CH 5 - IS Planning: Concept Map of Understanding Isp
CH 5 - IS Planning: Concept Map of Understanding Isp
Components of ISP
The Process of Information Systems Planning
Strategic Alignment of Business and IT
Selecting Systems to Invest In
Project Management Issues
Why ISP?
HOW?
Look at business structure, function, processes, culture
Look at existing IT
Look at available technology.
Carry out interviews
Develop policies
Develop application portfolio
Plan schedules for migration, implementation etc.
e-Reference - http://www.cse.dmu.ac.uk/~nkm/sisp/CONTENTS.html
No Planning
Speaks for itself – more of this about than you might think
Inputs and Outputs for the Traditional Information Resource Plan
IT Planning
A Strategic information systems plan identifies a set of computer-based applications that will help a
company reach its business goals.
IT planning identifies the applications portfolio, a list of major, approved IS projects that are
consistent with the long-range plan.
Initial mechanisms addressed operational planning, and eventually shifted to managerial planning.
RFC 1244
``Site Security Handbook''
Defines security policies & procedures
Policy violations
Interpretation
Publicizing
Identifying problems
Incident response
Updating
Other Documentation
Hardware/software inventory
Network topology
Key personnel
Emergency numbers
Incident logs
Choosing a security audit platform: Hardware Choosing a security audit platform: Software
laptop computer Unix / Linux
three kilograms or less Secured OS
graphics display OS source code
MB memory Audit tools
MB disk Development tools
ethernet (as many connectors as possible)
Unix / Linux
BSD: FreeBSD, SunOS/Solaris, OpenBSD ?
Source code
A good development platform
Large body of available literature
Audit/review security policy Security policy
Utilize existing or use ``standard'' policy Treat the policy as a potential threat
Treat the policy as a potential threat Bad policies are worse than none at all
Does it have all the basic components? Good policies are very rare
Are the security configs comprehensive? Look for clarity & completeness
Examine dissemination procedures Poor grammar and spelling are not
tolerated
Review Documentation
Hardware/software inventory
Network topology
Key personnel
Emergency numbers
Incident logs
Technical Investigation
Run static tools (COPS, Crack, etc.)
Check system logs
Check system against known vulnerabilities (CERT, bugtraq, CIAC advisories, etc.)
Follow startup execution
Check static items (config files, etc.)
Search for privileged programs (SUID, SGID, run as root)
Examine all trust
Check extra network services (NFS, news, httpd, etc.)
Check for replacement programs (wuftpd, TCP wrappers, etc.)
Code review ``home grown'' programs (CGI's, finger FIFO's, etc.)
Run dynamic tools (ps, netstat, lsof, etc.)
Actively test defenses (packet filters, TCP wrappers, etc.)
Network daemons
Anything SUID, SGID
Programs run as system account
CGI's
Code review, etc(cont.)
Bad signs:
o external commands (system, shell, etc.)
o /usr/ucb/mail
o large size
o No documentation
o No comments in code
o No source code available
Enterprise Analysis
An analysis of organization-wide information requirements by looking at the entire organization in
terms of organizational units, functions, processes, and data elements; helps identify the key entities
and attributes in the organization’s data
Developed by IBM in the 1960s
Method: Take a large sample of managers and ask them how they use information, where they get
it, what their environment is like, what their objectives are, how they make decisions and what their
data needs are
Aggregate &
analyze
individual
CSFs
Develop
agreement on
company
CSFs
Define
company
CSFs
Use CSFs to
Define DSS develop IS
and databases priorities
CSF Limitations
Produces a smaller set of data to analyze
Can be tailored to the structure of each industry
Takes into account the changing environment
Data collection and analysis are ‘art forms’
Confusion between individual and organizational CSFs
Biased towards top managers
Assumes that successful TPS already exist
Like the Enterprise Analysis method provides a static picture
Systems Development and Organizational Change
Global networks (International division of labor; global reach of firms)
Enterprise networks (collaborative work)
Distributed Computing (empowerment)
Portable Computing (virtual organizations)
Graphical User Interfaces (everybody has access to information)
Systems Design
Systems Design: details how a system will meet the information requirements as determined by the
systems analysis
o Output, Input, User Interface, Database Design, Processing, Manual Procedures, Controls,
Security, Documentation, Conversion, Training, Organizational Changes
The Payback Method- A measure of the time required to pay back the initial investment of a project
Accounting Rate of Return on Investment (ROI) - Calculation of the rate of return from an investment by
adjusting cash inflows produced by the investment for depreciation
Net Present Value (NPV) - The amount of money an investment is worth, taking into account its cost,
earnings, and the time value of money
Cost-Benefit Ratio - A method for calculating the returns from a capital expenditure by dividing the total
benefits by total costs