信息管理专业英语8单元课文翻译.docx

上传人:b****7 文档编号:8936731 上传时间:2023-02-02 格式:DOCX 页数:6 大小:19.23KB
下载 相关 举报
信息管理专业英语8单元课文翻译.docx_第1页
第1页 / 共6页
信息管理专业英语8单元课文翻译.docx_第2页
第2页 / 共6页
信息管理专业英语8单元课文翻译.docx_第3页
第3页 / 共6页
信息管理专业英语8单元课文翻译.docx_第4页
第4页 / 共6页
信息管理专业英语8单元课文翻译.docx_第5页
第5页 / 共6页
点击查看更多>>
下载资源
资源描述

信息管理专业英语8单元课文翻译.docx

《信息管理专业英语8单元课文翻译.docx》由会员分享,可在线阅读,更多相关《信息管理专业英语8单元课文翻译.docx(6页珍藏版)》请在冰豆网上搜索。

信息管理专业英语8单元课文翻译.docx

信息管理专业英语8单元课文翻译

ThreatstoInformationandWaystoReduce

Bibliography:

GeraldV.Post,DavidL.Aderson.ManagementInformationSystemsBusinessProblemswithInformationTechnology(ThirdEdition).McGraw-HillEurope,2002,pp.116-120.

Manypotentialthreatsexisttoinformationsystemsandthedatatheyhold.Thecomplicatedaspectisthatthebiggestinformationthreatisfromlegitimateusersanddevelopers.Purelybyaccident,ausermightenterincorrectdataordeleteimportantinformation.Adesignermightmisunderstandanimportantfunctionandthesystemwillproduceerroneousresults.Aninnocentprogrammingmistakecouldresultinincorrectordestroyeddata.Minorchangestoafrailsystemcouldresultinacascadingfailureoftheentiresystem.

Wecandetectandpreventsomeoftheseproblemsthroughcarefuldesign,testing,training,andbackupprovision.However,moderninformationsystemsareextremelycomplex.Wecannotguaranteetheywillworkcorrectlyallofthetime.Plus,theworldposesphysicalthreatsthatcannotbeavoided:

hurricanes,earthquakes,floods,andsoon.Often,thebestwecandoistobuildcontingencyplansthatenablethecompanytorecoverasfastaspossible.Themostimportantaspectofanydisasterplanistomaintainadequatebackupcopies.Withcarefulplanning,organization,andenoughmoney,firmsateabletoprovidevirtuallycontinuousinformationsystemssupport.

Asecondsetofproblemsarisesfromthefactthatastechnologychanges,sodocriminals.Today,onlyadesperatepersonwouldrobabankwithagun.Theprobabilityofbeingcaughtishigh,andtheamountofmoneystolenislow.Notthatwewishtoencourageanyonetobecomeathief,butthecomputeroffersmucheasierwaystosteallargeramountsofmoney.

Itisimportanttodeterminethepotentialthreatstocomputersecurity.SometoolshavemadeiteasierforoutsiderstoattackcompaniesovertheInternet,butbyfarthebiggestissuesremainpeopleinsidethecompanyandviruses.

Disasters:

Fortunately,fires,floods,hurricanes,andotherphysicaldisastersdonothappentoooften.Butwhenadisasterdoeshitacompanyisdatacenter,itcoulddestroythecompany.Withoutadvancepreparations,thelossofadatacenter,couldshutdowntheoperations.Howlongcanamoderncompanysurvivewithouttransactionprocessing?

Today,therearemanywaystoplanforandrecoverfromdisasters.Acommonmethodtodayistocontractwithadisasterrecovery,servicesprovider.ServiceproviderslikeSunGardprovideaccesstotheircommercialrecoveryfacilitiesandprovideseverallevelsofsupportforvariousfees.Onecommonlevelofsupport,calledahotsite,consistsofafullyconfiguredcomputercenter.Specificcomputerequipmentisalreadyinstalledandreadyforimmediateuse.WhentheMISstaffdeclaresadisaster,theyinstallthebackuptapesonthehot-sitecomputersandusetelecommunicationlinestoruntheday-to-dayoperations.Anotheralternativeistocontractforacoldsite,whichprovidesfullyfunctionalcomputerroomspace,withoutthecomputerequipment.Ifadisasteroccurs,eitherthecompanyorthedisasterrecoveryservicesprovidercanarrangeforthenecessaryequipmenttobeshippedtothecoldsite.However,theremightbeadelayofseveraldaysbeforethenowdatacenterwillbeoperational,soacoldsiteisoftenusedinconjunctionwithahotsitecontract.

Forcomputeroperationsthatabsolutelymustneverbeinterrupted,somefirmsutilizeaback-upcomputerthatiscontinuouslyrunningtomaintainacompletecopyofthedailyoperations,Alldataismaintainedsimultaneouslyatbothlocations.Ifproblemsarisewithonemachine,thesecondonetakesoverautomatically.Specialtyfirmsarenowofferingthesedatamirroringfacilities.Theoutsidefirmissentcopiesofallofyourdataasitisgenerated.Thefirmmakesbackupcopiesandprovidesvirtuallyinstantaneousrenewalofserviceifsomethinginterfereswithyourmaincomputer.

EmployeesandConsultants

Employeesaretheheartofanycompany.Companiesfunctionandsucceedbytrustingtheiremployees.Althoughalmostallemployeesarehonestanddiligent,theseisalwaysthechancethatone.Employeewillusethecompanyisknowledge,experience,andtrusttomisappropriateresources.

Itcanbedifficulttoidentifypeoplewhomightcausedamagetothefirm.Manycompaniestodayusepsychologicaltests,backgroundchecks,andrandomdrugteststoindicatepotentialproblems.Mostcompaniesarewaryofemployeeswhoseemploymenthasbeenterminated.Businessesfollowspecificstepswhenemployeesleave,beingparticularlycarefultoremovetheemployeesisaccesstocompanycomputers.

AmorecomplicatedproblemariseswithMISemployees.Programmersandanalysishavetobetrusted.Withoutthem,therewouldbenosoftware.However,itisgenerallybestiftheprogrammersarenottheusersoftheprogram.Companiesenforceaseparationofdutiesamongstaffprogrammersandusers.Thinkaboutwhatmighthappenifabanktellerwasalsoresponsibleforwritingthecomputerprogramusedbytellers.Itwouldbeeasytousethecomputertostealmoneyfromdifferentaccounts.Auditingtransacting-processingsystemsisanimportanttaskforauditors.

Unscrupulousprogrammershavealsobeenknowntoinclude“timebombs”intheirsoftware.Wheneverthesoftwareruns,itchecksahiddenfileforasecretword.Iftheprogrammerleavesthecompany,thesecretworddoesnotgetchanged.Whentheprogramdoesnotfindthecorrectword,itstartsdeletingfiles.Onlargeprojects,thesebombscanbeimpossibletospot(untiltheygooff).Keepinggoodbackupscanusuallyminimizethedamage.Asarelatedsidenote,thesoftwareindustryispushingstatestoadoptanewsetoflaws(UCITA)thatmakesitlegaltoincludeashutdowntimebombifasoftwarecompanyhasadisputewithabusinessthatusesitssoftware.

Anotherdangerareaisthatprogrammersmightincludeatrapdoororsecretpasswordthatallowsthemtogainaccesstothesoftwareeveniftheyleavethecompany.Sometimesthesetrapdoorsareinstalledinnocently,toenableprogrammerstomakecorrectionsfaster.Theimportantpointistomakesuretheyareremovedwhenthesystemsispermanentlyinstalled.

Aninterestingclassofthreatstosecuringyourdataarisesfromnegligenceinsteadofdeliberateactionsbytheusers.Forinstance,employeesmightaccidentallydeletedata.Or,carryingdisks,tapes,orevenlaptopcomputerspastmagneticfieldscansometimesdamagethefiles.Inthesecases,thebestbetistohavebackupsreadilyavailable.Morecomplicatedproblemsarisewhenlaptopcomputersarelostorevenstolen.Inadditiontothedatastoredonthemachines,thefilesoftenholdpasswordsforcorporatecomputers.Manylaptopsprovidepasswordsandencryptthedatatominimizetheseproblems.Oneotherproblemthatfallsintothiscategoryisawarningtobecarefulabouthowyoudisposeofoldtapes,disks,andcomputerequipment.Businessesrunsimilarrisksthentheysendcomputerequipmentoutforrepairs.

Ingeneral,thebestwaytominimizeproblemsformemployeesstemsfromtypicalmanagementtechniques,Hireworkerscarefully,treatemployeesfairly,haveseparationofjobs,useteamwork,andmaintainconstantchecksontheirwork.Consultantspresentthesamepotentialproblemsasemployees.However,consultantstendtobehiredforashorttime,sothefirmknowsevenlessaboutthemthanaboutregularemployees.Consultantsaregenerallyusedforspecializedjobs,sotheremaynotbeanyinternalemployeeswhocanadequatelymonitortheirwork.

Businesspartnerships

Ascomputersspreadthroughouteveryaspectofbusiness,manycompaniessharetheirdata.Forexample,GeneralMotorsasksitssupplierstoprovideallinformationelectronically.Thiselectronicdatainterchange(EDI)meansthatbusinessinformationisprocessedfasterandwithfewererrors.Theproblemisthatinmanycases,itmeansGMgivesothercompaniesconsiderableaccesstoGMiscomputerandviceversa.Forinstance,ifGMisthinkingaboutincreasingproduction,themanagersmightwanttochecksupplierproductionschedulestomakesurethesupplierscouldprovideenoughparts.Todoitelectronically,Gmneedsaccesstothesuppliersiscomputers.Toparticipateinbusinesstoday,youmusttrustyourpartners.However,youhavelimitedabilitytoevaluatealloftheiremployees.

TheissueofpartnershipsbecomesmoreimportantinanInternetworldofsoftware.Increasingly,firmsareprovidingservicesovertheInternet-wherethesoftwareandyourdataresideonaserviceprovideriswebsite.AgoodexampleisNetLedger,whichisanapplicationserviceonvider(ASP)thatprocessesallofyouraccountingneedsonitswebsite.ThemainadvantagesofanASPare

(1)expertssetupandrunthesitesoyoudonothavetohirespecialists,

(2)storingthedataontheWebmeansitisaccessibletoyouremployeeswherevertheyhaveWebaccess,and(3)youcanstartandscaleuptoareasonablesizewithouthassles.Apotentialdrawbackisthatallofyourfinancialdataisstoredonasiterunbysomeoneelse.Ofcourse,thereputationoftheASPdependsonprotectingyourdataandmaintainingsecurity,soitprobablysaferthanwhatasmallbusinesscouldhandleindependently:

however,youshouldstillinvestigatetheASPsecurityprocedures.

Outsiders

Thereissomethreatfromoutsiderswhomightdialupyourcomputerandguessapassword.Usingsomecommonsensecanminimizemostofthesethreats.Forexample,inthe1980s,somegroupsgainedaccesstocomputersbecausetheoperatorsneverchangedthedefaultpasswordthatwasshippedwiththecomputer!

Theinternetcausesadditionalproblemsbecauseitwasdesignedtogiveotherpeo

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 高等教育 > 农学

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1