信息管理专业英语8单元课文翻译.docx
- 文档编号:8936731
- 上传时间:2023-02-02
- 格式:DOCX
- 页数:6
- 大小:19.23KB
信息管理专业英语8单元课文翻译.docx
《信息管理专业英语8单元课文翻译.docx》由会员分享,可在线阅读,更多相关《信息管理专业英语8单元课文翻译.docx(6页珍藏版)》请在冰豆网上搜索。
信息管理专业英语8单元课文翻译
ThreatstoInformationandWaystoReduce
Bibliography:
GeraldV.Post,DavidL.Aderson.ManagementInformationSystemsBusinessProblemswithInformationTechnology(ThirdEdition).McGraw-HillEurope,2002,pp.116-120.
Manypotentialthreatsexisttoinformationsystemsandthedatatheyhold.Thecomplicatedaspectisthatthebiggestinformationthreatisfromlegitimateusersanddevelopers.Purelybyaccident,ausermightenterincorrectdataordeleteimportantinformation.Adesignermightmisunderstandanimportantfunctionandthesystemwillproduceerroneousresults.Aninnocentprogrammingmistakecouldresultinincorrectordestroyeddata.Minorchangestoafrailsystemcouldresultinacascadingfailureoftheentiresystem.
Wecandetectandpreventsomeoftheseproblemsthroughcarefuldesign,testing,training,andbackupprovision.However,moderninformationsystemsareextremelycomplex.Wecannotguaranteetheywillworkcorrectlyallofthetime.Plus,theworldposesphysicalthreatsthatcannotbeavoided:
hurricanes,earthquakes,floods,andsoon.Often,thebestwecandoistobuildcontingencyplansthatenablethecompanytorecoverasfastaspossible.Themostimportantaspectofanydisasterplanistomaintainadequatebackupcopies.Withcarefulplanning,organization,andenoughmoney,firmsateabletoprovidevirtuallycontinuousinformationsystemssupport.
Asecondsetofproblemsarisesfromthefactthatastechnologychanges,sodocriminals.Today,onlyadesperatepersonwouldrobabankwithagun.Theprobabilityofbeingcaughtishigh,andtheamountofmoneystolenislow.Notthatwewishtoencourageanyonetobecomeathief,butthecomputeroffersmucheasierwaystosteallargeramountsofmoney.
Itisimportanttodeterminethepotentialthreatstocomputersecurity.SometoolshavemadeiteasierforoutsiderstoattackcompaniesovertheInternet,butbyfarthebiggestissuesremainpeopleinsidethecompanyandviruses.
Disasters:
Fortunately,fires,floods,hurricanes,andotherphysicaldisastersdonothappentoooften.Butwhenadisasterdoeshitacompanyisdatacenter,itcoulddestroythecompany.Withoutadvancepreparations,thelossofadatacenter,couldshutdowntheoperations.Howlongcanamoderncompanysurvivewithouttransactionprocessing?
Today,therearemanywaystoplanforandrecoverfromdisasters.Acommonmethodtodayistocontractwithadisasterrecovery,servicesprovider.ServiceproviderslikeSunGardprovideaccesstotheircommercialrecoveryfacilitiesandprovideseverallevelsofsupportforvariousfees.Onecommonlevelofsupport,calledahotsite,consistsofafullyconfiguredcomputercenter.Specificcomputerequipmentisalreadyinstalledandreadyforimmediateuse.WhentheMISstaffdeclaresadisaster,theyinstallthebackuptapesonthehot-sitecomputersandusetelecommunicationlinestoruntheday-to-dayoperations.Anotheralternativeistocontractforacoldsite,whichprovidesfullyfunctionalcomputerroomspace,withoutthecomputerequipment.Ifadisasteroccurs,eitherthecompanyorthedisasterrecoveryservicesprovidercanarrangeforthenecessaryequipmenttobeshippedtothecoldsite.However,theremightbeadelayofseveraldaysbeforethenowdatacenterwillbeoperational,soacoldsiteisoftenusedinconjunctionwithahotsitecontract.
Forcomputeroperationsthatabsolutelymustneverbeinterrupted,somefirmsutilizeaback-upcomputerthatiscontinuouslyrunningtomaintainacompletecopyofthedailyoperations,Alldataismaintainedsimultaneouslyatbothlocations.Ifproblemsarisewithonemachine,thesecondonetakesoverautomatically.Specialtyfirmsarenowofferingthesedatamirroringfacilities.Theoutsidefirmissentcopiesofallofyourdataasitisgenerated.Thefirmmakesbackupcopiesandprovidesvirtuallyinstantaneousrenewalofserviceifsomethinginterfereswithyourmaincomputer.
EmployeesandConsultants
Employeesaretheheartofanycompany.Companiesfunctionandsucceedbytrustingtheiremployees.Althoughalmostallemployeesarehonestanddiligent,theseisalwaysthechancethatone.Employeewillusethecompanyisknowledge,experience,andtrusttomisappropriateresources.
Itcanbedifficulttoidentifypeoplewhomightcausedamagetothefirm.Manycompaniestodayusepsychologicaltests,backgroundchecks,andrandomdrugteststoindicatepotentialproblems.Mostcompaniesarewaryofemployeeswhoseemploymenthasbeenterminated.Businessesfollowspecificstepswhenemployeesleave,beingparticularlycarefultoremovetheemployeesisaccesstocompanycomputers.
AmorecomplicatedproblemariseswithMISemployees.Programmersandanalysishavetobetrusted.Withoutthem,therewouldbenosoftware.However,itisgenerallybestiftheprogrammersarenottheusersoftheprogram.Companiesenforceaseparationofdutiesamongstaffprogrammersandusers.Thinkaboutwhatmighthappenifabanktellerwasalsoresponsibleforwritingthecomputerprogramusedbytellers.Itwouldbeeasytousethecomputertostealmoneyfromdifferentaccounts.Auditingtransacting-processingsystemsisanimportanttaskforauditors.
Unscrupulousprogrammershavealsobeenknowntoinclude“timebombs”intheirsoftware.Wheneverthesoftwareruns,itchecksahiddenfileforasecretword.Iftheprogrammerleavesthecompany,thesecretworddoesnotgetchanged.Whentheprogramdoesnotfindthecorrectword,itstartsdeletingfiles.Onlargeprojects,thesebombscanbeimpossibletospot(untiltheygooff).Keepinggoodbackupscanusuallyminimizethedamage.Asarelatedsidenote,thesoftwareindustryispushingstatestoadoptanewsetoflaws(UCITA)thatmakesitlegaltoincludeashutdowntimebombifasoftwarecompanyhasadisputewithabusinessthatusesitssoftware.
Anotherdangerareaisthatprogrammersmightincludeatrapdoororsecretpasswordthatallowsthemtogainaccesstothesoftwareeveniftheyleavethecompany.Sometimesthesetrapdoorsareinstalledinnocently,toenableprogrammerstomakecorrectionsfaster.Theimportantpointistomakesuretheyareremovedwhenthesystemsispermanentlyinstalled.
Aninterestingclassofthreatstosecuringyourdataarisesfromnegligenceinsteadofdeliberateactionsbytheusers.Forinstance,employeesmightaccidentallydeletedata.Or,carryingdisks,tapes,orevenlaptopcomputerspastmagneticfieldscansometimesdamagethefiles.Inthesecases,thebestbetistohavebackupsreadilyavailable.Morecomplicatedproblemsarisewhenlaptopcomputersarelostorevenstolen.Inadditiontothedatastoredonthemachines,thefilesoftenholdpasswordsforcorporatecomputers.Manylaptopsprovidepasswordsandencryptthedatatominimizetheseproblems.Oneotherproblemthatfallsintothiscategoryisawarningtobecarefulabouthowyoudisposeofoldtapes,disks,andcomputerequipment.Businessesrunsimilarrisksthentheysendcomputerequipmentoutforrepairs.
Ingeneral,thebestwaytominimizeproblemsformemployeesstemsfromtypicalmanagementtechniques,Hireworkerscarefully,treatemployeesfairly,haveseparationofjobs,useteamwork,andmaintainconstantchecksontheirwork.Consultantspresentthesamepotentialproblemsasemployees.However,consultantstendtobehiredforashorttime,sothefirmknowsevenlessaboutthemthanaboutregularemployees.Consultantsaregenerallyusedforspecializedjobs,sotheremaynotbeanyinternalemployeeswhocanadequatelymonitortheirwork.
Businesspartnerships
Ascomputersspreadthroughouteveryaspectofbusiness,manycompaniessharetheirdata.Forexample,GeneralMotorsasksitssupplierstoprovideallinformationelectronically.Thiselectronicdatainterchange(EDI)meansthatbusinessinformationisprocessedfasterandwithfewererrors.Theproblemisthatinmanycases,itmeansGMgivesothercompaniesconsiderableaccesstoGMiscomputerandviceversa.Forinstance,ifGMisthinkingaboutincreasingproduction,themanagersmightwanttochecksupplierproductionschedulestomakesurethesupplierscouldprovideenoughparts.Todoitelectronically,Gmneedsaccesstothesuppliersiscomputers.Toparticipateinbusinesstoday,youmusttrustyourpartners.However,youhavelimitedabilitytoevaluatealloftheiremployees.
TheissueofpartnershipsbecomesmoreimportantinanInternetworldofsoftware.Increasingly,firmsareprovidingservicesovertheInternet-wherethesoftwareandyourdataresideonaserviceprovideriswebsite.AgoodexampleisNetLedger,whichisanapplicationserviceonvider(ASP)thatprocessesallofyouraccountingneedsonitswebsite.ThemainadvantagesofanASPare
(1)expertssetupandrunthesitesoyoudonothavetohirespecialists,
(2)storingthedataontheWebmeansitisaccessibletoyouremployeeswherevertheyhaveWebaccess,and(3)youcanstartandscaleuptoareasonablesizewithouthassles.Apotentialdrawbackisthatallofyourfinancialdataisstoredonasiterunbysomeoneelse.Ofcourse,thereputationoftheASPdependsonprotectingyourdataandmaintainingsecurity,soitprobablysaferthanwhatasmallbusinesscouldhandleindependently:
however,youshouldstillinvestigatetheASPsecurityprocedures.
Outsiders
Thereissomethreatfromoutsiderswhomightdialupyourcomputerandguessapassword.Usingsomecommonsensecanminimizemostofthesethreats.Forexample,inthe1980s,somegroupsgainedaccesstocomputersbecausetheoperatorsneverchangedthedefaultpasswordthatwasshippedwiththecomputer!
Theinternetcausesadditionalproblemsbecauseitwasdesignedtogiveotherpeo
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 信息管理 专业 英语 单元 课文 翻译