plans
6. Budget
Critical success factors
1. Proper Planning
One of the most important factors in implementing a information
system is proper planning in the initial stages. The organization
implementing the information system must understand what is
needed, why it is needed and the most efficient way of achieving
the goal. Information systems will not be able to deliver the
necessary information without proper planning and organization.
Even if there is a sense of urgency in implementing the
information system, it should not be at the cost of proper
planning.
26
2. Strong Leadership
Strong leadership overseeing the implementation of the
information system is an absolute necessity. The leaders
must be able to inspire and motivate people from
multiple departments and companies in order to ensure
the proper flow of information. Thus, it is necessary for
top management and organization leaders to understand
the long-term goal for the information system and
potential hurdles that may occur.
27
3. Collaboration
28
4. Implementation Skills
29
Business system planning (BSP)
Hacking
Information theft
Software piracy
Unauthorised use
Intellectual property violations
Computer viruses and worms
Online illegal transactions
33
Security management
Backup
Antivirus Security monitors
Encryption Biometric security
Firewalls Failure control
Monitoring mails Fault tolerant systems
Security codes Disaster recovery
Protection from illegal System controls and
transaction audit
34
Security and ethical challenges
Ethical challenges
35
Ethical challenges
36
Ethical challenges
What is ethics?
37
Ethical challenges
38
Information system controls
General controls
Load balancing
Clustering
Trojan horse: appears to be benign, but then does something other than
expected
5. Sniffing
Packet sniffing allows individuals to capture data as it is
transmitted over a network. This technique is used by
network professionals to diagnose network issues, and
by malicious users to capture unencrypted data, like
passwords and usernames.
5.Denial of Service attack
This is a cyber attack in which the
perpetrator(hacker) seeks to make a machine or
network recourses unavailable to its intended users
by temporarily or indefinitely disrupting services of a
host connected to the internet.
6. Phishing
Phishing is a cyber attack that uses disguised email as a weapon. The goal
is to trick the email recipient into believing that the message is something
they want or need , a request from their bank, for instance, or a note
from someone in their company and to click a link or download an
attachment.
What really distinguishes phishing is the form the message takes: the
attackers masquerade as a trusted entity of some kind, often a real or
plausibly real person, or a company the victim might do business with. It's
one of the oldest types of cyber attacks,