Block-4
Block-4
Maintenance of
Systems
UNIT 11 IMPLEMENTATION AND
MAINTENANCE OF SYSTEMS
Structure
11.0 Introduction
11.1 Objectives
11.2 Implementation of Systems
11.2.1 Conducting System Tests
11.2.2 Preparing Conversion Plan
11.2.3 Installing Database
11.2.4 Training the End Users
11.2.5 Preparing User Manual
11.2.6 Converting to the New System
11.3 Maintenance of Systems
11.3.1 Different Maintenance Activities
11.3.2 Issues Involved in Maintenance
11.4 Summary
11.5 Solutions/Answers
11.6 Further Readings
11.0 INTRODUCTION
Implementation and Maintenance of System brings the SDLC life cycle to an end.
After the design phase is over, actual writing of computer program as per the design
specification and testing the system as a single entity called system testing which
actually differs from the unit and module testing carried out during program
development stage is carried out. A detailed conversion plan is the design to change
over from the existing system to the new system. A properly designed conversion
plan ensures a smooth transition to the new system. Database is designed, created and
installed by using the existing data from the old system or by creating data manually.
Appropriate training of the end user is important as the success of any system
depends on the involvement of end user who is actually going to use the system. A
comprehensive user manual is prepared outlining the procedural things to use the
system. Actual conversion to the new system can be either in phased manner or in
just one instance depending on the situation. Maintenance of the system after
implementation is a major activity considering the total life of a software product.
Maintenance is important to make the system current and relevant in a changing
organizational environment.
11.1 OBJECTIVES
After going through this unit, you should be able to:
5
Implementation and
Security of Systems &
MIS coding, testing and creating the necessary hardware and network environment, and
imparts training to the end users. Of course, apart from Coding and Testing, the
running implementation activities differ from project to project. This phase of the
software development requires intensive user involvement.
The objective of any testing mechanism is to discover and fix bugs before the product
is delivered to the customer. A good testing scheme has a high probability of
discovering an undiscovered error. The objective of any good testing scheme is to
find and fix bugs with minimum time and resources. Besides, bugs and errors systems
are tested for response time, volume of transactions that can be handled, stress under
which it can function, security and usability. For an Online Transaction Processing
System, testing of the system for response time could be quite vital.
System testing assumes that all parts of the system are correct and error-free. Even
though the system has been tested for individual components and modules, there is no
guarantee that the system after integration will work as per the desired specification.
System test involves a holistic approach for testing the working of the application in
totality.
Security Testing: System used for processing sensitive information are prone to
high security risks. Individual often tries to access unauthorized data for various
reasons. Threats could be external or internal. Hacking of passwords is a common
problem. Individual can use software to generate random passwords to gain access of
the system. Security testing takes care of these aspects of the system security.
Stress Testing: Stress test is designed to test the system as to how the system
behaves in abnormal situation. The aim of the stress test is to find the limit of
quantity or frequency of input after which the system fails. Stress test cases are
designed which require maximum memory and other resources; in excess of what a
normal situation demands.
Usability and Documentation Testing: Testing is done to review the usability and
user friendliness of the software. Most often, systems are provided with on-line help
6
Implementation and
Maintenance of
screen to help the end user. This also includes whether proper care had been taken to Systems
document the development stage of the project. User friendliness of the system is
often compromised, which may lead to problem during implementation and
maintenance of the system.
The following are the various activities involved during system testing:
Preparation of Test Plan: The first step in system testing is to prepare a document
called a Test Plan. Test plan is a document which outlines the aspect of the system to
be tested. A workable Test Plan is prepared in accordance with the design
specification such as –
Preparation of Test data for Testing: Test data are often generated during testing
of program. The test data must be true representative of the live data to be actually
used by the end users after installation. Care should be taken to select the nature and
volume of data.
Although enough care is taken to test the system as per the documented specification,
it is almost always a confusion regarding how the user will use the end product. In
case there is one customer (a specific application designed for a specific use), a series
of acceptance tests are carried out to validate all the user requirements. But this is not
possible if the software is to be used by many customers (general purpose software
like word processor, etc.). An alternate approach is application of Alpha and Beta
testing techniques.
Alpha Testing: Alpha testing is carried out by the customer at the developers’ site.
The customer uses the software and records the errors/bugs and usage problem.
Alpha testing is carried out in a controlled environment.
Beta Testing: Beta testing is carried out at one or more customer sites by the end
users. It is live testing of the software product and not controlled by the developer.
The customer tests the software using her/his own data records and reports the bugs
or problems in regular intervals to the developer.
Many organizations deploy specially trained personnel for system testing. The
problems of bugs uncovered in alpha and beta testing are fixed before the product is
shipped and installed in customer’s premises. Testing of complex software can be
time consuming and frustrating also. The aim of system testing is to uncover every
possible error that may come up at the user end. The role of Data Processing Auditor
(EDP auditors)/Information System Auditor is quite involved during all stages of
system development especially during testing. Auditors can provide useful
independent inputs to minimize complications during maintenance.
7
Implementation and
Security of Systems &
MIS
11.2.2 Preparing Conversion Plan
A conversion plan is a document which spells out detailed requirements for a
successful conversion from existing system to proposed system. The complexity of
conversion is directly proportional to the complexity of the system in question. An
important role of Systems Analyst is to see that the newly designed system is
implemented to the set specification. Conversion is just one aspect of
implementation, other being software maintenance and system review.
A proper conversion plan ensures that conversion from old system to new system is
smooth without affecting the normal business operation. The conversion process can
be tedious and disrupt normal functioning of system and also involves financial and
human resources. A well designed conversion plan facilitates a smooth switch over to
the new system while keeping the cost and human involvement to the minimum.
• Guidelines regarding Conversion processes involved and the roles of end user.
• Planning conversion of files, creation of computer compatible files.
• Types of conversion to be undertaken depending on the existing types of system.
It could be from an existing manual system to a newly designed system or from
an existing old computerized system to a newly designed enhanced system.
• Types of conversion may be parallel, phased or direct.
• Evaluation of hardware, software and related services.
• Entering the data into the system. Generating the required reports.
• Basic training of computers not specific to the application program like copying a
file, starting and shutting down system, etc.
• Briefing about Hardware and Software concepts.
• Reporting non compliance and bugs in the program? Process of taking backup of
daily work.
8
Implementation and
Maintenance of
There is no exhaustive list of training requirement of the end user and can vary Systems
depending on the nature of application. The training must be scheduled in logical
sequence depending on the pre-requisite for the next module of the training. A
dependency chart could be useful for this purpose.
• Computer-aided training
• Classroom tutorial
• Interactive training manual
• Resident technical expert
• One to one training
• External sources
• Information center / help desk
9
Implementation and
Security of Systems &
MIS utilized in user environments due to their convenience. Context sensitive helps are
making the users’ life easy by reducing the time to browse the bulky documents.
• Direct Conversion: This is abrupt approach. The old system is shutdown and
the new system starts. This kind of conversion although economical, the users are
at the mercy of the new system, hence direct installation can be very risky. Some
times due to procedural reasons where two systems can’t be run parallel, this kind
of conversion is the only option. When the new system fails, there is no way to
start the old system as a backup as it has been shutdown. This kind of conversion
plan is often the least preferred for critical business applications.
• Pilot Conversion: This is the middle path approach. Instead of converting all at
once throughout the organization, this kind of pilot installation involves
conversion/installation of system at a single pre-decided location. The location
may be a branch office of the organization. Proper selection of the pilot site is
important as it should be able to perform a true conversion process to test all
functionalities of the new system. The advantage of the pilot conversion is that
the potential risk in case of failure of the system is limited to a single location.
Once the user is ascertained that the implementation of the system has been
successful in a particular location, it is proposed to replicate the system in other
locations. Although this kind of pilot conversion plan is beneficial for the user, it
places a substantial burden on the implementation team as it has to maintain two
systems in parallel.
• Parallel Conversion: is least risk prone. Under this kind of conversion, the old
system is allowed to run alongside the new system until the management and the
end user are satisfied with the result of the new system. It is compared with the
new system to test whether the functionalities covered by the old system are
thoroughly covered in the new system by comparing the outputs. Errors and bugs
identified with the new system are not detrimental for normal functioning of the
organization as the new system is replaced and normal functions are resumed by
the old system. Parallel conversion is costly as two systems are run in parallel,
but results of only one system are used for business operations.
2. …………. is nothing but creating computer readable files from the existing
systems/documents.
10
Implementation and
Maintenance of
Systems
11.3 MAINTENANCE OF SYSTEMS
Once the information system is successfully installed and started showing result, the
next issue is to maintain the system. System maintenance involves more than 80% of
the total life of a software product; this shows the importance of maintenance. System
maintenance is the task of monitoring, evaluating and modifying the information
system to make necessary desirable changes during the total life cycle of the
software. Organizational requirements as perceived during the analysis phase
changes, the system has to accommodate all such changes to make the system current
and useful for the organization. Maintenance of system also takes care of the failure
and shortcomings that arise during the operation of the information system by the end
user. During the implementation phase, one person from the system maintenance
group is nominated to collect information from the user for maintenances.
Maintenance activity involves collecting requests for changes, transforming these
requests to changes, designing the changes to be incorporated and implementing the
changes in the system.
• Help Desk: The problem is received from the user through a formal change
request. A preliminary analysis of the change request will be done, and if the
problem is sensible, it is accepted.
• Release: The changes are released to the customer, with a release note and
appropriate documentation giving details of the changes.
11
Implementation and
Security of Systems &
MIS undesirable. It does not do any value addition to the software. Care should be
taken to see that normal business operations are not disturbed because of it.
75% Corrective
Maintenance
Adaptive Maintenance,
Perfective Maintenance 25%
and Preventive
Maintenance
Figure 11.1 depicts the maintenance efforts that are to be put during each
maintenance activity.
11.3.2 Issues Involved in Maintenance
The responsibility of the software development team and clients does not end once
the product is released for implementation and installed. If software is not properly
maintained, a well-documented and cleanly designed system can decay into a poorly
documented and ill-maintained system. Additional venerability may get introduced
during the activity of maintenance. In a network environment, a bug has ramification
beyond just poor performance or functionalities. A bug can open up avenue for a
hostile intruder.
It is very important that the Software should be easily maintainable. Factors like
availability of source code, availability of system manuals, etc., are very important
for maintainability. One of the most important issues is the cost factor for
maintenance of software. There are a number of factors that influence the cost of
maintenance. Maintenance activity may some times introduce new bugs while
rectifying it.
12
Implementation and
Maintenance of
The following are various factors which affect the ease of maintenance: Systems
• Volume of Defects: The inherent errors / bugs that are found in the system after
installation. Cost of maintenance increases with the increase in volume of defects.
• Number of Customers: More number of customers means more requests for
changes in the system after installation.
• Availability of System Documentation: The quality and availability of system
documentation is vital to carry out the maintenance. Poorly written system
documentation increases the cost of maintenance. Most often, the programmers
for development are different than the team of programmers for maintenance and
the later often finds it difficult to understand a program written by the former.
Structured programming and program documentations are very useful in
maintaining the system
2. Process Issues
3. Technical Issues
How to construct software that it is easy to comprehend is a major issue and the
technology to do this is still not available. Still, the following are some guidelines
for the same:
Legacy System
A legacy system is typically a very old and large system which has been modified
heavily since it started operation. Legacy systems are based on old technology with
very little or no documentation. Dealing with a legacy system can be very hard.
13
Implementation and
Security of Systems &
MIS
Check Your Progress 3
1. At …………, the problem is received from the user through a formal change
request, a preliminary analysis is done, and if the request is sensible, it is
accepted.
3. A …………., is typically a very old and large system which has been modified
heavily since it started operation.
11.4 SUMMARY
Implementation of system involves coding, testing installation and user training.
System design specifications are converted to computer programs and database
structures are created. The programs are tested using a code walk through and by
creating different test scenarios. System testing is testing of the software in its totality
after individual modules had been tested. Different conversion plans are discussed
like software and hardware installation etc. Installation of a system is usually moving
from old system to a new system. Different methodology is adopted for conversion/
installation like direct conversion, parallel conversion, phased conversion, single
location conversion. User documentation is a written document of visual and textual
information about the application and how to use it. Well-designed user
documentation can reduce training cost of the organization. Training of user is vital
for success of any system. Training should be conducted after any significant changes
are made to the system
11.5 SOLUTIONS/ANSWERS
Check Your Progress 1
1. Test Plan
2. Stress Test
3. Beta Testing
14
Implementation and
Maintenance of
Systems
11.6 FURTHER READINGS
Joey George, J. Hoffer and Joseph Valacich; Modern Systems Analysis and Design,
Third Edition, 2001, Pearson Education.
Alan Dennis, Barbara Haley Wixom; Systems Analysis and Design, 2002, John Wiley
& Sons.
Reference Websites
http://www.rspa.com
http://www.dur.ac.uk/csm/jsm
15
Implementation and
Security of Systems & UNIT 12 AUDIT AND SECURITY OF COMPUTER
MIS SYSTEMS
Structure
12.0 Introduction
12.1 Objectives
12.2 Definition of Audit
12.2.1 Objectives of Audit
12.2.2 Responsibility and Authority of the System Auditor
12.2.3 Confidentiality
12.2.4 Audit Planning
12.3 Audit of Transactions on Computer
12.3.1 Transaction Audit
12.3.2 Audit of Computer Security
12.3.3 Audit of Application
12.3.4 Benefits of Audit
12.4 Computer Assisted Audit Techniques
12.4.1 Audit Software
12.4.2 Test Data
12.4.3 Audit Expert Systems
12.4.4 Audit Trail
12.5 Computer System and Security issues
12.5.1 Analysis of Threats and Risks
12.5.2 Recovering from Disasters
12.5.3 Planning the contingencies
12.5.4 Viruses
12.6 Concurrent Audit Techniques
12.6.1 Need for Concurrent Audit Techniques
12.6.2 An Integrated Test Facility Techniques
12.6.3 The Snapshot Technique
12.6.4 SCARF
12.6.5 Continuous and Intermittent Simulation Technique
12.7 Summary
12.8 Solutions/Answers
12.9 Further Readings
12.0 INTRODUCTION
Every business process can experience events that can hamper and in some cases may
stop normal operations of business. Even best designed system can’t control the
prevention of natural disaster. In today’s ever-changing world of information
assurance and network security, it can become extremely difficult to keep up on the
latest vulnerabilities, viruses, patches, trends, technology, hacker behaviors and
activity. It’s easy for the information systems security professional to get caught up in
attending the logical aspects of security such as reviewing log files, making
configuration changes, troubleshooting, and other technical duties.
12.1 OBJECTIVES
After going through this unit, you should be able to:
Is auditors are those people who make it sure that the system does what it is supposed
to do. Although the audit can be carried out by the internal team of IT professionals, it
is advisable that the audit is carried out by external auditors as they are neither
stakeholders nor friendly with the stakeholders. Above all there is nothing like an
unbiased opinion.
• To improve the quality of information systems, prevent failure and minimize the
effects of failure, and speed up the process of recovery in the event of a failure.
This will help Information System to be more reliable.
• To make an information system more secure from natural as well as manmade
disasters, unauthorized access, and other destructive actions.
• To improve the cost performance of an information system by optimum utilization
of its resources, which leads to increase in efficiency.
During the course of audit, the Information Systems Auditor will obtain sufficient,
reliable, relevant and useful evidence to achieve the audit objectives effectively. The
audit findings and conclusions are to be supported by appropriate analysis and
interpretation of this evidence.
To achieve the above objective, the following documents should be made available to
the auditors A diagram of the Information System (Application)
1. Network diagram
2. A hierarchical diagram of the project team
The system auditor shall firmly maintain professional ethics as an impartial evaluator.
The system auditor shall be aware of the ethical demands on himself or herself and
meet the internal and external trust by performing an accurate and sincere system
audit.
17
Implementation and 12.2.3 Confidentiality
Security of Systems &
MIS The system auditor with strict adherence to professional ethics must maintain
confidentiality of the information provided to him to carryout his or her activity and
should not, without sufficient reason, divulge any information that is classified as
confidential information by the audited organization.
Audit of broken links: This is applicable to web site and other intranet applications.
The most irritating things on a web site is not finding a link document. There are
automated software to find broken/unavailable links on web site.
Database Audit: Database audits involve checking the database integrity and
availability. The information that is sent to the database should be checked with the
information actually stored on the database.
Control environment: This includes reviewing the system’s security, its operating
platform, system documentation and the interaction it has with other systems.
Data Input Controls: This involves reviewing the controls which ensure that data
that enters into the system is accurate, complete and valid as per the standard.
Examples include verifying system tables, limit checks, range checks and redundant
data checks.
Processing Controls: These controls ensure that the data is properly processed and
that automatic calculations performed by the system are accurate. This is tested by
assessing controls built into the programs and by processing test data through the
system and comparing the results of processing with expected results. Also, there will
be checks on currency of stored data, default values and reporting exceptions.
Output Controls: In this, review of the system generated reports to ensure that they
are accurate and the reports produced are reliable, timely and relevant is done. Also, it
is checked whether cost savings can be achieved by reducing the number of reports
produced. Data control personnel perform visual review of computer output and
reconciliation of totals.
c) Utility tools: Used by the auditors to perform common data processing functions
like sorting, creating and printing files. These tools are not designed for audit
purposes specifically.
Various commercial Audit Software are available to carry out System Audit. Some of
them are:
1. Visual Audit Pro
2. IDEA
3. E-Z Audit
Visual Audit Pro: It audits automatically over a network. It audits activities like, use
log on/off, collects information about software and its version, collects information
about hardware inventory like serial number, model, memory and associated
peripheral devices, user information, registry information etc.
E-Z Audit: With this software one can know information on capacity of RAM, name
of network card with its connect speed, MAC address and TCP/IP information. You
can also find out how many local, removeable and network drives are there on the
system, what printers are connected, both networked and local, etc.. On software
front, it gives information on name and version of OS running on the system with
service packs, installed programs and their names, EXE files and DLL versions.
IDEA (Interactive Data Extraction and Analysis): IDEA can be used to import
information from database to be audited for further analysis to auditor. It helps to
corroborate audit evidence effectively. For example it can check for duplicate
payment on a single invoice. It is useful to analyze system log for fraud detection.
Consider the audit of a Payroll Package. The potential fraud that can occur in a payroll
system is very high. Therefore, audit software is used as detection tool for fraud. The
Audit software looks for salary unusually high, extracting information without a
department number, extract information on bank account number. It also can extract
information on fictitious employee, compare it with personnel database. It can also
compare payment details of two different months.
20
12.4.2 Test Data Audit and Security of
Computer Systems
Test data is used to test the correctness of the software. When test data is processed
with the entity’s normal processing systems, the auditors should ensure that the test
transactions are subsequently eliminated from the system. When using the test data,
the IS auditors should be aware that the test data should only point out the erroneous
processing and should not change the data that is produced by the system during real
life.
System log should be analyzed to provide detailed information on all normal and
abnormal transactions during each processing period. System access and attempted
access violations can be automatically logged by the computer and can be reported for
check & review. Listing of terminal addresses and locations can be used to look for
incorrectly logged, missing or additional terminals.
Applying the principles of Information System Security and Audit raised in this write-
up will ensure that an organization’s information assets and systems are adequately
controlled, monitored and assessed.
Create
Business process
Information system
Exploit Reduce
Vulnerability Attacks Controls
The source of threats can be either external or internal. Historically virus has been the
major potential external security threat but as organizations are diversifying their
activity over multiple locations and with evolution of new technology it is difficult to
perceive when an unauthorized intruder may try to hack upon organization’s vital
information and cause damage. Internal security threats are more common although
the integrity of employee is checked before being inducted into the organization.
Employee of an organization can pose serious threats to information security as they
are closely associated with the system and know the vulnerabilities that can be
targeted.
Risk Analysis
The common questions asked in evaluating the risks are given below.
• Are the risks such as fire, earthquakes and the scope of their effects on the
information system been made clear?
22
• Has the loss, the organization would suffer from a halt or the like of the Audit and Security of
information system been analyzed? Computer Systems
• Is the time permissible for recovery of operation and the order of priority of
recovery been determined?
It is therefore possible to rank the events in order of estimated loss. But the problem
associated with the quantitative approach is estimating the probability of occurrence
of the event, also in some cases the events are interrelated making the probability
calculation even more difficult. Notwithstanding above difficulty, many organizations
have adopted and implemented this approach successfully.
Potential threats
• Denial of service (DoS), which can be described as any action that prevent a
system from normal operation. It may be the unauthorized destruction,
modification, or delay of service. DoS is common where the number of requests
outnumber the maximum number of connections possible. Under such
circumstances, legitimate users have to wait for large amount of time for response
to their request.
• Internet Protocol (IP) spoofing, which allows an intruder via the Internet/intranet
to effectively impersonate a local system's IP address in an attempt to gain access
to the system. The system in this case may misinterpret the incoming connection
as originating from a trusted host.
• A Trojan horse program generally performs unintended destructive functions that
may include destroying data, collecting invalid or falsifying data. Trojan horses
can be attached to e-mails.
24
• Viruses are computer programs that may be embedded in other program and have Audit and Security of
the capability to self-replicate. Once active, they may result in either Computer Systems
nondestructive or destructive invalid outcomes in the host computer. The virus
program may also move into multiple platforms, data files, or devices on a system
and spread through multiple systems in a network or through emails to other
systems.
Contingency and emergency plans establish recovery procedures that address specific
threats. These plans help prevent minor incidents from escalating into disasters. For
example, a contingency plan might provide a set of procedures that define the
condition and response required to return a computing capability to nominal operation.
An emergency plan might be a specific procedure for shutting down equipment in the
event of a fire or for evacuating a facility in the event of an earthquake.
In-House Backup
This level is the minimum acceptable and is mandatory for all installations and
application’s systems. Define in detail all in-house back up procedures, the techniques
used, files copied, frequency, etc.
The alternate storage area should be located in an area reasonably accessible to the
installation, but not subject to the same degree of major threat as the site. It is
recommended that, as a rule of thumb, the alternate storage area be no closer than one
mile from the site. However, the distance may vary from location to location.
25
Implementation and Although they vary from organization to organization, they generally comprise the
Security of Systems & following:
MIS
• A contingency audit questionnaire
• A dependency analysis document - questions and guidance
• A Business Impact Analysis questionnaire.
• An audit questionnaire for disaster recovery or business continuity plan
• A checklist, action list and framework for disaster recovery
The toolkit is designed to help review the full spectrum of business continuity and
disaster recovery issues.
The very first step for contingency planning is to identify the contingency events
covered and the appropriate actions for each. Contingency events usually refer to
varying degrees of loss across six major asset categories: Data, Software,
Communications, Hardware, Personnel, and Facility. The cause of the loss is dealt
with in the Risk assessment, the primary concern in the contingency plan is the degree
of loss, impact on the mission and techniques for coping.
Contingency Events
Loss of Data: To Identify key data and the type or degree of loss/damage that would
be required for necessary recovery action. It can be done as follows:
Loss of Software: To identify key software and the degree of criticality for necessary
recovery action. It can be done as follows:
Loss of Personnel: Loss of Personnel can result from employee leaving the
organization, illness, death, family emergency and a number of other events. The
following steps can be taken to minimize this type of loss:
Loss of the Facility: The loss of facility in general is due to some catastrophic
natural action such as fire, flood, storm, earthquake, etc. However, a facility may
become non-functional temporarily due to failure of power, or any other events that
could render the facility non-functional.
Preparing contingency plan involves people from all activities. The people should
understand their role in the event of disaster and should be ready to react to the
situation. Following are the major step involved in contingency planning :
Develop the Plan: The contingency plan is a detailed milestone to move the
organization from a disrupted status to the status of normal operation. The role and
responsibility of each employee and service provider are defined clearly in the event
of disaster.
Testing the Plan: Once the plan is ready, it should be subjected to rigorous testing
and evaluation. The plan should be initially tested in a simulated environment.
Persons who would actually be involved in the event of a real disaster should test the
plan.
Maintaining the Plan: Once the plan is created and tested it must be kept updated so
that it remain relevant and applicable to changed business environment. The changes
27
Implementation and in the business process must be reflected in the plan and all changes in it should be
Security of Systems & communicated to all concerned.
MIS
12.5.4 Viruses
Viruses are one of the major security threats to computer system. The first computer
viruses were written in mid-eighties. The first virus written was a boot sector virus.
Today, there are several tens of thousands of viruses.
Computer virus is nothing but a program that is loaded into your computer without
your knowledge. This is only basic information . But, what makes people fear from
Virus is the disastrous impact on remaining programs in your machine due to this
program. The difference between a computer virus and other programs is that viruses
are designed to self-replicate usually without the knowledge of the user. Computer
viruses are called viruses because they share some of the traits of biological virus. A
computer virus passes from computer to computer like a biological virus passes from
person to person. A computer virus must piggyback on top of some other program or
document in order to get executed. Once it is running, it is then able to infect other
programs or documents. Obviously, the analogy between computer and biological
viruses seems superficial, but, there are enough similarities as the name suggest.
Virus carries out instruction for replication. The effect of virus can vary from
annoying messages, to the disastrous consequences (for example, the CIH virus,
which attempts to overwrite the Flash BIOS, can cause irreparable damage to certain
machines). Superficially, it looks as if virus which can format hard disk is more
damaging but damage can be avoided by taking backups. Think of a virus which
corrupts data by changing the numbers randomly on a spreadsheet application or
changes + to –. This is certainly disastrous.
Viruses can be hidden in programs available on floppy disks or CDs, hidden in email
attachments or in material downloaded from the web. If the virus has no obvious
payload, a user without anti-virus software may not even be aware that a computer is
infected.
A computer that has an active copy of a virus on its machine is considered infected.
The way in which a virus becomes active depends on how the virus has been
designed, e.g. macro viruses can become active if the user simply opens, closes or
saves an infected document.
Prevention
The best way for users to protect themselves against viruses is to apply the following
anti-virus measures:
• Make backups of all software (including operating systems). So,if a virus attack
has been made, you can retrieve safe copies of your files and software.
• Inform all users that the risk of infection grows exponentially when people
exchange floppy disks, download web material or open email attachments without
caution.
• Have anti-virus (AV) software installed and updated regularly to detect, report
and disinfect viruses.
• Visit sites which give information on the Internet about latest virus, it’s behavior
and assess their potential threat.
• In case of doubt about a suspicious item that anti-virus software does not
recognize, contact your anti-virus team immediately for guidance.
28
Audit and Security of
12.6 CONCURRENT AUDIT TECHNIQUES Computer Systems
Most of the Audit techniques collect data after transaction is completed. So, the
outcome of the Audit is usually useful only for the future. The outcomes may be used
as precautionary measures for the future.
In the case of Concurrent Audit Techniques, Data is collected while the transaction is
in progress. This is very much useful for high risk transactions as they will be put on
hold in case the Audit desires so. If any other Audit technique is used, then , such high
risk transactions are processed after which it will be found that these transactions are
invalid.
12.6.4 SCARF
It stands for System Control Audit Review File. It is one of the complex Audit
techniques. This technique will embed Audit software in the host application. This will
enable audit software to monitor the Systems transactions uninterruptedly. The
information that is collected during Audit process will be stored in a special audit file
known as SCARF master file.
12.7 SUMMARY
Auditing IT system is a crucial activity to provide feedback to the system. The process
of audit the report can be a food-for-thought for improving the information system. It
is surprising that only very few companies take this activity seriously. Audits not only
bring out the potentially weak areas in a system but also provide inputs for future
improvement. It also helps in improving business efficiency.
12.8 SOLUTIONS/ANSWERS
Check Your Progress 1
1. Improvement of Reliability, Security and Efficiency of Information Systems
2. Information System Auditors
3. Computer Assisted Audit Techniques
James F.Peters and Witold Pedryez; John Wiley & Sons; Software Engineering-An
Engineering Approach;2000
Reference Websites
http://www.contingency-planning-disaster-recovery-guide.co.uk
http://www.disasterrecoveryworld.com
30
Management Information
Systems
13.1 INTRODUCTION
There are many kinds of Information Systems in the real world which use hardware,
software and the people to transform data to meaningful information for business
needs and decision-making. Every business process relies on information for day-to-
day activities and decision-making. Management Information System have been
playing a key role in helping the managers at various levels of business functions for
decision-making. In early days of business information system, data processing is
used to generate various day to day reports. In today’s world, as business is operating
in a more varied and complex environment, managers have realized the need for
specialized computer-based information systems for special activities and business
needs. Keeping this in view, various types of Business Information Systems have
evolved over time such as Transaction Processing Systems, Management
Information Systems, Decision Support Systems and Expert Systems.
13.2 OBJECTIVES
After going through this unit, you should be able to:
31
Implementation and
Security of Systems &
MIS Management Information Systems can help a business in that they contain important
information about a particular client or event that takes place in the organization or
the environment surrounding it. MIS is not as important for smaller organizations as
it is for the larger corporations. The smaller locally run businesses are run usually by
owners who rarely need instant access of information that larger companies require.
Large corporates with varied product lines definitely can’t do without a computer
based MIS in order to survive and keep pace with competitors.
For example, an organization may use MIS to keep track of inventory, evaluate sales
trend of different products, keep information about client and employees, etc.
• Management control: Information for short term planning (few weeks and
months). Information is rather un-structured or semi-structured such as cash flow
statement, sales trend analysis, monthly and annual financial statements . This
type of information is used by mid-level manager for planning and control of
organizational sub-units. Example : Sales trend figure in different regions of the
country for product. Managers can carryout what if analysis like effect of price on
sales figure, effect of cut on advertisement on sales.
33
Implementation and
Security of Systems &
MIS various business transactions. A transaction processing system records and processes
data resulting from business transaction. Transactions are events that occur as a result
of business operations like transfer of money from one account to another account,
purchase of items, etc. Transactions are basically a series of related operations that
must all succeed or fail as a group. A single transaction of withdrawing money from
a bank account actually involves two operations are a debit to an account and credit
to another account. Transactions processing system allows the two operations to
group into a single transaction. When both the operations are successfully completed,
then the transaction is said to be complete. TPS can be classified into the category of
Operation information system. Example can be Sales Transaction Processing System.
These systems are transaction intensive and results of such transaction processing are
used to update various databases like customer databases, inventory databases and
accounts receivable databases. Transaction Processing Systems are also used to
make day to day decisions that control operational processes.
• Data is captured from documents or business operation and input into the system
to record a transaction.
• Then, data is processed. That is, calculations or other logical operations are
performed for output.
• The relevant files or databases are then updated with the results. Output of a TPS
includes documents and reports.
Transaction
Business operation Transaction
processing
document
System
To save time, storage space, and reduce errors of data entry, it is desirable to capture
the information electronically at its point of origin, i.e. from the point of sales
terminal (POS). This is referred to as source data automation. Rarely, non-
conventional methods are used to facilitate data entry. For example, in a library, the
barcode printed on the library members card can be used to capture required
information such as name of the member, address, validity date of the membership
etc. Figure 13.3 depicts a Transaction Processing System at a Library.
Barcode
Scanner
34
Management Information
Systems
Library Database
The TPS should have the ability to process work flows of a business and each state of
the business transaction can be represented by a step in the work flow. TPS captures
and processes data of every business transaction and updates the relevant files and
databases. It produces a variety of information for internal and external use.
Process
Input Transaction
Terminal/ Processing
Data entry Inquiry
• Batch
• On-line
Reports
Billing
Invoices
Database
• Data entry: Data can be captured directly from machines which consists of data
when it is entered during business transaction or the data can be directly keyed in.
Sometimes, Data is also converted to a machine-readable form by scanning.
• Transaction processing: Input data is processed basically in two ways, namely
Batch Processing or Online Processing. Table 13.2 compares the both.
35
Implementation and
Security of Systems &
MIS Process Transaction data is Transaction data is
accumulated in regular processed as and when
intervals for processing at generated by the business
a scheduled interval process
• Document and report generation: The final stage of the transaction processing
system is document generation. The collection of documents generated by the
TPS is called transaction document. Invoice generated by a POS terminal is an
example. Transaction logs are specific types of documents generated for Audit
and other control purposes. All transactions recorded on the databases are printed.
36
Management Information
Systems
Table 13.3 depicts a Sales Performance Report. Figure 13.6 depicts a Bar chart.only
Figure 13.7 depicts a Pi chart.
Sales
2000 2000 2001 2001 2002 2002
Region
Estimated Actual Estimated Actual Estimated Actual
37
Implementation and
Security of Systems &
MIS
4000
3500
3000
2500
2000
1500
1000
500
0
Turnover
Turnover
Turnover
Profit
Profit
Profit
2000 2001 2002
Turnover
Profit
Components of MIS
The bulk of information requirement of Managers at middle and top levels comes
from external non-computer sources like meeting documents, newspaper, telephonic
talk, letters, memos, etc. Corporate databases are important for day to day operations
of the organization.
External
MIS Software Database
module
Corporate
Operational
Top Executive DBMS Database
Corporate
Management
Communication
Database
software
At the same time, data from external non computer sources provides managers with
objective information that helps them to make strategic, long and near term
decisions. Various components of MIS are showed in Figure 13.8 and explained
below.
38
Management Information
Systems
External Database: External databases are databases that are not owned by the
organization and the organization pays royalty to access these databases. Examples of
these databases are: databases of Market research groups, Statistical and
Demographic organizations etc. Since organization operates in a social environment
it is influenced by various external factors. Impact of theses external factors on the
long-term goal and success of organization is very important. Top management needs
to analyse data from these sources for long term planning.
Management database: These databases store select data from corporate databases.
It generally stores summarized information for the requirements of managers.
MIS Software: This is used to extract and process information from various databases.
It acts as a user interface to the managers.
DBMS: Database Management System stores, retrieves and manages data on various
databases.
The following are the major characteristics of Decision Support Systems (DSS):
• Help decision makers to take decisions rather than replace them;
• Use underlying data and models;
• Have little or no reasoning capability;
• Are tailored to directly support decision-making styles of individual managers;
• Support interactive inquires and responses;
• Are used to aid semi-structured or unstructured decisions;
• Produce information on ad-hoc, flexible and adaptable format;
• Information is produced by analysis of operational and external data; and
• Analyses and supports comparison of specific alternative decisions.
Components of a DSS
Figure 13.9 depicts various components of a Decision Support System. They are
explained below:
Data Management System
This is a system where various activities associated with retrieval, storage, and
organization of the relevant data for the particular decision context are managed. It
also provides security functions, data integrity procedures, backup and recovery,
39
Implementation and
Security of Systems &
MIS concurrency control, and general data administration. It can be a relational, objected
oriented or any other suitable database.
Knowledge Engine
This module is responsible for activities related to problem recognition and
generation of interim or final solutions. The knowledge engine is the “brain” of the
Decision Support System. Decisions require reasoning, and less structured decisions
require more reasoning.
User Interface
This software module provides functionalities for input/output, error capturing and
reporting. A common user interface for various Decision Support Systems is not
possible as their designs vary in accordance with the environment of the organization
when they are deployed.
Types of User interface: Keyboard, Joystick, Mouse, Scanner, Voice, Pen mouse,
Touch screen, etc.
Like all information systems, issues related to the user such as training , skill ,
motivation levels are critical.
Model base
Knowledge Engine
Types of DSS
Various Decision Support Systems are Communication driven DSS, Data driven
DSS, Model driven DSS and Knowledge driven DSS. Table 13.4 draws a comparison
between MIS and DSS.
40
Management Information
Systems
2. Decision Support Systems help decision makers to take decisions rather than
………. them .
Among the best-known expert systems have been those that play chess and those
which assist in medical diagnosis such as Mycin.
Expert systems are distinct from traditional Information Systems because of two main
reasons:
Representation of Knowledge: Information is expressed in declarative form in
contrast to procedural expressions used in other types of Information Systems. Here,
knowledge is stored in a structured non-procedural way.
41
Implementation and
Security of Systems &
MIS Perform Inexact Reasoning: Reasoning – A process by which new information is
derived from a combination or combinations of existing, or previously derived,
information. In this aspect, an expert system comes closer to human mind, which is
hardly seen by traditional software. The ability to perform in exact reasoning leads to
easier decision-making because irrelevant alternatives are reasoned out before the
execution of the software.
Knowledge Base: It contains facts on a specific subject domain and rules to express
the reasoning capability of a subject expert. Knowledge Base is logically divided into
a fact base and a rule base. Knowledge means rules, heuristics (non-algorithmic),
boundaries, constraints, previous outcomes and other knowledge programmed in by
designers. A knowledge base typically incorporates definitions of factual knowledge
and rules along with control information. Knowledge base format is specific to the
implementation of the expert system software. Figure 13.11 shows the components of
knowledge base.
Knowledge base contains much of the problem solving knowledge. Rules are of the
form IF <condition> THEN <action>. Rules can be chained together (e.g., “If A then
B” “If B then C” since A B C so “If A then C”). (If it is raining, then roads
are wet. If roads are wet, then roads are slick.)
Inference Engine: Inference engine is software that provides the reasoning capability
to the expert system. It processes rules and facts to provide advice on a specific
problem. Rule based expert systems make use of two types of inferences for
reasoning by forward chaining and backward chaining. Some expert systems use
forward chaining by applying rules and facts to reach the conclusion where as others
use backward chaining methods where it is verified whether the stated conclusion can
be reached by applying the rules to the facts. The types of data processed by the
inference engine are symbolic rather than numeric or character data types processed
by other types of information systems. It usually takes the help of heuristic to solve a
problem which other wise leads to combinatorial explosion.
Inference Engine
User
Expert Knowledge
System Base
Facts Rules
Definitions, If A then X
observations and If A then Y
hypothesis else
42 Z
Knowledge Base
Management Information
Systems
An expert system starts with an interactive query session, which is directed from the
expert system to the user. In this interactive query session, expert system asks a series
of queries to the user and expects reply from the user similar to a doctor asking a
series of queries to the patients before reaching any conclusion on the diagnosis of the
disease. The user is expected to give reply to all the queries based on which the expert
system recommends a solution like human expert. The advantage of computer based
expert system is that it is unlike a human expert who is prone to environmental
condition, these systems are consistent, fast and accurate in providing expert advice. It
can also be programmed to give advice on behalf of several experts. This is the reason
why expert systems are used as knowledge based strategic information resources for
the managers in an organization. Various information systems are developed with an
expert system component built in to it. These are called expert assisted information
systems.
Expert systems must liase with people(experts) in order to gain knowledge and the
people must be specialized in the appropriate area such as Medicine, Geology and
Chemistry to name a few. Knowledge Engineer acts as an intermediary between the
specialist (human expert) and the expert system. This process of picking the brain of
an expert is a specialized form of data capture and makes use of interview techniques.
The Knowledge Engineer is also responsible for the self-consistency of the data
loaded to the expert system. Thus, a number of specific tests have to be performed to
ensure that the conclusions reached are sensible and accurate. Figure 13.12 depicts
communication between expert system, knowledge base and human expert.
Figure 13.12: Communication between Expert System, Knowledge Engineer and Human
Expert.
There are various applications for expert systems in business, engineering and
medicine. Expert systems ask the user, a series of queries and based on the feedback
from the user, deliver expert advice on the specific subject. Expert systems are used
in the field of Medical diagnosis, Sales forecasting etc. Expert Systems are being
used by managers for credit management, employees performance evaluation,
portfolio analysis and production monitoring. Although expert systems are used in
many fields, it can never replace a human expert. Expert system can provide expert
advice based on the available information and knowledge. Expert systems lack
learning capability like human being and have very limited focus area. It fails in the
areas where advice requires a broad knowledge base.
Table 13.5 draws a comparison between Decision Support Systems and Expert
Systems.
43
Implementation and
Security of Systems &
MIS 2. ……….. is logically divided into a fact base and a rule base.
13.5 SUMMARY
Information needs vary among different managers depending on their hierarchy in
the corporate ladder. Information systems are being used since their evolution for
planning and operation of the organization. Specialized information systems have
evolved for different executives at different levels.
During the initial years of evolution of MIS, Computers are mostly used for data
processing activities. Transaction Processing Systems have evolved to process data
generated from various business transactions. When the data is processed as and
when it is generated, it is called Online Transaction Processing System. Some times,
the data is processed in batch depending on the business requirement, called batch
processing system.
Expert System has been designed to give expert advice to managers in specific
domain. A series of queries are put by the expert system and based on the response
of the user, it comes out with advice. Expert systems are accurate and consistent in
providing expert advice. Expert systems are found in many applications in the field
of portfolio analysis, medicine, building regulations etc.
13.6 SOLUTIONS/ANSWERS
44
Management Information
Systems
1. Semi-structured
2. replace
3. User interface
Reference Websites
http://www.usus.cs.york.ac.uk
http://power.cba.uni.edu/isworld/dss.html
45