Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Size: px
Start display at page:

Download "Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA"

Transcription

1 Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1

2 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components of IT and their functions Operating system software Knowledge Statements 1.2 Fundamental concepts of different components of IT and their functions Operating System Software 2

3 Topics Covered Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management 3

4 What Is Systems Software? 4

5 Software Set of instructions Tells the computer what to do Accomplishes desired task when executed in a sequence Most critical function- directs the working of computer hardware and causes a computer to perform useful tasks 5

6 Software Architecture S Y S T E M S O F T W A R E Users interact with Application Packages System Software Operating System Data communication APPLICATION PACKAGES Data Base management software (DBMS) MS-OFFICE (Word, Excel, Access),Payroll, Sales etc System Access software control is a collection of computer programs Tape and used disk in design, management processing systems and Program control of library application management packagesystems DEVLOPMENT PACKAGES Network management software Visual Basic, Java, VC++, etc Program Development Tools UTILITIES etc Job scheduling Middleware Access Control Utility software programs Operating System Hardware - Firmware 6

7 Operating Systems Set of programs which acts as intermediary agent between the user and the computer hardware permits sharing and use of resources. It controls and manages the computer hardware resources among various processes. 7

8 Types of Operating Systems Single User OS Multi User OS Multi Processing OS Real time OS One user uses System at a timesingle or multi tasking Several users use System at a time OS operates on system with more than one processor Used in embedded systems with only small set of tasks 8

9 Need For Systems Software 9

10 OS Capabilities Multitasking allows computing systems to run two or more applications concurrently. Multiprocessing links more than one processor (CPU) Multithreading runs several processes or threads of a program simultaneously. 10

11 Core Tasks of OS Processor Management Memory Management Device Management File Management Secondary Storage Management Networking Application Programme Interface User Interfaces With System 11

12 Operating Systems Resource Manager Perform Hardware Function Providing user interfaces. Hardware independence through API Memory Management, Virtual Memory Networking-Permits users to share hardware and data. Time Sharing-Schedules resources among users. Manage resources and processing. 12

13 User Interface One of the most important functions of OS is to provide user interface Application software What is the price of RIL (RIL$) Operating System software Fetch RIL$ from hard disk,track1 sector 7 Application Program Interface 13

14 Memory and Processor Management 14

15 Core components of an OS OS holds a computer together- Glue binds H/w with S/w Kernel Layer Controls Access to Hardware Schedules System resources.. Memory, CPU,.. Enforces Security to System Resources Shell Layer Surrounds kernel Provides Interface for Applications 15

16 Programming Languages What to do & How to do What to do The instruction ADD 2 and 5 and assign the result to variable y written in different programming languages 16

17 Programming Software Assembler Assembly level code Machine code Language Compiler 3GL Code(As a single unit) Machine code Checks for errors in 3GL code Language Interpreter 3GL Code (Each program statement) Machine code Easier to debug Slow execution SQL Engine SQL Statement Machine code 17

18 Program Development Software Linker Process of combining various pieces of code and data together to form single executable unit that can be loaded in memory. Loader Loads code & data of executable code memory executes program Debugger Identify problem occurring during execution.help locate bugs Editors Allows user to create & Edit files w/out special characters Write source code 18

19 Some more System Software Access Control Software Data Communication Software Utility Programs Tape and Disk Management Software 19

20 Access Control Software Access Control Software is used for Secure access to data, files, system resources Assign ownership of all data for accountability Logging Access Activity 20

21 Data Communication Software Communications software is generally embedded in the computer operating system. Communications software assists Operating System in managing local and remote terminal access to host resources to manage security E.g. terminal emulators, file transfer programs 21

22 Utility Programs Functions To manage a computer's functioning To improve operational efficiency e.g. Defragmenters To understand application systems. To facilitate assessing or testing data quality. To test a program s ability to function correctly and maintain data integrity. To assist in fast program development. 22

23 Security & Controls Relating to Operating System 23

24 OS Security OS should be Robust Reliable, and free of Integrity flaws. Operating system's processes and kernel do the designated task as instructed. A malicious program could make these process do malicious tasks OS can be secured through proper user access and it has to be protected through anti-virus, firewalls, Anti spyware and patch management 24

25 Access Control in OS Access control is the process of authorizing users, groups and computers to access objects on the computer or network Operating system access controls First layer of access controls Rely on hardware features of processor or Associated memory management Basically control which memory addresses a process can access. 25

26 Access Control in OS - ACL ACLs are widely used in environments where users manage their own file security, such as the Unix File is the smallest object in OS Access control deals with files ACL is a matrix of access permissions, with columns for files and rows for users 26

27 Access Control List (ACL) Match User/Role with Object Specifying Capabilities File A File B Prog X Role A Read Write Write Role B Read Read Write Role C Execute 27

28 Access Control in OS ACLs are used in OS with Roles. Role= set of Users Administrator, Guest Assign permissions to roles Each user gets permission through Role 28

29 Access Controls in UNIX Each file(object) has owner and group Permissions set by owner Could be Read, write, execute to Owner, group, other Only owner, root can change permissions 29

30 Access Control in Windows - Steps User Creation Create Password Assign Roles User rights & privilege Permissions Security Auditing 30

31 Create User In Windows 7 Go to Control Panel > User Accounts > Manage accounts 31

32 Create Password In Windows 7 Go to Control Panel > User Accounts > Manage accounts 32

33 Assign Role In Windows 7 Go to Control Panel > User Accounts > Manage accounts Default Roles could Be Standard User or Administrator 33

34 User Rights & Permissions User Rights apply to user accounts, and Permissions attached to objects Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy 34

35 User Rights Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy Click on User Rights assignment 35

36 Permissions Permissions are attached to objects Right Click on Properties > Security Tab > Advanced or Edit 36

37 Auditing User Access Audit access to Object, Logon, System events Logging User Events Start> Control Panel>System and security> Administrative Tools>Local Security Policy>Local Policies> Audit Policy 37

38 Understanding Software Asset Management 38

39 Software Asset Management ITIL Definition Software Asset Management is all of the infrastructure and processes necessary for the effective management, control and protection of the software assets within an organization, throughout all stages of their lifecycle. 39

40 Software Asset Management Covers: Software from Purchasing Deploying Managing And tracking Purchase to Retirement of the software SAM is a key process for any organisation to meet its legal, financial and reputational responsibilities 40

41 SAM answers the following Questions What is installed in the environment? What is supposed to be installed? Who is using the Software? How much are they using it? Are they supposed to be using it? How are they using it? Can they prove they re allowed to use it? 41

42 Why SAM? Software is an Asset - needs Management Cost Savings Through Standardisation, Volume licensing Reducing Redundancy, Streamlined Operations Risk Management Streamlined Operations Good Governance Reduce business, reputational and legal risks Trouble free Software, peace of mind Better compliance, Good IT Governance Disaster Protection Updated inventory, offsite backups 42

43 Steps to SAM Take Inventory Get organised Policies & Standards Software acquisition Software storage Software Implementation, Use Software Retirement Maintenance 43

44 Inventorisation Make an inventory by viewing the Add/Remove Programs list PC serial number: Inventory date: Department/ Business Unit: PC used by: Employee ID number or position: Employee telephone extension: Software Installations: Publisher Software Title Version Number Number of Installations As suggested by Microsoft 44

45 System Software Acquisition Business, functional and technical needs and specifications Cost and benefit(s) Obsolescence Compatibility with existing systems Security Demands on existing staff Training and hiring requirements Future growth needs Impact on system and the network performance 45

46 System Software Implementation System Software Implementation System Software Change Control Procedures Software Licensing Issues 46

47 Maintain Proof of ownership The global piracy rate for PC software hovers at 42 percent. Proof of ownership When we acquire software, it's important to keep the following: Software License Terms -End User License Agreement (EULA) Certificate of Authenticity (COA) Original media and manuals Purchase invoice and/or receipt 47

48 Application Software Acquisition Considerations Compatibility Reliability Benchmarks Version Support 48

49 Application Software Development Requirement Definition Maintenance Post Implementation Review Changeover & Implementation Requirement Analysis Coding Design Testing 49

50 What is an Endpoint An endpoint device is an Internet-capable computer hardware device on a TCP/IP network. Where an information stream is generated or ends. Could be a: Computer Laptops smart phones Thin clients, POS terminals etc. 50

51 Endpoint Management In any distributed Environment endpoints need to be deployed, configured, patched, secured and supported. Endpoint Management Solutions encompass Patch Delivery Inventory Software distribution OS deployment Remote control capabilities Provide Visibility into the state of endpoints to support 51

52 Why End Point Management Analyse vulnerabilities (patched or insecure configurations) Easily and automatically remediate all the networked endpoints Establish and enforce configuration policies across the endpoints Distribute and update software packages View, modify, and audit properties of the endpoints 52

53 Benefits of End Point Management Cross platform support Understanding what we have and where it is Centralised management for greater control Standardised systems to drive consistency Simplify compliance Improve service levels Optimised client and server software assets Measured and improved IT performance Automated IT processes Enables end user self-service Simplified software license audits 53

54 What is Digital Rights Management (DRM) Technologies and systems that prevent users doing thing with content that the content provider does not want Removes usage control from the person in possession of digital content > Computer program 54

55 Why DRM To protect the property rights of an enterprise s assets To establish the awareness of Intellectual Property Rights (IPR) in society. 55

56 Digital Rights Management Digital Rights Management is the process of defining, tracking and enforcing permissions and conditions through electronic means and throughout the content lifecycle. DIGITAL CONTENT CREATION DISTRIBUTI ON STORAGE RETRIEVAL USE DISPOSAL 56

57 Where is DRM used? E-book server restricts copying of material Software on DVD restricts copying of content not more than twice 57

58 Auditing Software 58

59 Auditing System Software Acquisition Review system software selection procedures As per I S requirements and business plan. Same selection criteria applied to all acquisitions Review cost/benefit analysis Total Cost of Ownership considered while deciding. Impact on data security. Financial stability of the vendor s operations 59

60 Auditing System Software Review controls over the installation of changed system software Changes should be scheduled when they least impact routine working Fall-back or restoration procedures in place, on production failure. Review Configuration Management Review of the pre-defined/default user accounts Review of Services enabled as per business requirements Review of Resources which are accessible by default by all users Review of Procedures for controlling application of patches Whether Admin/Super User accounts accessed through a secured access control mechanism? At a PC level, whether a personal firewall enabled? 60

61 Auditing System Software Review system software maintenance activities Whether changes made to the system software documented. Vendor support for Current versions of the software Whether Vendor s maintenance activities are logged. Review systems documentation Parameter tables. Activity logs/reports. 61

62 Auditing System Software Review authorisation documentation to determine whether: Changes to access authorisation documented. Attempted violation reported and follow-up Review system software security to determine whether: Circumvention of logical security access control restricted. Vendor-supplied installation passwords changed during installation 62

63 We have learnt about Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management Digital Rights Management 63

64 References Ralph M. Stair, George W. Reynolds, Principles of Information Systems, Cengage Learning IT Asset Management. Net BSA.org 64

65 Systems Software Thank You 65

Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA

Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA Introduction to Information System Layers and Hardware Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA 1 Information System Layers Learning Objectives Task Statements

More information

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

Chapter 12. Development Tools for Microcontroller Applications

Chapter 12. Development Tools for Microcontroller Applications Chapter 12 Development Tools for Microcontroller Applications Lesson 01 Software Development Process and Development Tools Step 1: Development Phases Analysis Design Implementation Phase 1 Phase 2 Phase

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

xassets Hosted Services Microsoft SAM Assist Audits with xassets

xassets Hosted Services Microsoft SAM Assist Audits with xassets xassets Hosted Services Microsoft SAM Assist Audits with xassets 2007-2010 xassets.com Limited Introduction... 2 Preparation... 2 Implementation... 3 Execution of Discovery... 3 Reporting Phase... 3 Information

More information

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000 Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Symantec Asset Management Suite 7.5 powered by Altiris technology

Symantec Asset Management Suite 7.5 powered by Altiris technology Symantec Asset Management Suite 7.5 powered by Altiris technology Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

System Center Configuration Manager Overview

System Center Configuration Manager Overview System Center Configuration Manager Overview This document provides some background information on the Microsoft Systems Center Configuration Manager (SCCM) system, which has been selected for use as an

More information

www.cadline.co.uk www.midastechnology.co.uk Page 1 of 5

www.cadline.co.uk www.midastechnology.co.uk Page 1 of 5 Page 1 of 5 Support Are you confident that you have all eventualities covered and that your current IT support provider can handle all of your issues? Are you frustrated with your application supplier

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Table of Contents. Cisco Cisco VPN Client FAQ

Table of Contents. Cisco Cisco VPN Client FAQ Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known

More information

GLOSSARY OF TECHNICAL TERMS

GLOSSARY OF TECHNICAL TERMS This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond

More information

Application Security Policy

Application Security Policy Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating

More information

SUMMIT ASSET MANAGEMENT DATASHEET

SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony SUMMIT,

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

Computers: Tools for an Information Age

Computers: Tools for an Information Age Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer

More information

Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are

Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are Session 07 Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are connected to computer and provide good environment

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Chapter 5: Operating Systems Part 1

Chapter 5: Operating Systems Part 1 Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

Preparing a SQL Server for EmpowerID installation

Preparing a SQL Server for EmpowerID installation Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search

More information

Multi-core Programming System Overview

Multi-core Programming System Overview Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,

More information

Client Hardware and Infrastructure Suggested Best Practices

Client Hardware and Infrastructure Suggested Best Practices Client Hardware and Infrastructure Suggested Best Practices While it is the responsibility of our Clients to support their hardware and infrastructure, the Pretty Good Practices below are provided for

More information

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Disable Redundant Windows XP Services which are Hogging Your RAM

Disable Redundant Windows XP Services which are Hogging Your RAM X P Services Optimisation X 36/1 Disable Redundant Windows XP Services which are Hogging Your RAM With the information in this article you can: Configure your Windows XP Services for top performance Identify

More information

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Chapter 6, The Operating System Machine Level

Chapter 6, The Operating System Machine Level Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General

More information

GLOSSARY OF TECHNICAL TERMS

GLOSSARY OF TECHNICAL TERMS This glossary contains explanations of certain terms, definitions and abbreviations used in this document in connection with our Group and our business. The terms and their meanings may not correspond

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

White Paper. Managed IT Services as a Business Solution

White Paper. Managed IT Services as a Business Solution White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

FUNCTIONAL OVERVIEW www.amdosoft.com

FUNCTIONAL OVERVIEW www.amdosoft.com Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information