Information Systems Assignment 2
Information Systems Assignment 2
Cover Sheet
Semonè Pillay
Student number 201506896
Name of
Campus Damelin - Overport
KEEP A COPY
Please note that it is your responsibility to retain copies of your assessments.
DECLARATION BY STUDENT
Date 2024-10-02
0% 100%
Words 994
Plagiarised Unique
Characters 7460
Introduction to the prevention of computer-related crime in an organization In an increasingly digital world, organizations
are confronted with the growing threat of computer-related crimes, which can severely impact their operations and
reputation. Ralph Stair, in "Principles of Business Information Systems, 4th edition, 2020" highlights the necessity of a
comprehensive approach to cybersecurity that integrates technology, policy, and human factors.
To effectively combat these threats, organizations should implement a multi-faceted strategy that includes robust security
measures, clear policies, employee training, regular risk assessments, and the adoption of advanced technologies. By
fostering a culture of security awareness and ensuring compliance with legal regulations, organizations can mitigate risks
associated with cybercrime and enhance their overall resilience against emerging threats. This summary encapsulates the
best practices for tackling computer-related crime as outlined by Stair and current industry standards.
Computer crime refers to actions carried out by an informed computer user, often referred to as a "hacker," who unlawfully
accesses or steals private information belonging to a company or individual. In some cases, this individual or group may
have malicious intent, leading to the destruction or corruption of computer systems or data files. A lack of Security
Awareness and Training, Organizational Culture and Policies, and Technological Vulnerabilities contribute to computer
crimes. Types of Computer Crime depend on various situations such as Organization size and industry, Geographical
Location, Technology Infrastructure and Security Measures. Organizations take crime-fighting efforts seriously by
implementing specialized hardware, software, and procedures to protect corporate data. Encryption is a key method,
converting messages into a form readable only by intended recipients, with stronger encryption depending on key length.
Public-key infrastructure (PKI) enables secure data exchange on public networks through cryptographic key pairs.
Biometrics, like fingerprint and face recognition, offer another layer of protection by verifying physical traits to prevent
unauthorized access. Companies also use role-based access lists to ensure that only authorized employees can access
specific systems.
To counter computer-related crimes, businesses are implementing stronger controls and collaborating with organizations
like the Business Software Alliance (BSA) to combat piracy. Some companies even hire former criminals to improve their
security defences. Due to the rise in computer usage, there is a heightened focus on preventing and detecting computer
crime. Many countries have passed data laws governing how data can be stored, processed, and transferred, and laws on
computer crime. Some believe that these laws are not effective because companies do not always actively detect and
pursue computer crime, security is inadequate and convicted criminals are not severely punished. However, all over the
world, private users, companies, employees, and public officials are making individual and group efforts to curb computer
crime, and recent efforts have met with some success.
The following guidelines are helpful for protecting your computer from criminal hackers:
Implement robust user authentication and encryption features on your firewall.
Apply the latest security patches, which can typically be found on the vendor’s website.
Disable guest accounts and null user accounts that allow unauthorized access to the network without a password.
Do not provide overfriendly logon procedures for remote users (e.g. an organization that included the word 'welcome'
on their initial logon screen encountered challenges in prosecuting a criminal hacker).
Restrict physical access to the server and configure it so that breaking into one server will not compromise the whole
Page 1 of 2
network.
Matched Source
No plagiarism found
Page 2 of 2
PLAGIARISM SCAN REPORT
Date 2024-10-02
0% 100%
Words 235
Plagiarised Unique
Characters 1817
potential network problems. For example, A telecommunications company employs Simple Network Management Protocol
(SNMP) to monitor its network infrastructure. Using SNMP-enabled performance management software, the company
collects data on bandwidth usage and device health across its routers and switches. If a router experiences a fault, the fault
management software receives an alert via SNMP, allowing the IT team to quickly diagnose and address the issue,
minimizing downtime and maintaining service quality for customers.
2. Develop Comprehensive Security Policies
Creating clear and comprehensive security policies is crucial. These policies should outline acceptable use, data handling
procedures, and incident response protocols. Key elements include:
• Acceptable Use Policy (AUP): Provide clear guidelines and consequences, defining what constitutes acceptable
behaviour regarding the use of organizational resources and the Internet. For example, An organization's AUP prohibits
employees from using company resources for personal use, sharing confidential information, or accessing unauthorized
websites.
• Incident Response Plan: This is based on preparedness, testing and communication, a well-defined plan detailing how
to respond to security incidents can minimize damage and recovery time. For example, A company's incident response
plan includes procedures for isolating compromised systems, conducting forensic analysis, and notifying affected
customers.
• Regular Reviews and Updates: Includes policy review, compliance checks and technology assessments that should be
regularly reviewed and updated to reflect changes in technology, threats, and legal requirements. For example, A company
conducts annual security audits to assess its
Matched Source
No plagiarism found
Page 1 of 1
PLAGIARISM SCAN REPORT
Date 2024-10-02
0% 100%
Words 994
Plagiarised Unique
Characters 7435
Page 1 of 3
• Offer practical training and opportunities for hands-on practice.
• Provide continuous support and guidance.
5. Performance Evaluation:
• Monitor and evaluate the performance of IS personnel.
• Provide feedback and coaching to help them improve.
• Identify training or development needs.
6. Professional Development:
• Encourage and support professional development opportunities, such as certifications or conferences.
• Provide resources for continuous learning.
7. Retention:
• Implement strategies to retain talented IS personnel, such as competitive compensation and benefits packages.
• Foster a positive work environment and culture.
Page 2 of 3
• Check for errors, inconsistencies, or missing data.
STAGE 8: INSTALLATION
The procedure of physically installing the computer equipment at the location and making it operational. While the
hardware manufacturer typically installs equipment, an organization's IS manager should oversee the process to ensure
compliance with the contract. After installation, the manufacturer conducts tests to verify proper operation. Then, the
acquired software is installed and tested on the new hardware.
Steps involving Installation:
1. Hardware Setup:
• Unpack and assemble hardware components according to manufacturer's instructions.
• Connect hardware devices, such as servers, workstations, and peripherals.
• Install any necessary cables and network connections.
• Configure hardware settings, such as IP addresses and network settings.
2. Software Installation:
• Install the operating system on the hardware.
• Install application software, databases, and other necessary components.
• Configure software settings and parameters.
3. Network Configuration:
• Configure network settings, including IP addresses, routing, and firewall rules.
• Link the system to the organization's network.
4. Data Migration:
• Transfer data from the old system to the new system, ensuring data integrity and accuracy.
5. Testing and Configuration:
• Perform comprehensive testing to confirm that all components are functioning properly.
• Configure the system to meet specific requirements and preferences.
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 968
Plagiarised Unique
Characters 6857
6. User Training:
• Provide training to users on how to use the new system effectively.
7. Go-Live:
• Transition to the new system, either through a direct cutover or a phased approach.
STAGE 9: TESTING
Effective testing is essential to ensure that new or modified information systems function properly. Poor testing can lead to
significant issues, as seen in a case where a tax preparation system exposed users' tax returns. Different types of testing are
required: unit testing for individual programs, system testing for overall program functionality, volume testing to handle
large data loads, and integration testing to ensure smooth interaction between applications. Alpha testing checks early
versions, while beta testing involves end-user testing of a complete system. Comprehensive testing, including abnormal
data checks, helps prevent errors and ensures smooth data flow between systems.
Types of Testing to consider:
Unit testing: Testing individual programs.
System testing: Testing the entire system.
Volume testing: Evaluating the system using substantial amounts of data.
Integration testing: Testing interactions between different applications.
Acceptance testing: Conducting any tests required by the user.
Alpha testing: Evaluating an incomplete or early version of the system.
Beta testing: Assessing a fully developed and stable system by end-users.
Steps of Testing:
1. Test Planning:
• Develop a comprehensive testing plan outlining the scope, objectives, and resources required for testing.
• Identify the types of testing needed (unit, system, integration, volume, etc.)
• Determine the test environment and data requirements.
2. Test Data Preparation:
• Create test data that represents various scenarios and use cases.
• Ensure that the data is accurate, representative, and covers a wide range of possibilities.
3. Test Execution:
• Execute tests according to the testing plan, using the prepared test data.
• Monitor system behaviour and identify any deviations from expected results.
Page 1 of 3
• Document any issues or defects encountered.
4. Defect Tracking and Management:
• Track and manage identified defects using a defect tracking system.
• Rank defects according to their severity and impact.
• Assign defects to developers for resolution.
5. Retesting:
• After defects are fixed, retest the affected areas to ensure that the issues have been resolved.
6. Regression Testing:
• Test the entire system to ensure that changes made to fix one defect have not introduced new problems.
• Conduct final testing to verify that the system meets the specified requirements and is ready for deployment.
Page 2 of 3
• Develop a detailed plan outlining the scope, objectives, and procedures for UAT.
2. Test Cases:
• Create test cases that represent real-world scenarios and user tasks.
3. User Involvement:
• Involve end-users who will be using the system in the testing process.
4. Testing Execution:
• Users execute test cases and document their findings.
5. Evaluation:
• Assess the system's performance against predefined criteria and requirements.
6. Feedback Collection:
• Gather feedback from users on the system's usability, functionality, and effectiveness.
7. Issue Resolution:
• Address any identified issues or defects.
8. Acceptance or Rejection:
• Based on the testing results, determine whether the system meets the acceptance criteria and is ready for
deployment.
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 969
Plagiarised Unique
Characters 7641
Page 1 of 3
Time-efficient: Can streamline and shorten the development process.
• Disadvantages of COTS:
Integration: Integrating different components can be complex.
Limited customization: May lack flexibility for specific needs.
Quality and security concerns: Potential issues with purchased software.
Developing Software: Offers greater control and customization but can be resource intensive.
• Advantages of Internal Development Software
Meeting specific requirements: Tailored to the organization's needs.
Increased flexibility: Easier to customize and modify.
Competitive advantage: Unique software can differentiate the organization.
• Disadvantages of Internal Development Software
Higher Costs: Internal development can be more expensive due to resource requirements.
Increased Risk: There's a higher risk of delays, budget issues, and quality problems.
Slower Time-to-Market: Development from scratch takes longer than purchasing pre-built software.
Internal Software Development Tools and Techniques:
Chief programmer team: A specialized team for software development.
CASE tools: Automated tools for software development.
Object-oriented approaches: Focus on objects and their interactions.
Cross-platform development: Creating software that runs on different systems.
Integrated development environments (IDEs): Tools for programming, including visual interfaces and features.
Structured walkthroughs: Reviews to evaluate progress and identify issues.
Page 2 of 3
dissatisfaction. Companies should provide comprehensive training programs to ensure employees are prepared to use the
new system effectively. Training can be conducted internally or by external providers, and the cost can be negotiated
during the software selection process. Effective training helps address concerns and apprehensions about the new system
and ensures employees are familiar with its capabilities.
Steps for User Preparation:
1. Needs Assessment
• Identify the specific training requirements for different user groups.
• Assess the level of technical proficiency and existing knowledge.
• Determine the scope of training needed (e.g., basic functionality, advanced features, troubleshooting).
2. Training Plan Development:
• Create a comprehensive training plan that outlines the objectives, content, delivery methods, and schedule.
• Consider factors such as learning styles, available resources, and budget constraints.
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 969
Plagiarised Unique
Characters 7641
Page 1 of 3
Time-efficient: Can streamline and shorten the development process.
• Disadvantages of COTS:
Integration: Integrating different components can be complex.
Limited customization: May lack flexibility for specific needs.
Quality and security concerns: Potential issues with purchased software.
Developing Software: Offers greater control and customization but can be resource intensive.
• Advantages of Internal Development Software
Meeting specific requirements: Tailored to the organization's needs.
Increased flexibility: Easier to customize and modify.
Competitive advantage: Unique software can differentiate the organization.
• Disadvantages of Internal Development Software
Higher Costs: Internal development can be more expensive due to resource requirements.
Increased Risk: There's a higher risk of delays, budget issues, and quality problems.
Slower Time-to-Market: Development from scratch takes longer than purchasing pre-built software.
Internal Software Development Tools and Techniques:
Chief programmer team: A specialized team for software development.
CASE tools: Automated tools for software development.
Object-oriented approaches: Focus on objects and their interactions.
Cross-platform development: Creating software that runs on different systems.
Integrated development environments (IDEs): Tools for programming, including visual interfaces and features.
Structured walkthroughs: Reviews to evaluate progress and identify issues.
Page 2 of 3
dissatisfaction. Companies should provide comprehensive training programs to ensure employees are prepared to use the
new system effectively. Training can be conducted internally or by external providers, and the cost can be negotiated
during the software selection process. Effective training helps address concerns and apprehensions about the new system
and ensures employees are familiar with its capabilities.
Steps for User Preparation:
1. Needs Assessment
• Identify the specific training requirements for different user groups.
• Assess the level of technical proficiency and existing knowledge.
• Determine the scope of training needed (e.g., basic functionality, advanced features, troubleshooting).
2. Training Plan Development:
• Create a comprehensive training plan that outlines the objectives, content, delivery methods, and schedule.
• Consider factors such as learning styles, available resources, and budget constraints.
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 987
Plagiarised Unique
Characters 7509
Page 1 of 3
Intellectual Property: Ownership and rights related to the developed system.
Confidentiality: Provisions to protect sensitive information.
Warranties and Guarantees: Statements regarding the quality and performance of the system.
Dispute Resolution: Methods for addressing conflicts or disagreements.
Termination: Criteria that outline when the contract may be terminated.
Page 2 of 3
SYSTEMS IMPLEMENTATION
Systems implementation involves installing a new system and preparing all components, including users, for operation.
This process includes acquiring or developing hardware and software, training personnel, preparing the site and data,
installing, testing, and starting the system. Hardware can be purchased, leased, or rented, while software can either be
bought or developed in-house, depending on the business's needs. Software development can offer greater customization
and potential competitive advantage.
During implementation, it’s crucial to prepare users, hire necessary personnel, and ensure the system’s physical and data
requirements are met. The system undergoes various testing stages, including unit, system, and integration testing, before
it goes live. Different start-up approaches, such as direct conversion, phased-in, pilot, and parallel start-up, are used to
transition from the old system to the new one. Once fully operational, a user acceptance document may be signed to
confirm satisfaction with the new system.
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 787
Plagiarised Unique
Characters 6020
Page 1 of 3
Is the process of exploring and generating multiple ideas and approaches for a task to broaden the design space and avoid
settling on a single design idea or an existing solution.
The following steps assist in deciding on an alternative systems design:
1. Brainstorming:
• Gather a diverse group of stakeholders, including subject matter experts, users, and technical staff.
• Encourage open and creative thinking to generate a wide range of ideas and possibilities.
• Use techniques like brainstorming, mind mapping, or scenario planning to stimulate creativity.
2. Evaluation Criteria:
• Define the criteria that will be used to evaluate the generated alternatives.
• Consider factors such as cost, feasibility, scalability, maintainability, and alignment with organizational goals.
3. Alternative Development:
• Based on the brainstorming session, develop detailed descriptions of each alternative.
• Consider different approaches, technologies, and architectures that could be used to solve the problem.
4. Feasibility Analysis:
• Assess the feasibility of each alternative based on the defined criteria.
• Evaluate technical feasibility, economic feasibility, operational feasibility, and schedule feasibility.
5. Trade-Off Analysis:
• Identify the trade-offs between different alternatives, such as cost vs. functionality or performance vs. complexity.
6. Prioritization:
• Rank the alternatives based on their overall suitability and alignment with organizational goals.
• Select the most promising alternatives for further evaluation.
7. Prototyping:
• Create prototypes or proof-of-concept models to visualize and test the alternatives.
• Collect feedback from stakeholders and users to enhance the designs.
Decision Making:
• Based on the evaluation and prototyping, decide on the preferred alternative.
• Consider factors such as cost, benefits, risks, and alignment with strategic objectives.
Page 2 of 3
Matched Source
No plagiarism found
Page 3 of 3
PLAGIARISM SCAN REPORT
Date 2024-10-01
0% 100%
Words 712
Plagiarised Unique
Characters 5016
steps to analysis requirements 1 identify stakeholders determine who will be affected by the system and who has a stake in
its success 2 gather requirements collect information from stakeholders through interviews surveys workshops and other
methods 3 document requirements create a detailed list of functional and non-functional requirements including
functional requirements what the system must do to meet its objectives non-functional requirements constraints such as
performance security and scalability 4 validate requirements verify that requirements are clear consistent and feasible 5
prioritize requirements rank requirements based on importance and urgency 6 create use cases create scenarios that
illustrate how users will engage with the system stage 2 interface design and controls focuses on creating a user-friendly
intuitive experience that allows users to interact efficiently with a system or software the type of level needed varies
depending on the specific context and the desired depth of knowledge of the task menu-driven system and command-line
interfaces depending on the target audience logical design and physical design are fundamental aspects of systems design
and they directly influence the choice between menu-driven systems eg microsoft windows web browser and mobile apps
and command-line interfaces eg linux or unix terminals dos prompt and scripting select interface design type based on the
target audience logical design on interface choice between menu-driven system and command-line interfaces menu-
driven system focuses on 1 clear and intuitive menu structures 2 consistent navigation 3 helpful tooltips or context-
sensitive help 4 error handling and feedback mechanisms command-line interfaces involve languages by 1 defining valid
commands and their syntax 2 specifying command-line options and arguments 3 designing error messages and handling
mechanisms physical design on interface choice between menu-driven system and command-line interfaces menu-driven
system include 1 graphical user interface gui elements buttons menus icons 2 screen layout and design 3 colour schemes
and typography 4 responsiveness and performance command-line interfaces focuses on 1 terminal or console application
2 text-based output and input 3 command history and editing features 4 keyboard shortcuts and aliases types of control
interactive help 1 assisting users within the system 2 choosing between 2d 3d virtual reality touchscreens or keyboards 3
implementing features like spell-checking and lookup tables to assist users steps in interface design and controls 1 user
research understand your target audience and their needs preferences and capabilities conduct user interviews surveys and
usability testing to gather insights 2 information architecture organize the content and structure of the interface to make it
easy for users to navigate create a clear hierarchy and labelling system for menus buttons and other elements 3
wireframing create low-fidelity visual representations of the interface to visualize the layout and structure test different
layouts and designs to identify the most effective options 4 visual design develop the visual elements of the interface
including colours typography and imagery ensure a consistent and visually appealing design 5 interaction design define
how users will interact with the interface such as through clicks gestures or voice commands create a seamless and user-
friendly experience 6 prototyping create interactive prototypes to test the interface with users gather feedback and make
necessary adjustments 7 usability testing conduct usability tests to evaluate the effectiveness of the interface observe users
as they interact with the system and identify any usability issues 8 iterative design continuously refine and improve the
interface based on user feedback and testing results make necessary changes and adjustments to enhance the user
experience 9 accessibility ensure that the interface is accessible to users with disabilities following guidelines like wcag 10
consistency and branding maintain a consistent look and feel throughout the interface align the interface with the
organizations branding and identity stage 3 design of system security and controls protects sensitive information and
prevents unauthorized access use disclosure disruption modification or destruction of data and systems the following
Page 1 of 2
components serve a distinct purpose to ensure the overall security and reliability of the system the following key factors
involve error prevention detection and correction minimize occurring errors by identifying and correcting them effectively
disaster planning and recovery prepare for any major disruptions or system failure ensuring quick data backup solutions to
minimize the impact on a system systems controls protect unauthorized access by enforcing policies procedures and
compliance with security standards by ensuring the system operates securely and effectively
Matched Source
No plagiarism found
Page 2 of 2
Table
Of
Content
COVER PAGE I
PLAGIARISM II-
REPORT XXIV
COMPUTER-
RELATED CRIME
IN AN
1-5
ORGANIZATION.
SYSTEM DESIGN
& SYSTEM 6-27
IMPLEMENTATION
REFERENCES 28
Pa ge |1
INFORMATION SYSTEMS
1. DISCUSS WAYS YOU CAN TACKLE ANY COMPUTER-RELATED CRIME IN AN ORGANISATION.
To effectively combat these threats, organizations should implement a multi-faceted strategy that
includes robust security measures, clear policies, employee training, regular risk assessments, and
the adoption of advanced technologies. By fostering a culture of security awareness and ensuring
compliance with legal regulations, organizations can mitigate risks associated with cybercrime and
enhance their overall resilience against emerging threats. This summary encapsulates the best
practices for tackling computer-related crime as outlined by Stair and current industry standards.
Computer crime refers to actions carried out by an informed computer user, often referred to as a
"hacker," who unlawfully accesses or steals private information belonging to a company or
individual. In some cases, this individual or group may have malicious intent, leading to the
destruction or corruption of computer systems or data files. A lack of Security Awareness and
Training, Organizational Culture and Policies, and Technological Vulnerabilities contribute to
computer crimes. Types of Computer Crime depend on various situations such as Organization size
and industry, Geographical Location, Technology Infrastructure and Security Measures.
Organizations take crime-fighting efforts seriously by implementing specialized hardware, software,
and procedures to protect corporate data. Encryption is a key method, converting messages into a
form readable only by intended recipients, with stronger encryption depending on key length.
Public-key infrastructure (PKI) enables secure data exchange on public networks through
cryptographic key pairs. Biometrics, like fingerprint and face recognition, offer another layer of
protection by verifying physical traits to prevent unauthorized access. Companies also use role-
based access lists to ensure that only authorized employees can access specific systems.
CRIME IN AN ORGANISATION.
The following guidelines are helpful for protecting your computer from criminal hackers:
▪ Implement robust user authentication and encryption features on your firewall.
▪ Apply the latest security patches, which can typically be found on the vendor’s website.
▪ Disable guest accounts and null user accounts that allow unauthorized access to the network
without a password.
▪ Do not provide overfriendly logon procedures for remote users (e.g. an organization that included the
word 'welcome' on their initial logon screen encountered challenges in prosecuting a criminal
hacker).
▪ Restrict physical access to the server and configure it so that breaking into one server will not
compromise the whole network.
to manage inventory across multiple locations, allowing real-time data access and updates, which
enhances security and ensures consistent stock levels while protecting sensitive sales data from
centralized vulnerabilities.
• Call Data Records (CDR): Helps monitor communications for compliance, detect potential security
breaches, and ensure that sensitive information is handled appropriately. For example, An insider
threat where an employee illegally accesses and leaks sensitive call recordings containing
confidential customer information, potentially leading to identity theft and privacy violations.
• Simple Network Management Protocol (SNMP): This is the framework that enables Network
Management Software, Fault Management Software and Performance Management Software, these
management software tools to function effectively. Safeguards software from unauthorized copying,
modification, or downloading, while also implementing error control to identify telecommunications
errors and potential network problems. For example, A telecommunications company employs
Simple Network Management Protocol (SNMP) to monitor its network infrastructure. Using SNMP-
enabled performance management software, the company collects data on bandwidth usage and
device health across its routers and switches. If a router experiences a fault, the fault management
software receives an alert via SNMP, allowing the IT team to quickly diagnose and address the issue,
minimizing downtime and maintaining service quality for customers.
2. Develop Comprehensive Security Policies
Creating clear and comprehensive security policies is crucial. These policies should outline acceptable
use, data handling procedures, and incident response protocols. Key elements include:
• Acceptable Use Policy (AUP): Provide clear guidelines and consequences, defining what
constitutes acceptable behaviour regarding the use of organizational resources and the Internet.
For example, An organization's AUP prohibits employees from using company resources for
personal use, sharing confidential information, or accessing unauthorized websites.
• Incident Response Plan: This is based on preparedness, testing and communication, a well-
defined plan detailing how to respond to security incidents can minimize damage and recovery
time. For example, A company's incident response plan includes procedures for isolating
compromised systems, conducting forensic analysis, and notifying affected customers.
• Regular Reviews and Updates: Includes policy review, compliance checks and technology
assessments that should be regularly reviewed and updated to reflect changes in technology,
threats, and legal requirements. For example, A company conducts annual security audits to
assess its compliance with industry standards and identify areas for improvement.
3. Enhance Employee Training and Awareness
Human error frequently plays a major role in security breaches.. Continuous education programs
should be implemented to train employees on recognizing potential threats such as phishing and social
engineering attacks. Best practices include:
• Security Awareness Training: Password management, data handling practices and phishing
awareness involve regular training sessions to educate employees about the latest cyber threats
and safe computing practices. For example, A company conducts regular phishing simulations to
test employees' awareness and provide training on how to identify and report suspicious emails.
• Simulated Phishing Attacks: Conducting regular simulations through feedback, training and
coaching can help employees recognize phishing attempts and improve their response to real
threats. For example, A company sends out a fake phishing email to employees, mimicking a
legitimate email from a known sender (e.g., HR department, CEO). The email contains a malicious
link or attachment. If the employee selected Report Phishing, positive feedback is given. If a
Pa ge |4
malicious link (URL) or attachment is clicked, employees are directed to additional training on how
to identify phishing attempts
4. Conduct Regular Risk Assessments
Organizations should regularly assess their security posture through risk assessments, vulnerability
scans, and penetration testing. This helps identify weaknesses before they can be exploited by
attackers. Key strategies include:
• Vulnerability Scanning: Automated tools and regular scans can be used to identify known
vulnerabilities and threats in systems and applications. For example, A company uses a
vulnerability scanner to identify outdated software and missing security patches.
• Penetration Testing: Engaging ethical hackers to test the organization’s defences provides insights
into potential attack vectors. For example, A company hires a penetration testing firm to attempt to
breach its network and identify vulnerabilities.
5. Utilize Advanced Technologies
Leveraging emerging technologies by the practice of employing cutting-edge tools and techniques to
enhance various aspects of operations, processes, or services to enhance an organization's ability to
detect and respond to threats in real-time. These technologies can analyze vast amounts of data to
identify anomalies that may indicate a security incident:
• Artificial Intelligence (AI): Automate tasks, improve decision-making, and enhance customer
experiences. For example, chatbots powered by AI can offer immediate customer support. For
example, A bank uses AI-powered chatbots to provide instant customer support 24/7, reducing
wait times and improving customer satisfaction.
• Machine Learning (ML): Analyze large datasets to identify patterns, trends, and insights. This can
be used for predictive analytics, fraud detection, and personalized recommendations. For
example, A financial institution uses ML to detect fraudulent transactions by identifying unusual
patterns in customer behaviour.
• Robotic process automation (RPA): Automation of repetitive tasks, streamline processes, reduce
manual labour, and increase efficiency. For example, A customer service department uses RPA to
automate routine tasks like answering FAQs, improving efficiency and reducing costs.
• Data Analytics: Gain valuable insights from data to make informed decisions. Data analytics can
be used to optimize operations, improve marketing campaigns, and identify new business
opportunities. For example, A marketing team uses data analytics to analyze customer behaviour
and optimize advertising campaigns for better results.
• Cloud Computing: Leverage cloud-based services to scale resources, reduce costs, and improve
flexibility. For example, A software company uses cloud-based development tools to collaborate
with teams across the globe and scale their operations efficiently.
6. Establish Incident Response Teams
Having a dedicated incident response team ensures that there are trained professionals ready to
respond quickly to any security incidents. This team should be responsible for:
• Containment: Isolation and Network segmentation are used to quickly identify the affected
systems to prevent further damage and limit the spread of malware. For example, If a system is
Pa ge |5
suspected of being compromised, the IT team immediately isolates it from the network to prevent
further damage.
• Investigation: Forensic and Root cause analysis is used to determine the “what happened and why
it happened” of a breach to identify any contributing factors, underlying issues and compromised
data. For example, A company hires a forensic expert to analyze compromised systems and
identify the source of a data breach.
• Communication: Maintaining clear communication with stakeholders throughout the incident
response process, including notifying affected parties as required by law. For example, A
company sends out a public statement informing customers of a data breach and outlines the
steps being taken to address the incident.
7. Legal Compliance
Organizations must ensure compliance with relevant laws and regulations such as GDPR, HIPAA, or PCI
DSS. This involves:
• Regular Audits: Compliance checks and Policy enforcement ensure the procedure is being
followed and that the organization remains compliant with legal standards. For example, A
company conducts annual security audits to assess its compliance with GDPR and other data
protection laws.
• Documentation: Evidence and Record- Keeping details of all security policies, incidents,
training sessions, and compliance efforts can protect in the event of legal scrutiny. For example,
A company maintains a log of all security incidents, including incident reports, investigation
findings, and remediation steps.
Conclusion
By implementing these strategies based on Ralph Stair's principles, organizations can create a robust
framework for tackling computer-related crime effectively. This holistic approach not only enhances
security but also fosters a culture of awareness and accountability among all employees.
Pa ge |6
Conventional systems development initiatives can vary from minor projects, such as acquiring,
an inexpensive computer program, to a major undertaking. The steps of traditional systems
development processes may differ between companies, but most methodologies share five common
phases: investigation, analysis, design, implementation, and maintenance and review.
SYSTEMS DESIGN
Characteristics using two key aspects of systems design are logical and physical design.
Logical Design defines the system's functions and processes, specifies data requirements, inputs,
outputs, and storage, and designs user interfaces and controls.
Physical Design specifies characteristics of the system components necessary to put the logical design
into action. How a system's components work together and what they do. Turning the logical design
(what the system should do) into a practical reality. This includes defining the hardware, software,
database, telecommunications components, personnel, and procedures needed to make the system
function.
Visual tools like data-flow diagrams, class diagrams, and sequence diagrams are often used to document
physical design to determine the system architecture and deployment strategy. The main outcome of this
phase is a technical design that outlines either the new system or the modifications to existing systems.
The system design details system outputs, inputs and user interfaces; specifies hardware, software,
database, telecommunications, personnel and procedure components; and shows how these
components are related. Building the system according to the design specifications and testing the
system to ensure it meets requirements help answer the question ‘How will the information system do
what it must do to obtain the problem solution?’ in the design process.
2. Gather requirements:
Collect information from stakeholders through interviews, surveys, workshops, and other methods.
3. Document requirements:
Create a detailed list of functional and non-functional requirements, including:
✓ Functional requirements: What the system must do to meet its objectives.
✓ Non-functional requirements: Constraints, such as performance, security, and scalability.
4. Validate requirements:
Verify that requirements are clear, consistent, and feasible.
5. Prioritize requirements:
Rank requirements based on importance and urgency.
6. Create use cases:
Create scenarios that illustrate how users will engage with the system.
Physical Design on Interface Choice between Menu-Driven System and Command-Line Interfaces.
Types of Control:
Interactive Help:
1. Assisting users within the system.
2. Choosing between 2D, 3D, virtual reality, touchscreens, or keyboards.
3. Implementing features like spell-checking and lookup tables to assist users.
• Create a clear hierarchy and labelling system for menus, buttons, and other elements.
3. Wireframing:
• Create low-fidelity visual representations of the interface to visualize the layout and structure.
• Test different layouts and designs to identify the most effective options.
4. Visual Design:
• Develop the visual elements of the interface, including colours, typography, and imagery.
• Define how users will interact with the interface, such as through clicks, gestures, or voice
commands.
• Observe users as they interact with the system and identify any usability issues.
8. Iterative Design:
• Continuously refine and improve the interface based on user feedback and testing results.
• Ensure that the interface is accessible to users with disabilities, following guidelines like WCAG.
10. Consistency and Branding:
• Develop and implement comprehensive security policies and standards that define the
organization's security requirements.
• Ensure compliance with relevant regulations and industry best practices.
3. Access Controls:
• Implement robust access controls to restrict access to sensitive information and systems based on
user roles and permissions.
• Use strong authentication mechanisms (e.g., passwords, multi-factor authentication) to verify user
identity.
4. Encryption:
• Encrypt sensitive data to protect it from unauthorized access even if it's compromised.
• Implement firewalls, intrusion detection systems (IDS), and other network security measures to
protect the system from external threats.
• Educate users about security best practices, including password management, phishing prevention,
and social engineering awareness.
10. Continuous Monitoring and Evaluation:
• Continuously improve and update security controls based on evolving threats and best practices.
P a g e | 12
• Gather a diverse group of stakeholders, including subject matter experts, users, and technical staff.
• Encourage open and creative thinking to generate a wide range of ideas and possibilities.
• Use techniques like brainstorming, mind mapping, or scenario planning to stimulate creativity.
2. Evaluation Criteria:
• Define the criteria that will be used to evaluate the generated alternatives.
• Consider factors such as cost, feasibility, scalability, maintainability, and alignment with
organizational goals.
3. Alternative Development:
• Consider different approaches, technologies, and architectures that could be used to solve the
problem.
4. Feasibility Analysis:
• Identify the trade-offs between different alternatives, such as cost vs. functionality or performance
vs. complexity.
6. Prioritization:
• Rank the alternatives based on their overall suitability and alignment with organizational goals.
• Select the most promising alternatives for further evaluation.
7. Prototyping:
Decision Making:
• Consider factors such as cost, benefits, risks, and alignment with strategic objectives.
P a g e | 13
• Evaluate and compare the financial implications of each alternative design by selecting a cost-
effective solution.
3. Evaluating and Selecting a Systems Design:
• A criteria of performance, cost and alignment requirements is reviewed and compared to selecting
the best design.
4. The Preliminary Evaluation:
• An initial assessment which begins after all proposals have been submitted to dismiss the
unwanted proposals.
5. The Final Evaluation:
• A detailed investigation of the proposals offered by the vendors remains after the preliminary
evaluation.
6. Group Consensus Evaluation:
• Involves decision-making by a group that is appointed and given the responsibility of making the
final evaluation and selection.
7. Cost–Benefit Analysis Evaluation:
• A method that outlines the costs and benefits of each proposed system. Once quantified in
monetary terms, all costs are compared against all benefits.
8. Benchmark Test Evaluation:
This approach safeguards designs to minimize the risks of changes making the design more fixed and
detailed. Compiling, organizing and completing the overall design stages before the deadlines. Forcing
the users into an agreement by writing that the design is acceptable.
1. Design Review and Approval:
• Conduct a thorough review of the design specifications by stakeholders, including project managers,
developers, and users.
• Ensure that the design meets all requirements and aligns with the project's objectives.
• Establish a process for managing and approving changes to the design after the freeze.
• Create detailed documentation of the frozen design specifications. This documentation should
include:
✓ System requirements
✓ Functional specifications
✓ Data models
✓ Interface designs
✓ Hardware and software specifications
✓ Other relevant design details
4. Communication:
• Communicate the design freeze to all stakeholders involved in the project.
• Ensure that everyone understands the implications of the freeze and the process for requesting
changes.
• The process often starts with a Request for Proposal (RFP) or Request for Quotation (RFQ), where
the organization outlines its requirements and seeks proposals from vendors.
2. Contract Negotiation:
• Once a vendor is selected, negotiations begin to finalize the terms and conditions of the contract.
3. Contract Development:
• The contract is drafted, including detailed specifications, timelines, deliverables, payment terms,
and dispute resolution mechanisms.
4. Contract Review and Approval:
• Both parties review the contract and make any necessary revisions. The contract is subsequently
signed by authorized representatives.
5. Contract Management:
• Throughout the project, the contract is monitored to ensure compliance and address any issues
that may arise.
• A brief overview of the project, its objectives, and the key findings of the design process.
2. System Overview:
• A high-level description of the system's architecture, components, and functionalities.
P a g e | 16
3. Requirements Analysis:
• A discussion of the considered alternatives and the rationale for the chosen design.
6. Testing Plan:
SYSTEMS IMPLEMENTATION
Systems implementation involves installing a new system and preparing all components, including users,
for operation. This process includes acquiring or developing hardware and software, training personnel,
preparing the site and data, installing, testing, and starting the system. Hardware can be purchased,
leased, or rented, while software can either be bought or developed in-house, depending on the
business's needs. Software development can offer greater customization and potential competitive
advantage.
During implementation, it’s crucial to prepare users, hire necessary personnel, and ensure the system’s
physical and data requirements are met. The system undergoes various testing stages, including unit,
system, and integration testing, before it goes live. Different start-up approaches, such as direct
conversion, phased-in, pilot, and parallel start-up, are used to transition from the old system to the new
one. Once fully operational, a user acceptance document may be signed to confirm satisfaction with the
new system.
• Compare offers from general computer manufacturers, small manufacturers, peripheral equipment
makers, and leasing companies.
3. Request for Proposal (RFP):
• Prepare and send an RFP to selected vendors, outlining the organization's hardware requirements,
budget, and timelines.
4. Evaluate Proposals:
• Review vendor proposals
• Consider factors such as cost, performance, scalability, vendor reputation, and support services.
5. Select Vendor:
P a g e | 18
• Choose the vendor that best meets the organization's needs, offering the optimal balance of price,
quality, and support.
6. Negotiate Terms:
• Negotiate the purchase, lease, or rental agreement, including pricing, delivery schedules,
warranties, and maintenance services.
7. Purchase or Lease Agreement:
• Finalize and sign the agreement with the vendor for the acquisition of the hardware.
8. Hardware Delivery and Installation:
• Ensure timely delivery of the hardware, followed by its installation at the designated site, according
to the system specifications.
9. Testing and Integration:
• Conduct hardware testing to ensure compatibility and functionality with the existing system and
integrate it into the broader IT infrastructure.
10. Ongoing Support and Maintenance:
• Arrange for continued support, including maintenance, troubleshooting, and updates as necessary.
• COTS (Commercial Off-The-Shelf) approach combines existing products with external resources
from various vendors to create a finished system. Here are the pros and cons of COTS:
• Advantages of COTS:
✓ Cost-Effective: Often less expensive than developing software from scratch.
✓ Time-efficient: Can streamline and shorten the development process.
• Disadvantages of COTS:
✓ Integration: Integrating different components can be complex.
✓ Limited customization: May lack flexibility for specific needs.
✓ Quality and security concerns: Potential issues with purchased software.
P a g e | 19
Developing Software: Offers greater control and customization but can be resource intensive.
• Consider factors like data volume, scalability, security, and integration with existing systems.
2. Research and Evaluate Options:
• Cloud-based services: Utilizing cloud platforms for database and telecommunications needs.
4. Evaluate Hardware and Software Components:
• Scalability: Choose systems that can accommodate future growth and increased workloads.
• Support and Maintenance: Evaluate the vendor's support services and maintenance options.
• Cost-Benefit Analysis: Evaluate the costs and benefits of various options to facilitate an informed
decision.
• Determine the scope of training needed (e.g., basic functionality, advanced features,
troubleshooting).
2. Training Plan Development:
• Create a comprehensive training plan that outlines the objectives, content, delivery methods, and
schedule.
• Consider factors such as learning styles, available resources, and budget constraints.
3. Training Materials Development:
• Develop or acquire appropriate training materials, including manuals, tutorials, and online
resources.
P a g e | 21
• Ensure materials are clear, concise, and aligned with the system's features and functionality.
4. Training Delivery:
• Choose the most suitable delivery method (e.g., classroom, online, self-paced).
• Offer opportunities for users to practice using the system in a simulated or controlled environment.
• Provide guidance and feedback to help users develop proficiency.
6. Knowledge Checks and Assessments:
• Offer ongoing support and assistance during the initial period of system usage.
• Be available to answer questions and address any issues that may arise.
8. Post-Implementation Evaluation:
• Conduct a follow-up evaluation to assess the effectiveness of the training program.
• Welcome new hires and provide them with necessary information and resources.
P a g e | 22
• Determine the specific requirements of the new system, such as space, power, and environmental
conditions.
• Assess the suitability of the existing location or identify potential new locations.
2. Space Allocation:
• Allocate the necessary space for the system, including equipment, workstations, and cabling.
• Install or upgrade electrical power outlets, network cables, and other infrastructure components as
needed.
P a g e | 23
• Assess the environmental conditions of the location, such as temperature, humidity, and dust levels.
• Test the prepared site to ensure that it meets the system's requirements.
• Commission the system and verify that it is functioning properly.
• Extract data from existing systems or sources, such as databases, spreadsheets, or text files.
• Convert data into the appropriate format and structure for the new system.
• This may involve changing data types, normalizing data, or cleaning up inconsistencies.
4. Data Validation:
STAGE 8: INSTALLATION
The procedure of physically installing the computer equipment at the location and making it operational.
While the hardware manufacturer typically installs equipment, an organization's IS manager should
oversee the process to ensure compliance with the contract. After installation, the manufacturer
conducts tests to verify proper operation. Then, the acquired software is installed and tested on the new
hardware.
Steps involving Installation:
1. Hardware Setup:
• Transfer data from the old system to the new system, ensuring data integrity and accuracy.
5. Testing and Configuration:
• Perform comprehensive testing to confirm that all components are functioning properly.
• Transition to the new system, either through a direct cutover or a phased approach.
P a g e | 25
STAGE 9: TESTING
Effective testing is essential to ensure that new or modified information systems function properly. Poor
testing can lead to significant issues, as seen in a case where a tax preparation system exposed users' tax
returns. Different types of testing are required: unit testing for individual programs, system testing for
overall program functionality, volume testing to handle large data loads, and integration testing to ensure
smooth interaction between applications. Alpha testing checks early versions, while beta testing involves
end-user testing of a complete system. Comprehensive testing, including abnormal data checks, helps
prevent errors and ensures smooth data flow between systems.
Types of Testing to consider:
Unit testing: Testing individual programs.
System testing: Testing the entire system.
Volume testing: Evaluating the system using substantial amounts of data.
Integration testing: Testing interactions between different applications.
Acceptance testing: Conducting any tests required by the user.
Alpha testing: Evaluating an incomplete or early version of the system.
Beta testing: Assessing a fully developed and stable system by end-users.
Steps of Testing:
1. Test Planning:
• Develop a comprehensive testing plan outlining the scope, objectives, and resources required for
testing.
• Identify the types of testing needed (unit, system, integration, volume, etc.)
• Create test data that represents various scenarios and use cases.
• Ensure that the data is accurate, representative, and covers a wide range of possibilities.
3. Test Execution:
• Execute tests according to the testing plan, using the prepared test data.
• Monitor system behaviour and identify any deviations from expected results.
• Document any issues or defects encountered.
4. Defect Tracking and Management:
• After defects are fixed, retest the affected areas to ensure that the issues have been resolved.
6. Regression Testing:
• Test the entire system to ensure that changes made to fix one defect have not introduced new
problems.
• Conduct final testing to verify that the system meets the specified requirements and is ready for
deployment.
• Conduct final rounds of testing to ensure that the system meets all requirements and is ready for
deployment.
• Address any outstanding issues or defects.
2. Data Migration:
• Transfer data from the old system to the new system, ensuring accuracy and completeness.
• Provide comprehensive training to users on how to use the new system effectively.
• Offer ongoing support and assistance during the initial period of use.
4. Parallel Operation (Optional):
• In some cases, both the old and new systems may run in parallel for a period to allow for comparison
and testing.
• Gradually phase out the old system as confidence in the new system increases.
5. Cutover:
P a g e | 27
• The point at which the old system is completely turned off, and the new system becomes the
primary system of record.
• Continuously monitor the system's performance and address any issues that arise.
• Gather feedback from users and evaluate the system's effectiveness.
7. Optimization and Refinement:
• Make necessary adjustments and improvements based on feedback and performance data.
• Develop a detailed plan outlining the scope, objectives, and procedures for UAT.
2. Test Cases:
• Create test cases that represent real-world scenarios and user tasks.
3. User Involvement:
• Involve end-users who will be using the system in the testing process.
4. Testing Execution:
• Gather feedback from users on the system's usability, functionality, and effectiveness.
7. Issue Resolution:
• Based on the testing results, determine whether the system meets the acceptance criteria and is
ready for deployment.
P a g e | 28
REFERENCES
TEXTBOOK TITLE:
Principles of Business Information Systems
AUTHOR:
Ralph Stair, George Reynolds and Thomas Chesney.