Professional Documents
Culture Documents
1
Mục tiêu
3
MANAGEMENT CHALLENGES
4
SYSTEM VULNERABILITY AND ABUSE
• Hackers
• Computer viruses
5
SYSTEM VULNERABILITY AND ABUSE
Figure 14-1
6
SYSTEM VULNERABILITY AND ABUSE
Disaster
Security
7
SYSTEM VULNERABILITY AND ABUSE
Errors
8
SYSTEM VULNERABILITY AND ABUSE
9 Figure 14-2
SYSTEM VULNERABILITY AND ABUSE
Maintenance Nightmare
10
SYSTEM VULNERABILITY AND ABUSE
Figure 14-3
11
SYSTEM VULNERABILITY AND ABUSE
12
CREATING A CONTROL ENVIRONMENT
Overview
Controls
13
CREATING A CONTROL ENVIRONMENT
General controls
14
15
CREATING A CONTROL ENVIRONMENT
Figure 14-4
16
CREATING A CONTROL ENVIRONMENT
Application controls
17
18
CREATING A CONTROL ENVIRONMENT
19
CREATING A CONTROL ENVIRONMENT
21
CREATING A CONTROL ENVIRONMENT
Firewalls
Figure 14-5
23
CREATING A CONTROL ENVIRONMENT
25
CREATING A CONTROL ENVIRONMENT
Figure 14-6
26
CREATING A CONTROL ENVIRONMENT
Digital Certificates
27 Figure 14-7
CREATING A CONTROL ENVIRONMENT
• Importance of data
28
29
CREATING A CONTROL ENVIRONMENT
MIS audit
30
CREATING A CONTROL ENVIRONMENT
Figure 14-8
31
ENSURING SYSTEM QUALITY
32
ENSURING SYSTEM QUALITY
33
ENSURING SYSTEM QUALITY
Data Flow Diagram for Mail-in University Registration System
Figure 14-9
34
ENSURING SYSTEM QUALITY
Software Quality Assurance Methodologies and Tools
35
ENSURING SYSTEM QUALITY
Figure 14-10
36
ENSURING SYSTEM QUALITY
• Inflexible
• Time-consuming
37
ENSURING SYSTEM QUALITY
38
ENSURING SYSTEM QUALITY
39 Figure 14-11
ENSURING SYSTEM QUALITY
40
ENSURING SYSTEM QUALITY
41
ENSURING SYSTEM QUALITY
Figure 14-12
42
ENSURING SYSTEM QUALITY
Resource allocation
43
ENSURING SYSTEM QUALITY
Software Metrics
44
ENSURING SYSTEM QUALITY
Testing
45
ENSURING SYSTEM QUALITY
Data cleansing