Kenneth C. Laudon,Jane P. Laudon Management Information System 12th Edition pdf



Download 15,21 Mb.
Pdf ko'rish
bet281/645
Sana20.01.2022
Hajmi15,21 Mb.
#393158
1   ...   277   278   279   280   281   282   283   284   ...   645
Bog'liq
Kenneth C. Laudon ( PDFDrive ) (1)

Identity

management

consists of business processes and software tools for identifying

the valid users of a system and controlling their access to system resources. It

includes policies for identifying and authorizing different categories of system

users, specifying what systems or portions of systems each user is allowed to

access, and the processes and technologies for authenticating users and

protecting their identities.

Figure 8-3 is one example of how an identity management system might cap-

ture the access rules for different levels of users in the human resources func-

tion. It specifies what portions of a human resource database each user is per-

mitted to access, based on the information required to perform that person’s

job. The database contains sensitive personal information such as employees’

salaries, benefits, and medical histories. 

The access rules illustrated here are for two sets of users. One set of users

consists of all employees who perform clerical functions, such as inputting

employee data into the system. All individuals with this type of profile can

update the system but can neither read nor update sensitive fields, such as

salary, medical history, or earnings data. Another profile applies to a divisional

manager, who cannot update the system but who can read all employee data

fields for his or her division, including medical history and salary. We provide

more detail on the technologies for user authentication later on in this chapter. 

DISASTER RECOVERY PLANNING AND BUSINESS

CONTINUITY PLANNING

If you run a business, you need to plan for events, such as power outages,

floods, earthquakes, or terrorist attacks that will prevent your information sys-

tems and your business from operating. 




Download 15,21 Mb.

Do'stlaringiz bilan baham:
1   ...   277   278   279   280   281   282   283   284   ...   645




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish