Blogumulus by Roy Tanck and Amanda Fazani | Distributed by Blogger Templates Designs

Practice makes Perfect

Posted by Jª

Some of the Information System's Best Practices:

Educating the End Users
- The success of the implementation of an application depends on the knowledge of the users on the said application. Training on a continuing basis greatly helps in improving the capabilities of users in using the system.

Data Access Security
- grants or restricts the user of accessing a specific application depending on his/her role or job.

Network Security
- The administration of an application security is utilized to grant/ restrict data access within the application.

Data Integrity
- Must ensure accurate and complete data.

Program Change Control
- This practice see to it that only appropriate and important changes are made in the program logic. This change should produce the expected results by the users that want the change.

System Interfaces
- Based on my source, the exchange of data from one business application to another is considered an interface. Therefore, the reliability, accuracy and the completeness of the data being transferred or received should be assured by a quality control process.


Backups, Recovery plans and Business Continuity
- There will always be unforeseen circumstances that will ultimately affect an application or a system. Creating Recovery Plans will help cope with the unavailability of the system during the outage. This plan should be written and approved by the management and also checked on a regular basis. The plan must show how the system will recover and how the operations will continue during the recovery.

Reference:
http://www.legaudit.state.ar.us/Resources/Publications/ADLA-IS_Best_Practices.pdf

3 comments:

  1. rejserenity said...

    hehehe yah.. best practice is essential yet now., i gez practice in IT matter doesnt purely makes perfect.. coz of the fast changes in technology.. what ur practicing now would not be the same appreciation in the next few years..

    hehehe vulnerabilities is undeniable however, the thoughts in ur post would at least help lessen the damage dealt by threats and any varieties of attacks. and even secure ur files..

    best regardz!

  2. hannah hernandez said...

    ..the question is,are you already practicing it.? As a future IT professional,I think you should. Char.!!

  3. geLan eam said...

    yah, i agree with hannah. being a student, you already practice such practices.. and for the next years, impossible is really impossible.