MCS-014 Block-4
MCS-014 Block-4
MCS-014
SYSTEMS ANALYSIS
AND DESIGN
Block
UNIT 12
Audit and Security of Computer Systems
16
UNIT 13
Management Information Systems
31
Language
Editors
Acknowledgements
To all the faculty of SOCIS, IGNOU for their comments on the course material;
to Shri Vikas Kumar for help in finalizing the CRC.
April, 2004
Indira Gandhi National Open University, 2004
ISBN-81-266-1199-5
All rights reserved. No part of this work may be reproduced in any form, by mimeograph or any other means,
without permission in writing from the Indira Gandhi National Open University.
Further information on the Indira Gandhi National Open University courses may be obtained from the
Universitys office at Maidan Garhi, New Delhi-110 068.
Printed and published on behalf on the Indira Gandhi National Open University, New Delhi by The Director,
SOCIS.
BLOCK INTRODUCTION
This block is on implementation and security of systems and management information systems.
Automation of manual processes in any organization is the order of the day. Apart from just
developing the software which may be information systems , the security of the transactions is
very important. In the absence of security, there is no value to the software. Though the software
is developed in modules, ultimate integration of modules and their implementation is doubtful in
most of the cases and effort is need to succeed in implementation. Implementation not only
includes running the software successfully at the client site , but also includes the training of users
etc. which are essential for the application of the system successfully. There are several
information systems which help the management of an organization to take decisions, which give
the entire performance of their organization concisely.
This block consists of 3 units and is organized as follows:
Unit - 11 focuses on the implementation aspects of information systems. The aspects that are
covered include conducting system tests, installing databases, preparing user manuals and
converting from existing system to new system, if applicable.
Unit - 12 deals with audit and security of computer systems. The meaning of audit is explained
and various threats that are faced by computer systems are discussed along with solutions to these
problems.
Unit - 13 explains the role of management information systems in an organization. Also, different
categories of information systems that are used in organizations are covered in this unit.
Implementation and
Maintenance of
Systems
Structure
11.0
11.1
11.2
Introduction
Objectives
Implementation of Systems
11.2.1
11.2.2
11.2.3
11.2.4
11.2.5
11.2.6
11.3
Maintenance of Systems
11.3.1
11.3.2
11.4
11.5
11.6
11.0
Summary
Solutions/Answers
Further Readings
INTRODUCTION
Implementation and Maintenance of System brings the SDLC life cycle to an end.
After the design phase is over, actual writing of computer program as per the design
specification and testing the system as a single entity called system testing which
actually differs from the unit and module testing carried out during program
development stage is carried out. A detailed conversion plan is the design to change
over from the existing system to the new system. A properly designed conversion plan
ensures a smooth transition to the new system. Database is designed, created and
installed by using the existing data from the old system or by creating data manually.
Appropriate training of the end user is important as the success of any system depends
on the involvement of end user who is actually going to use the system. A
comprehensive user manual is prepared outlining the procedural things to use the
system. Actual conversion to the new system can be either in phased manner or in just
one instance depending on the situation. Maintenance of the system after
implementation is a major activity considering the total life of a software product.
Maintenance is important to make the system current and relevant in a changing
organizational environment.
11.1
OBJECTIVES
11.2
IMPLEMENTATION OF SYSTEMS
Implementation and
Security of Systems &
MIS
requirements are either not built-into the design specification or compromised to make
the design simple and manageable. Implementation of the system is done by coding,
testing and creating the necessary hardware and network environment, and imparts
training to the end users. Of course, apart from Coding and Testing, the running
implementation activities differ from project to project. This phase of the software
development requires intensive user involvement.
11.2.1
No system can be perfect. Testing is of vital importance as all information systems are
designed by a team of Software Engineers and end users have little or no knowledge
of system development. Testing is done to bridge the gap between the perceived out
comes desired by the user to that of systems analysts and programming team. The
design specifications are requirements of the user and are translated to working
software by the programmer. Hence, it is the ability of the programmer to code
exactly as per the design specification that is to be judged by testing the software
module.
The objective of any testing mechanism is to discover and fix bugs before the product
is delivered to the customer. A good testing scheme has a high probability of
discovering an undiscovered error. The objective of any good testing scheme is to find
and fix bugs with minimum time and resources. Besides, bugs and errors systems are
tested for response time, volume of transactions that can be handled, stress under
which it can function, security and usability. For an Online Transaction Processing
System, testing of the system for response time could be quite vital.
System testing assumes that all parts of the system are correct and error-free. Even
though the system has been tested for individual components and modules, there is no
guarantee that the system after integration will work as per the desired specification.
System test involves a holistic approach for testing the working of the application in
totality.
The following are various types of System Testing:
Recovery Testing: Test the ability of the system to recover from errors. Errors or any
other processing faults must not cause overall system to fail. The recovery time of the
system after failure must be within a specific period and tolerance limit. System
failures are forced during this phase of testing by introducing exceptions to see how
the system responds to the case.
Security Testing: System used for processing sensitive information are prone to high
security risks. Individual often tries to access unauthorized data for various reasons.
Threats could be external or internal. Hacking of passwords is a common problem.
Individual can use software to generate random passwords to gain access of the
system. Security testing takes care of these aspects of the system security.
Stress Testing: Stress test is designed to test the system as to how the system behaves
in abnormal situation. The aim of the stress test is to find the limit of quantity or
frequency of input after which the system fails. Stress test cases are designed which
require maximum memory and other resources; in excess of what a normal situation
demands.
Performance Testing: Performance testing is specifically important to embedded
and real time systems. It checks the run time performance of the system. It is often
coupled with stress testing.
Response Testing: Testing of response time is of special importance in OLTP (online transaction processing systems like railway reservation system, points of sale,
6
etc.). Testing is done to measure the response time. The same is compared with
desired maximum response time.
Implementation and
Maintenance of
Systems
Usability and Documentation Testing: Testing is done to review the usability and
user friendliness of the software. Most often, systems are provided with on-line help
screen to help the end user. This also includes whether proper care had been taken to
document the development stage of the project. User friendliness of the system is
often compromised, which may lead to problem during implementation and
maintenance of the system.
The following are the various activities involved during system testing:
Preparation of Test Plan: The first step in system testing is to prepare a document
called a Test Plan. Test plan is a document which outlines the aspect of the system to
be tested. A workable Test Plan is prepared in accordance with the design
specification such as
Implementation and
Security of Systems &
MIS
11.2.2
Guidelines regarding Conversion processes involved and the roles of end user.
Planning conversion of files, creation of computer compatible files.
Types of conversion to be undertaken depending on the existing types of system.
It could be from an existing manual system to a newly designed system or from an
existing old computerized system to a newly designed enhanced system.
Types of conversion may be parallel, phased or direct.
Evaluation of hardware, software and related services.
11.2.3
Installing Database
Installation of database is nothing but creating computer readable files from the
existing systems/documents. Each installation involves data. The new system is going
to use data created either manually or data that has been obtained from the old system.
If the current system is using computer readable data, it must be made error free and
compatible for use in the new system. The data must be converted to the new format
supported by the current technology on which the system is being developed.
Usually, there will be upward compatibility between various versions of software. The
data conversion process can be tedious depending on the format supported by the new
system. Special software are designed to facilitate the installation of Database.
11.2.4
Training the user is one of the vital activities. The project team must make sure that
the end users are trained to operate the new system. Many systems fail to get
implemented or deliver the desired result because the end users are not trained.
Managers and the users must be trained on fundamentals of information technology in
addition to knowing the operation of the new system. Training and support form the
two crucial issues involving success of any information system. While training is
imparted in a fixed schedule, support is an ongoing process. In support activity, the
user is provided continual operational and technical support to carry out the work.
8
Support materials are developed to facilitate this task. The goal of any training and
support activity is to achieve highest possible productivity with lowest cost. Training
may involve the following activities:
Implementation and
Maintenance of
Systems
Entering the data into the system. Generating the required reports.
Basic training of computers not specific to the application program like copying a
file, starting and shutting down system, etc.
Briefing about Hardware and Software concepts.
Reporting non compliance and bugs in the program? Process of taking backup of
daily work.
There is no exhaustive list of training requirement of the end user and can vary
depending on the nature of application. The training must be scheduled in logical
sequence depending on the pre-requisite for the next module of the training. A
dependency chart could be useful for this purpose.
Training can be imparted in different ways:
Computer-aided training
Classroom tutorial
Interactive training manual
Resident technical expert
One to one training
External sources
Information center / help desk
11.2.5
All information systems are unique and different from one another. Documentation
starts from the day one of system development lifecycle, but preparation of end user
documentation is of specific importance as the end user does not understand the
intricacies of system development and hence operational problems are bound to occur.
Documentation of any information system is generally of two types. System
Documentation and User Documentation. System documentation contains detailed
information about systems design specification, its internal structure and related
technical details. The system documents are primarily for the programmer for
maintenance purpose. The user documentation on the other hand is for the end user.
The document should be structured and self-contained.
A user manual generally contains written as well as pictorial representation of the
information system about its working and application. A well-designed user manual
can reduce the overall cost of training and support. On-line help system with
hyperlinks and context sensitive help systems are slowly replacing bulky and noninteractive documents.
The following are the components of a User Manual:
Implementation and
Security of Systems &
MIS
Table of contents
Salient features of the product
Installation Guide and System requirements
Getting started
Frequently asked questions
Sample scenario
Glossary of terms used in the manual
Known bugs in the applications
11.2.6
10
Direct Conversion: This is abrupt approach. The old system is shutdown and the
new system starts. This kind of conversion although economical, the users are at
the mercy of the new system, hence direct installation can be very risky. Some
times due to procedural reasons where two systems cant be run parallel, this kind
of conversion is the only option. When the new system fails, there is no way to
start the old system as a backup as it has been shutdown. This kind of conversion
plan is often the least preferred for critical business applications.
Pilot Conversion: This is the middle path approach. Instead of converting all at
once throughout the organization, this kind of pilot installation involves
conversion/installation of system at a single pre-decided location. The location
may be a branch office of the organization. Proper selection of the pilot site is
important as it should be able to perform a true conversion process to test all
functionalities of the new system. The advantage of the pilot conversion is that the
potential risk in case of failure of the system is limited to a single location. Once
the user is ascertained that the implementation of the system has been successful
in a particular location, it is proposed to replicate the system in other locations.
Although this kind of pilot conversion plan is beneficial for the user, it places a
substantial burden on the implementation team as it has to maintain two systems
in parallel.
Parallel Conversion: is least risk prone. Under this kind of conversion, the old
system is allowed to run alongside the new system until the management and the
end user are satisfied with the result of the new system. It is compared with the
new system to test whether the functionalities covered by the old system are
thoroughly covered in the new system by comparing the outputs. Errors and bugs
identified with the new system are not detrimental for normal functioning of the
organization as the new system is replaced and normal functions are resumed by
the old system. Parallel conversion is costly as two systems are run in parallel, but
results of only one system are used for business operations.
Each conversion strategy not only involves data and software, but also other resources
like personnel, hardware, etc. Hardware and software selection is an important issue to
be considered before actually carrying the conversion.
Implementation and
Maintenance of
Systems
11.3
MAINTENANCE OF SYSTEMS
Once the information system is successfully installed and started showing result, the
next issue is to maintain the system. System maintenance involves more than 80% of
the total life of a software product; this shows the importance of maintenance. System
maintenance is the task of monitoring, evaluating and modifying the information
system to make necessary desirable changes during the total life cycle of the software.
Organizational requirements as perceived during the analysis phase changes, the
system has to accommodate all such changes to make the system current and useful
for the organization. Maintenance of system also takes care of the failure and
shortcomings that arise during the operation of the information system by the end
user. During the implementation phase, one person from the system maintenance
group is nominated to collect information from the user for maintenances.
Maintenance activity involves collecting requests for changes, transforming these
requests to changes, designing the changes to be incorporated and implementing the
changes in the system.
Any maintenance activity comprises the following four key stages:
Help Desk: The problem is received from the user through a formal change
request. A preliminary analysis of the change request will be done, and if the
problem is sensible, it is accepted.
Release: The changes are released to the customer, with a release note and
appropriate documentation giving details of the changes.
11.3.1
Once the system is fully implemented and starts operating, the maintenance phase
begins. When the user starts operating the system, initial difficulty diminishes as the
user learns to operate the system. The maintenance may include modification of
system due to changes in business environment, government regulations, new
business ventures and enhancement of functionalities.
11
Implementation and
Security of Systems &
MIS
Adaptive Maintenance,
Perfective Maintenance
and Preventive
Maintenance
Corrective
Maintenance
25%
12
Figure 11.1 depicts the maintenance efforts that are to be put during each maintenance
activity.
11.3.2
The responsibility of the software development team and clients does not end once the
product is released for implementation and installed. If software is not properly
maintained, a well-documented and cleanly designed system can decay into a poorly
documented and ill-maintained system. Additional venerability may get introduced
during the activity of maintenance. In a network environment, a bug has ramification
beyond just poor performance or functionalities. A bug can open up avenue for a
hostile intruder.
Implementation and
Maintenance of
Systems
It is very important that the Software should be easily maintainable. Factors like
availability of source code, availability of system manuals, etc., are very important
for maintainability. One of the most important issues is the cost factor for
maintenance of software. There are a number of factors that influence the cost of
maintenance. Maintenance activity may some times introduce new bugs while
rectifying it.
The following are various factors which affect the ease of maintenance:
Volume of Defects: The inherent errors / bugs that are found in the system after
installation. Cost of maintenance increases with the increase in volume of defects.
2.
Process Issues
3. Technical Issues
How to construct software that it is easy to comprehend is a major issue and the
technology to do this is still not available. Still, the following are some guidelines
for the same:
Implementation and
Security of Systems &
MIS
Legacy System
A legacy system is typically a very old and large system which has been modified
heavily since it started operation. Legacy systems are based on old technology with
very little or no documentation. Dealing with a legacy system can be very hard.
Solutions for the problems mentioned above relating to a Legacy System:
11.4
SUMMARY
14
11.5
SOLUTIONS/ANSWERS
Implementation and
Maintenance of
Systems
11.6
FURTHER READINGS
Joey George, J. Hoffer and Joseph Valacich; Modern Systems Analysis and Design,
Third Edition, 2001, Pearson Education.
Alan Dennis, Barbara Haley Wixom; Systems Analysis and Design, 2002, John Wiley
& Sons.
Reference Websites
http://www.rspa.com
http://www.dur.ac.uk/csm/jsm
15
Implementation and
Security of Systems &
MIS
UNIT 12
Structure
12.0
12.1
12.2
Introduction
Objectives
Definition of Audit
12.2.1
12.2.2
12.2.3
12.2.4
12.3
12.4
12.0
12.7
12.8
12.9
Audit Software
Test Data
Audit Expert Systems
Audit Trail
12.6
Transaction Audit
Audit of Computer Security
Audit of Application
Benefits of Audit
12.5
Objectives of Audit
Responsibility and Authority of the System Auditor
Confidentiality
Audit Planning
Summary
Solutions/Answers
Further Readings
INTRODUCTION
Every business process can experience events that can hamper and in some cases may
stop normal operations of business. Even best designed system cant control the
prevention of natural disaster. In todays ever-changing world of information
assurance and network security, it can become extremely difficult to keep up on the
latest vulnerabilities, viruses, patches, trends, technology, hacker behaviors and
activity. Its easy for the information systems security professional to get caught up in
attending the logical aspects of security such as reviewing log files, making
configuration changes, troubleshooting, and other technical duties.
12.1
OBJECTIVES
16
12.2
DEFINITION OF AUDIT
12.2.1
Objectives of Audit
To improve the quality of information systems, prevent failure and minimize the
effects of failure, and speed up the process of recovery in the event of a failure.
This will help Information System to be more reliable.
To make an information system more secure from natural as well as manmade
disasters, unauthorized access, and other destructive actions.
To improve the cost performance of an information system by optimum utilization
of its resources, which leads to increase in efficiency.
During the course of audit, the Information Systems Auditor will obtain sufficient,
reliable, relevant and useful evidence to achieve the audit objectives effectively. The
audit findings and conclusions are to be supported by appropriate analysis and
interpretation of this evidence.
To achieve the above objective, the following documents should be made available to
the auditors A diagram of the Information System (Application)
1. Network diagram
2. A hierarchical diagram of the project team
12.2.2
The system auditor shall make the basis for each of his or her assessment clear. The
system auditor may demand data and materials from the division being audited. The
system auditor may also demand the head of an organization to issue a report on the
implementation of improvement to an audited division as suggested by him.
The system auditor shall firmly maintain professional ethics as an impartial evaluator.
The system auditor shall be aware of the ethical demands on himself or herself and
meet the internal and external trust by performing an accurate and sincere system
audit.
17
Implementation and
Security of Systems &
MIS
12.2.3
Confidentiality
The system auditor with strict adherence to professional ethics must maintain
confidentiality of the information provided to him to carryout his or her activity and
should not, without sufficient reason, divulge any information that is classified as
confidential information by the audited organization.
12.2.4
Audit Planning
The Information Systems Auditor has to plan the information systems audit work to
address the audit objectives and must comply with applicable professional auditing
standards.
2. ... are those people who make it sure that the system does
what it is supposed to do.
3.
12.3
Audit can be broadly of two types namely auditing manual processes and audit
through computer. Audit through computer is important to find out the accuracy and
integrity of information system output. This types of audit are done by information
system expert and use test data to check the adequacy and accuracy of control
mechanism built-in to the system.
A typical audit looks at the following factors:
Audit of response time: In this audit the actual response time of the system verses
the desired response time is compared to the performance of the system
Audit of broken links: This is applicable to web site and other intranet applications.
The most irritating things on a web site is not finding a link document. There are
automated software to find broken/unavailable links on web site.
Database Audit: Database audits involve checking the database integrity and
availability. The information that is sent to the database should be checked with the
information actually stored on the database.
Network audit: Network audit involves checking the venerability of network. It
checks whether the network configuration is giving optimal performance or not.
12.3.1
Transaction Audit
18
The details of the above transactions are written to either a media or printed. This
allows Database Administrators to track changes and helps the organization to satisfy
regulatory requirements such as tracking specific users actions, general security
screening, validating user permissions etc.
12.3.2
Issues of security of computer involve both physical and logical security. Physical
security involves restricting physical access to the computing resources from
unauthorized person. Logical security involves restricting the use of computing
resources by unauthorized person by providing logical control mechanism (e.g.
password protection). The audit of computer security involves review of physical and
logical security measures. Review of parameters, plans, practices, and policies that are
developed and implemented by the organization over the computer resources, and
how security measures are followed for Computers, Networks and Data
communication. They are also included in the Audit.
12.3.3
Audit of Application
Here, both manual and programmed internal controls related to information systems
are assessed. Primarily, there are four areas of audit coverage for an application being
reviewed.
The four areas are given below:
Control environment: This includes reviewing the systems security, its operating
platform, system documentation and the interaction it has with other systems.
Data Input Controls: This involves reviewing the controls which ensure that data
that enters into the system is accurate, complete and valid as per the standard.
Examples include verifying system tables, limit checks, range checks and redundant
data checks.
Processing Controls: These controls ensure that the data is properly processed and
that automatic calculations performed by the system are accurate. This is tested by
assessing controls built into the programs and by processing test data through the
system and comparing the results of processing with expected results. Also, there will
be checks on currency of stored data, default values and reporting exceptions.
Output Controls: In this, review of the system generated reports to ensure that they
are accurate and the reports produced are reliable, timely and relevant is done. Also, it
is checked whether cost savings can be achieved by reducing the number of reports
produced. Data control personnel perform visual review of computer output and
reconciliation of totals.
12.3.4
Benefits of Audit
Information system audit is increasingly becoming the focal point of the independent
audit, compliance audit, and operational audits. An information system audit can help
the organizations in many ways:
19
Implementation and
Security of Systems &
MIS
Cost control.
Competitive advantage.
12.4
The auditors use various types of automated audit software to carryout IS audit. The
use of Computer Assisted Audit Tools (CAATs) should be controlled by the IS
Auditor to provide reasonable assurance that the audit objectives and the detailed
specifications of the CAATs have been met. There are two major types of CAATs
namely audit software and test data.
12.4.1
Audit Software
This is a computer program used to process data of significance for audit from
entitys accounting system. The auditor should substantiate their validity for audit
purposes before making use of these tools. These include:
c) Utility tools: Used by the auditors to perform common data processing functions
like sorting, creating and printing files. These tools are not designed for audit
purposes specifically.
Various commercial Audit Software are available to carry out System Audit. Some of
them are:
1. Visual Audit Pro
2. IDEA
3. E-Z Audit
Visual Audit Pro: It audits automatically over a network. It audits activities like, use
log on/off, collects information about software and its version, collects information
about hardware inventory like serial number, model, memory and associated
peripheral devices, user information, registry information etc.
E-Z Audit: With this software one can know information on capacity of RAM, name
of network card with its connect speed, MAC address and TCP/IP information. You
can also find out how many local, removeable and network drives are there on the
system, what printers are connected, both networked and local, etc.. On software
front, it gives information on name and version of OS running on the system with
service packs, installed programs and their names, EXE files and DLL versions.
IDEA (Interactive Data Extraction and Analysis): IDEA can be used to import
information from database to be audited for further analysis to auditor. It helps to
corroborate audit evidence effectively. For example it can check for duplicate
payment on a single invoice. It is useful to analyze system log for fraud detection.
Consider the audit of a Payroll Package. The potential fraud that can occur in a payroll
system is very high. Therefore, audit software is used as detection tool for fraud. The
Audit software looks for salary unusually high, extracting information without a
department number, extract information on bank account number. It also can extract
information on fictitious employee, compare it with personnel database. It can also
compare payment details of two different months.
20
12.4.2
Test Data
Test data is used to test the correctness of the software. When test data is processed
with the entitys normal processing systems, the auditors should ensure that the test
transactions are subsequently eliminated from the system. When using the test data,
the IS auditors should be aware that the test data should only point out the erroneous
processing and should not change the data that is produced by the system during real
life.
12.4.3
Some IS auditors make use of Expert Systems to assist in auditing. When using these
audit expert systems, the IS Auditor should be thoroughly knowledgeable of the
operations of the system to confirm that the decision paths followed are appropriate to
the given audit environment or situation.
12.4.4
Audit Trail
Audit trail is a log of changes made in the data, settings and related changes. A
security subsystem should maintain detailed logs of who did what and when and also
if there are any attempted security violations. The availability of the log is extremely
valuable. Log provides information for the system auditor to be able to determine who
initiated the transaction, the time of the day, date of entry, the type of entry, fields of
information that were affected and the terminal used.
System log should be analyzed to provide detailed information on all normal and
abnormal transactions during each processing period. System access and attempted
access violations can be automatically logged by the computer and can be reported for
check & review. Listing of terminal addresses and locations can be used to look for
incorrectly logged, missing or additional terminals.
Applying the principles of Information System Security and Audit raised in this writeup will ensure that an organizations information assets and systems are adequately
controlled, monitored and assessed.
12.5
21
Implementation and
Security of Systems &
MIS
There may be security threats due to natural reasons such as Earth Quakes, Cyclones
etc. Sometimes, the threats are made by people. These may be due to riots, unrest,
sabotage etc. Whenever , there is an attack, immediate reactive measures are to be
taken. Also, one should study various controls to find out the people or reasons behind
the attack. This can be done with the help of transaction logs etc. These attacks
basically become possible due to several drawbacks in the information system such as
lack of proper implementation of security protocols etc. Such things are exploited by
people who plan attacks. The entire situation surrounding attacks is depicted in Fig.
12.1.
Natural,
Man made and
External/Internal
Threats
Create
Business process
Information system
Exploit
Vulnerability
Attacks
Reduce
Prompt
Recovery, Strategy,
System modification
and Legal action
Reactive
Measures
Controls
Self assessment,
Process review,
System Audit,
Network
Monitoring and
Secured services
12.5.1
The security of any system should be commensurate with the risk involved. Threat and
risk assessment involves identification of applicable threats to IS infrastructure,
recognition of vulnerability and probable loss calculation. In this context, it is
necessary to identify the source of threat.
Historically, an organizations computer systems were centrally located and the
management of issues related to it were responsibility of the computer center staff and
as such security related issues were also the responsibility of computer center staff
whose focus were to make available the application on the centrally located computer
as required. In comparison, todays computing infrastructure are far more diverse and
complex to manage. Business information is dispersed.
The source of threats can be either external or internal. Historically virus has been the
major potential external security threat but as organizations are diversifying their
activity over multiple locations and with evolution of new technology it is difficult to
perceive when an unauthorized intruder may try to hack upon organizations vital
information and cause damage. Internal security threats are more common although
the integrity of employee is checked before being inducted into the organization.
Employee of an organization can pose serious threats to information security as they
are closely associated with the system and know the vulnerabilities that can be
targeted.
Risk Analysis
The common questions asked in evaluating the risks are given below.
22
Are the risks such as fire, earthquakes and the scope of their effects on the
information system been made clear?
Has the loss, the organization would suffer from a halt or the like of the
information system been analyzed?
Is the time permissible for recovery of operation and the order of priority of
recovery been determined?
Implementation and
Security of Systems &
MIS
well as provide for physical security, employee education, and testing, as part of an
effective program.
When institutions contract with third-party providers for information system services,
they should have a concrete opinion about third party providers quality of work and
loyalty to the clients. At the minimum, the security-related clauses of a written
contract should define the responsibilities of both parties with respect to data
confidentiality, system security, and notification procedures in the event of data or
system compromise. The institution needs to conduct a comprehensive analysis of the
providers security program, including how the provider uses available risk
assessment tools and practices. Institutions also should obtain copies of independent
penetration tests run against the providers system.
When assessing information security products, management should be aware that
many products offer a combination of risk assessment features, and can cover single
or multiple operating systems. Several organizations provide independent assessments
and certifications of the adequacy of computer security products (e.g., firewalls).
While the underlying product may be certified, banks should realize that the manner
in which the products are configured and ultimately used is an integral part of the
products effectiveness. If relying on the certification, banks should understand the
certification process used by the organization certifying the security product. Other
examples of items to consider in the risk assessment process include:
Potential threats
24
Denial of service (DoS), which can be described as any action that prevent a
system from normal operation. It may be the unauthorized destruction,
modification, or delay of service. DoS is common where the number of requests
outnumber the maximum number of connections possible. Under such
circumstances, legitimate users have to wait for large amount of time for response
to their request.
Internet Protocol (IP) spoofing, which allows an intruder via the Internet/intranet
to effectively impersonate a local system's IP address in an attempt to gain access
to the system. The system in this case may misinterpret the incoming connection
as originating from a trusted host.
A Trojan horse program generally performs unintended destructive functions that
may include destroying data, collecting invalid or falsifying data. Trojan horses
can be attached to e-mails.
Viruses are computer programs that may be embedded in other program and have
the capability to self-replicate. Once active, they may result in either
nondestructive or destructive invalid outcomes in the host computer. The virus
program may also move into multiple platforms, data files, or devices on a system
and spread through multiple systems in a network or through emails to other
systems.
12.5.2
Natural and man-made disasters are inevitable. Earthquake, floods, fire and terrorist
attack can severely damage organizations computing infrastructure. The disaster
recovery plan is a document containing procedures for emergency response, extended
backup operations, and recovery should a computer installation experience a partial or
total loss of computing resources or physical facilities (or of access to such facilities).
The primary objective of this plan, used in conjunction with the contingency plans, is
to provide reasonable assurance that a computing installation can recover from
disasters, continue to process critical applications in a degraded mode, and return to a
normal mode of operation within a reasonable time. A key part of disaster recovery
planning is to provide for processing at an alternative site during the time that the
original facility is unavailable.
Contingency and emergency plans establish recovery procedures that address specific
threats. These plans help prevent minor incidents from escalating into disasters. For
example, a contingency plan might provide a set of procedures that define the
condition and response required to return a computing capability to nominal operation.
An emergency plan might be a specific procedure for shutting down equipment in the
event of a fire or for evacuating a facility in the event of an earthquake.
During a disaster, normal operating procedures may be significantly altered. Both
personnel and systems will be expected to function under conditions that are not
expected under normal day-to-day operations. Security remains a requirement but
techniques to apply it are altered to fit the contingency situation.
In-House Backup
This level is the minimum acceptable and is mandatory for all installations and
applications systems. Define in detail all in-house back up procedures, the techniques
used, files copied, frequency, etc.
Alternate Storage Area
This level of protection is necessary for mission critical components. It consists of offsite storage of at least one copy of all AIS files and databases, programs, and
procedures necessary to operate the high priority application systems, either at the
installation or at an alternate site of operation (including copies of contingency plans
and related materials).
The alternate storage area should be located in an area reasonably accessible to the
installation, but not subject to the same degree of major threat as the site. It is
recommended that, as a rule of thumb, the alternate storage area be no closer than one
mile from the site. However, the distance may vary from location to location.
The Disaster Recovery Toolkit
The Disaster Recovery Toolkit is a highly valuable collection of items and documents
to assist in ensuring business continuity in the face of serious incident or disaster.
Many organizations use these documents as a checklist and add element specific to
their need.
25
Implementation and
Security of Systems &
MIS
Although they vary from organization to organization, they generally comprise the
following:
The toolkit is designed to help review the full spectrum of business continuity and
disaster recovery issues.
12.5.3
Every business entity can and do experience events which can prevent it from normal
function. The factors can range from natural events like flood, fire, earthquake etc. or
a man made events like unauthorized access, serious computer malfunction or various
information security accidents.
The very first step for contingency planning is to identify the contingency events
covered and the appropriate actions for each. Contingency events usually refer to
varying degrees of loss across six major asset categories: Data, Software,
Communications, Hardware, Personnel, and Facility. The cause of the loss is dealt
with in the Risk assessment, the primary concern in the contingency plan is the degree
of loss, impact on the mission and techniques for coping.
Contingency management tools address basic issues such as asset identification,
location, value, alternatives, replacement, and intangible costs; and most importantly,
how long can the organization function without the asset? Since no asset is impervious
to loss, the prudent leader will ensure that mechanisms are in place for a secure &
rapid recovery. Our intent is to help managers break the cycle from normality to panic
with crisis management.
Contingency Events
Loss of Data: To Identify key data and the type or degree of loss/damage that would
be required for necessary recovery action. It can be done as follows:
Identify appropriate recovery plan and procedure procedures. (Example inhouse backups, etc.)
The location of the required recovery files.
To identify procedures for recovery of the files indicated above and include them
in the contingency plan.
Loss of Software: To identify key software and the degree of criticality for necessary
recovery action. It can be done as follows:
26
Loss of Personnel: Loss of Personnel can result from employee leaving the
organization, illness, death, family emergency and a number of other events. The
following steps can be taken to minimize this type of loss:
Loss of the Facility: The loss of facility in general is due to some catastrophic
natural action such as fire, flood, storm, earthquake, etc. However, a facility may
become non-functional temporarily due to failure of power, or any other events that
could render the facility non-functional.
27
Implementation and
Security of Systems &
MIS
in the business process must be reflected in the plan and all changes in it should be
communicated to all concerned.
12.5.4
Viruses
Viruses are one of the major security threats to computer system. The first computer
viruses were written in mid-eighties. The first virus written was a boot sector virus.
Today, there are several tens of thousands of viruses.
Computer virus is nothing but a program that is loaded into your computer without
your knowledge. This is only basic information . But, what makes people fear from
Virus is the disastrous impact on remaining programs in your machine due to this
program. The difference between a computer virus and other programs is that viruses
are designed to self-replicate usually without the knowledge of the user. Computer
viruses are called viruses because they share some of the traits of biological virus. A
computer virus passes from computer to computer like a biological virus passes from
person to person. A computer virus must piggyback on top of some other program or
document in order to get executed. Once it is running, it is then able to infect other
programs or documents. Obviously, the analogy between computer and biological
viruses seems superficial, but, there are enough similarities as the name suggest.
Virus carries out instruction for replication. The effect of virus can vary from
annoying messages, to the disastrous consequences (for example, the CIH virus,
which attempts to overwrite the Flash BIOS, can cause irreparable damage to certain
machines). Superficially, it looks as if virus which can format hard disk is more
damaging but damage can be avoided by taking backups. Think of a virus which
corrupts data by changing the numbers randomly on a spreadsheet application or
changes + to . This is certainly disastrous.
Viruses can be hidden in programs available on floppy disks or CDs, hidden in email
attachments or in material downloaded from the web. If the virus has no obvious
payload, a user without anti-virus software may not even be aware that a computer is
infected.
A computer that has an active copy of a virus on its machine is considered infected.
The way in which a virus becomes active depends on how the virus has been
designed, e.g. macro viruses can become active if the user simply opens, closes or
saves an infected document.
Prevention
The best way for users to protect themselves against viruses is to apply the following
anti-virus measures:
28
Make backups of all software (including operating systems). So,if a virus attack
has been made, you can retrieve safe copies of your files and software.
Inform all users that the risk of infection grows exponentially when people
exchange floppy disks, download web material or open email attachments without
caution.
Have anti-virus (AV) software installed and updated regularly to detect, report
and disinfect viruses.
Visit sites which give information on the Internet about latest virus, its behavior
and assess their potential threat.
In case of doubt about a suspicious item that anti-virus software does not
recognize, contact your anti-virus team immediately for guidance.
12.6
Most of the Audit techniques collect data after transaction is completed. So, the
outcome of the Audit is usually useful only for the future. The outcomes may be used
as precautionary measures for the future.
In the case of Concurrent Audit Techniques, Data is collected while the transaction is
in progress. This is very much useful for high risk transactions as they will be put on
hold in case the Audit desires so. If any other Audit technique is used, then , such high
risk transactions are processed after which it will be found that these transactions are
invalid.
12.6.1
The following are few reasons for the need of Concurrent Audit techniques:
12.6.2
In this technique , the Auditing software is embedded into the client software.
Basically, what happens is that the test data of Auditor is integrated and the same is
processed with Clients real life input data. ITF ensures that files of the client are
unchanged and any changes, if necessary , will be made only to the dummy files of the
clients files. At the end, these dummy files are studied to know the discrepancies.
12.6.3
12.6.4
SCARF
It stands for System Control Audit Review File. It is one of the complex Audit
techniques. This technique will embed Audit software in the host application. This will
enable audit software to monitor the Systems transactions uninterruptedly. The
information that is collected during Audit process will be stored in a special audit file
known as SCARF master file.
Usually, SCARF is used to collect the following information : Application System
errors, Policy and procedural variances, System exceptions, Statistical samples,
Snapshots and extended records, Data profiling, Data for performance measurement.
12.6.5
This technique will use the Data Base management systems to trap exceptions.
Whenever , there is a need for service, DBMS will inform the same to CIS. CIS will
then carry out the suitable service.
29
Implementation and
Security of Systems &
MIS
12.7
SUMMARY
Auditing IT system is a crucial activity to provide feedback to the system. The process
of audit the report can be a food-for-thought for improving the information system. It
is surprising that only very few companies take this activity seriously. Audits not only
bring out the potentially weak areas in a system but also provide inputs for future
improvement. It also helps in improving business efficiency.
Audit in generic sense refers to investigation of risks to computer as well as to
processes and management of these risks through controls, proper procedures. Any
one, who is doing this kind of assessment and submits a report in a sense is
functioning as Auditor.
12.8
SOLUTIONS/ANSWERS
12.9
FURTHER READINGS
30
Management Information
Systems
Introduction
Objectives
Role of MIS in an Organization
Different kinds of Information Systems
13.4.1
13.4.2
13.4.3
13.4.4
13.5
13.6
13.7
13.1
Summary
Solutions/Answers
Further Readings
INTRODUCTION
There are many kinds of Information Systems in the real world which use hardware,
software and the people to transform data to meaningful information for business
needs and decision-making. Every business process relies on information for day-today activities and decision-making. Management Information System have been
playing a key role in helping the managers at various levels of business functions for
decision-making. In early days of business information system, data processing is
used to generate various day to day reports. In todays world, as business is operating
in a more varied and complex environment, managers have realized the need for
specialized computer-based information systems for special activities and business
needs. Keeping this in view, various types of Business Information Systems have
evolved over time such as Transaction Processing Systems, Management
Information Systems, Decision Support Systems and Expert Systems.
13.2
OBJECTIVES
13.3
31
Implementation and
Security of Systems &
MIS
Management Information Systems can help a business in that they contain important
information about a particular client or event that takes place in the organization or
the environment surrounding it. MIS is not as important for smaller organizations as
it is for the larger corporations. The smaller locally run businesses are run usually by
owners who rarely need instant access of information that larger companies require.
Large corporates with varied product lines definitely cant do without a computer
based MIS in order to survive and keep pace with competitors.
Any MIS performs various roles in an organization:
For example, an organization may use MIS to keep track of inventory, evaluate sales
trend of different products, keep information about client and employees, etc.
Management Information Systems are used for
Management control: Information for short term planning (few weeks and
months). Information is rather un-structured or semi-structured such as cash flow
statement, sales trend analysis, monthly and annual financial statements . This
type of information is used by mid-level manager for planning and control of
organizational sub-units. Example : Sales trend figure in different regions of the
country for product. Managers can carryout what if analysis like effect of price on
sales figure, effect of cut on advertisement on sales.
13.4
Depending on the end use, the information systems may be classified broadly to
operation information systems and management information systems. Operation
information system generally helps to support business operation, whereas
management information system helps in managerial decision-making. Transaction
processing systems may be classified into Operation information system. Decision
support systems, MIS and expert systems may be classified into different forms of
MIS for specific purposes. The information requirements of managers are directly
related to the position of manager in hierarchy ladder as shown in Figure 13.1.
Keeping this in view, various types of information systems have evolved over time.
32
Top
Middle
Semi-structured: MIS
Operational
Management Information
Systems
Level of Management
Transaction
Processing
Systems
Process Data
resulting from
business
operation
Management
Information
Systems
Process data
from business
operation as
well as external
data
Types of
Support
Provides
support for
day-to-day
operation of
business
process
Provides data
for managerial
decisionmaking
Format of
Reporting
Periodic and
routine type in
fixed format
Provides
advice like
human expert
Used by
Operational
management
Reports are
Provides
semi-structured report like
and ad-hoc type sensitivity
analysis and
what-if
analysis
Strategic
For decision
decisionsupport
making for
tailored made
managers
to individual
managers
Examples
Sales
transaction
processing
system, on-line
railway
reservation
system
Marketing
management
information
system
Expert
System for
medical
diagnostic
(e.g.,
MYCIN)
Information
Source
13.4.1
Decision
Support
System
Use analytical
models and
specialized
database in
addition to
internal data.
Provides
interactive
decision
support to
managers for
decisionmaking
Geographic
Information
System (e.g.
IBMs GeoManager,
which
integrates
interacticve
computer
graphics with
geographic
database.
Expert
Systems
Use
knowledge of
experts from a
specific field
Provide
expert advice
on a specific
domain of
activity
Managers for
expert advice
on a specific
field.
Businesses offer service and products to the customers. In simple terms, transaction
processing system is an information system that supports business in the delivery of
33
Implementation and
Security of Systems &
MIS
Data is captured from documents or business operation and input into the system
to record a transaction.
Then, data is processed. That is, calculations or other logical operations are
performed for output.
The relevant files or databases are then updated with the results. Output of a TPS
includes documents and reports.
Business operation
Transaction
document
Transaction
processing
System
To save time, storage space, and reduce errors of data entry, it is desirable to capture
the information electronically at its point of origin, i.e. from the point of sales
terminal (POS). This is referred to as source data automation. Rarely, nonconventional methods are used to facilitate data entry. For example, in a library, the
barcode printed on the library members card can be used to capture required
information such as name of the member, address, validity date of the membership
etc. Figure 13.3 depicts a Transaction Processing System at a Library.
Barcode
Scanner
34
Management Information
Systems
Library Database
The TPS should have the ability to process work flows of a business and each state of
the business transaction can be represented by a step in the work flow. TPS captures
and processes data of every business transaction and updates the relevant files and
databases. It produces a variety of information for internal and external use.
Components of a Transaction Processing System
Consider a typical Transaction Processing System as depicted in Figure 13.4.
Input
Terminal/
Data entry
Process
Transaction
Processing
Batch
On-line
Inquiry
Reports
Billing
Invoices
Database
Data entry: Data can be captured directly from machines which consists of data
when it is entered during business transaction or the data can be directly keyed in.
Sometimes, Data is also converted to a machine-readable form by scanning.
Transaction processing: Input data is processed basically in two ways, namely
Batch Processing or Online Processing. Table 13.2 compares the both.
Online Transaction
Processing
35
Implementation and
Security of Systems &
MIS
Process
Transaction data is
accumulated in regular
intervals for processing at
a scheduled interval
Transaction data is
processed as and when
generated by the business
process
Updation of database
Response time
Several hours/day
Immediate
Associated cost
High
Example
Document and report generation: The final stage of the transaction processing
system is document generation. The collection of documents generated by the
TPS is called transaction document. Invoice generated by a POS terminal is an
example. Transaction logs are specific types of documents generated for Audit
and other control purposes. All transactions recorded on the databases are printed.
Processing
Database Update
Vendor Database
Customer database
Reports
Inventory status,
Reminders,
Paycheques,
Invoices
Management Information
Systems
13.4.2
Table 13.3 depicts a Sales Performance Report. Figure 13.6 depicts a Bar chart.only
Figure 13.7 depicts a Pi chart.
Table 13.3: Sales Performance Report.
Sales
Region
2000
2000
2001
2001
2002
2002
Estimated
Actual
Estimated
Actual
Estimated
Actual
East
54353
98877
435
76
76667
76776
West
5453
34534
43
59
867
64465
North
9876
5354
435
567
76667
76776
South
89987
98877
675
345
878
876
37
2000
2001
Profit
Turnover
Profit
Turnover
Profit
4000
3500
3000
2500
2000
1500
1000
500
0
Turnover
Implementation and
Security of Systems &
MIS
2002
Turnover
Profit
Components of MIS
The bulk of information requirement of Managers at middle and top levels comes
from external non-computer sources like meeting documents, newspaper, telephonic
talk, letters, memos, etc. Corporate databases are important for day to day operations
of the organization.
MIS Software
module
Top Executive
DBMS
Communication
software
External
Database
Corporate
Operational
Database
Corporate
Management
Database
At the same time, data from external non computer sources provides managers with
objective information that helps them to make strategic, long and near term
decisions. Various components of MIS are showed in Figure 13.8 and explained
below.
38
Management Information
Systems
External Database: External databases are databases that are not owned by the
organization and the organization pays royalty to access these databases. Examples of
these databases are: databases of Market research groups, Statistical and
Demographic organizations etc. Since organization operates in a social environment
it is influenced by various external factors. Impact of theses external factors on the
long-term goal and success of organization is very important. Top management needs
to analyse data from these sources for long term planning.
Corporate database: Corporate database stores data generated by various business
processes through transaction processing Systems. These can be employee database,
customer database, inventory database, etc.
Management database: These databases store select data from corporate databases.
It generally stores summarized information for the requirements of managers.
MIS Software: This is used to extract and process information from various databases.
It acts as a user interface to the managers.
DBMS: Database Management System stores, retrieves and manages data on various
databases.
Communication Software: This is used to communicate with customers, suppliers
and other stakeholders of the organization. Examples are Messaging Software or
Organizations Bulletin board.
13.4.3
Components of a DSS
Figure 13.9 depicts various components of a Decision Support System. They are
explained below:
Data Management System
This is a system where various activities associated with retrieval, storage, and
organization of the relevant data for the particular decision context are managed. It
also provides security functions, data integrity procedures, backup and recovery,
39
Implementation and
Security of Systems &
MIS
Interactive
Session
User Interface
Knowledge Engine
Model base
Types of DSS
Various Decision Support Systems are Communication driven DSS, Data driven
DSS, Model driven DSS and Knowledge driven DSS. Table 13.4 draws a comparison
between MIS and DSS.
Management Information
Systems
Structure of Information
Management
Information Systems
(MIS)
Periodic and often in fixed
format
Decision Support
Systems (DSS)
Interactive inquiry and
Response to support
Source of information
Operational data/external
database
Analytical models/external
database and operational
database
Target
13.4.4
Expert Systems
An Expert System is a computer program that simulates the judgment and behaviour
of a human expert or an organization that has expert knowledge and experience in a
particular field. Typically, such a system contains a knowledge base containing
accumulated experience and a set of rules for applying the knowledge base to each
particular situation that is described to the program. Sophisticated expert systems can
be enhanced with additions to the knowledge base or to the set of rules. The expert
system is a knowledge-based information system to act as a consultant to the user.
Expert systems are being used in many specialized field like medicine, engineering
and business. An Expert System in the field of medicine can help diagnose illness.
Unlike Decision Support System, an expert System interacts with the user to get input
and provides expert advice on a problem in a specific domain.
Among the best-known expert systems have been those that play chess and those
which assist in medical diagnosis such as Mycin.
The following are the major characteristics of expert systems (ES):
Expert systems are distinct from traditional Information Systems because of two main
reasons:
Representation of Knowledge: Information is expressed in declarative form in
contrast to procedural expressions used in other types of Information Systems. Here,
knowledge is stored in a structured non-procedural way.
41
Implementation and
Security of Systems &
MIS
Inference Engine
User
Expert
System
Knowledge
Base
Facts
Definitions,
observations and
hypothesis
42
Rules
If A then X
If A then Y
else
Z
Knowledge Base
Management Information
Systems
An expert system starts with an interactive query session, which is directed from the
expert system to the user. In this interactive query session, expert system asks a series
of queries to the user and expects reply from the user similar to a doctor asking a
series of queries to the patients before reaching any conclusion on the diagnosis of the
disease. The user is expected to give reply to all the queries based on which the expert
system recommends a solution like human expert. The advantage of computer based
expert system is that it is unlike a human expert who is prone to environmental
condition, these systems are consistent, fast and accurate in providing expert advice. It
can also be programmed to give advice on behalf of several experts. This is the reason
why expert systems are used as knowledge based strategic information resources for
the managers in an organization. Various information systems are developed with an
expert system component built in to it. These are called expert assisted information
systems.
Knowledge Acquisition by Expert Systems
Expert systems must liase with people(experts) in order to gain knowledge and the
people must be specialized in the appropriate area such as Medicine, Geology and
Chemistry to name a few. Knowledge Engineer acts as an intermediary between the
specialist (human expert) and the expert system. This process of picking the brain of
an expert is a specialized form of data capture and makes use of interview techniques.
The Knowledge Engineer is also responsible for the self-consistency of the data
loaded to the expert system. Thus, a number of specific tests have to be performed to
ensure that the conclusions reached are sensible and accurate. Figure 13.12 depicts
communication between expert system, knowledge base and human expert.
Figure 13.12: Communication between Expert System, Knowledge Engineer and Human
Expert.
There are various applications for expert systems in business, engineering and
medicine. Expert systems ask the user, a series of queries and based on the feedback
from the user, deliver expert advice on the specific subject. Expert systems are used
in the field of Medical diagnosis, Sales forecasting etc. Expert Systems are being
used by managers for credit management, employees performance evaluation,
portfolio analysis and production monitoring. Although expert systems are used in
many fields, it can never replace a human expert. Expert system can provide expert
advice based on the available information and knowledge. Expert systems lack
learning capability like human being and have very limited focus area. It fails in the
areas where advice requires a broad knowledge base.
Table 13.5 draws a comparison between Decision Support Systems and Expert
Systems.
Implementation and
Security of Systems &
MIS
Objective
Reasoning capability
Database
Domain
Broad
Types of Data
Numerical, character
based
Human to machine
Human takes the decision
with support from DSS
Direction of Query
Decision Maker
13.5
SUMMARY
13.6
SOLUTIONS/ANSWERS
Management Information
Systems
1. Semi-structured
2. replace
3. User interface
Check Your Progress 3
1. Expert System
2. Knowledge Base
3. Knowledge Engineer
13.7
FURTHER READINGS
Joey George, J Hoffer and Joseph Valacich; Pearson Education Modern System
Analysis and Design;2001
K.C.Laudon and J.P.Laudon; Pearson Education Management Information
Systems;Seventh Edition;2002
Reference Websites
http://www.usus.cs.york.ac.uk
http://power.cba.uni.edu/isworld/dss.html
45