S2 Module 2: System Implementation
S2 Module 2: System Implementation
S2 Module 2: System Implementation
SYSTEM IMPLEMENTATION:
A key difference between System Implementation and all other phases of the lifecycle is
that all project activities up to this point have been performed in safe, protected, and
secure environments, where project issues that arise have little or no impact on day-to-
day business operations. Once the system goes live, however, this is no longer the
case. Any miscues at this point will almost certainly translate into direct operational
and/or financial impacts on the Performing Organization. It is through the careful
planning, execution, and management of System Implementation activities that the
Project Team can minimize the likelihood of these occurrences, and determine
appropriate contingency plans in the event of a problem.
1
S2 MODULE 2
requirements are stated, there are still many ways for candidate vendors to
respond to an RFP.
As the businesses are getting more dependent upon the use of information systems the
need for better IS security is also increasing. Thus, the main goal of defining an IS
security policy is the .Protection of information systems against unauthorized access
to or modification of information whether in storage, processing or transit, and
against the denial of service to authorized users, including those measures necessary
to detect, document, and counter such threats.
b. Integrity -In any business organization, the values of data stored and manipulated, such as
maintaining the correct signs and symbols is an important issue of
concern. This issue is referred to integrity within an organization which is the
prevention of the unauthorized modification.
2
S2 MODULE 2
Systems Risks
Poor System Administration Practices, Lack of Sufficient Operational Policies, Poor Physical
Security, System Compromises, Key Person Dependency, Loss of Critical Document Data or
Software, Data Disclosure, Functional Lockout, Poor Password Practices
Control risks
Control system Provide security training Control transaction processing prepare for disasters
Development Maintain physical security Motivate efficient and effective
& Modifications Control access to data operation, Audit the system
a. Acceptance
Extra effort to obtain acceptance from those affected before installing new
controls and practices may be warranted in times of distress. Putting new
constraints may be taken negatively by the employee as a sign of mistrust. Huge
or big warning should be avoided.
b. Transparency
Controls, where possible should be transparent or seen as positive contribution to
job performance. The extension of controls that increase constraints on people
3
S2 MODULE 2
should be minimized.
c. Isolation
Communication among internal systems and networks and from public networks
should be isolated, at least when it is not being used or during critical processing
times.
d. Termination
Procedure for removing, constraining, and establishing user account and password
and log on token administration should be established.
e. Dormancy
All dormant user accounts should be cancelled and all administrative actions kept
current.
f. Accounting
Accounting controls, such as monitoring of suspense items, outstanding balances,
expense accounts, employee and other special accounts, and error accounts,
should be re-evaluated. Other control measures include increasing the frequency
of reconciling, exception reporting, and shortening closing periods.
The aim of using online technologies is to maximise benefit for all stakeholders.
Online assessment requires a careful mixture of several processes. The main aim in
focusing on the design criteria and underlying concepts is to identify heuristics (trial and
error method) for designing online information systems that offer improvements in some
or all of these processes. There are different process issues for each of the different
stakeholders, and in online scenarios these are often different in type and magnitude
from those in offline based assessment processes.
Advantages
• Automation of Administrative Functions-
The online medium offers the potential for designing systems that enablethe different
stakeholders to interact to gain value for themselves specific to their orientation. The
online environment offers many means of automating tasks in order to standardise the
structure and identify omissions
• Quality Assurance-
4
S2 MODULE 2
In an online environment aimed at creating and distributing value for all stakeholder
groups, this implies that evaluation, moderation and feedback processes are created as
a parallel and integrated aspect of the online system – and by implication also be
implemented online.
• Equity Issues-
The flexibility of online system offers advantages in providing many different technical
ways to insert information into system and to access it. This flexibility of access
raises information security problems that need to be addressed informatically in
technically different ways dependent on the information processes and pathways.
Online system in these circumstances would likely require a secure
interface for external authorized and authenticated assessors to enter reports about
stakeholders
• Interface Issues-
Stakeholders interact with the online system via interfaces. These interfaces are directly
related to the underlying processes that provide stakeholders with the value and
benefits generated by the online system.
1) Technical Requirements
a) Accessibility
b) Encryption
c) Hosting
d) Environment
e) Disaster Recovery
2) Operational Requirements
a) System Performance
b) Data Archival
5
S2 MODULE 2
Accessibility –
Encryption-
Hosting- hosting is a type of service that allows individuals and organizations to make
their own system accessible.
Environment - the environment is the remainder of the universe that lies outside the
boundaries of the system. It is also known as the surroundings, Depending on the type
of system, it may interact with the environment by exchanging mass, energy (including
heat and work), linear momentum, angular momentum, electric charge, or other
conserved properties.
Disaster Recovery- Disaster recovery is the process, policies and procedures related
to preparing for recovery or continuation of technology infrastructure critical to an
organization after a natural or human-induced disaster. Disaster recovery is a subset of
business continuity. While business continuity involves planning for keeping all aspects
of a business functioning in the midst of disruptive events, disaster recovery focuses on
the IT or technology systems that support business functions.
6
S2 MODULE 2
Data Archival – it is a collection of historical records, as well as the place they are
located. Archives contain primary source documents that have accumulated over the
course of an individual or organization's lifetime. In general, archives consist of records
that have been selected for permanent or long-term preservation on grounds of their
enduring cultural, historical, or evidentiary value. Archival records are normally
unpublished and almost always unique
Audit and Controls- it is an evaluation of a system. The term most commonly refers to
audits in accounting, but similar concepts also exist in project management, quality
management, and energy conservation. And Control is the ability to purposefully direct,
or suppress, change
7
S2 MODULE 2
8
S2 MODULE 2
10