Escolar Documentos
Profissional Documentos
Cultura Documentos
Abner F. Escullar
mcp,mcdst, mba
IT Infrastructure and Rules to
Accounting Functions
What is IT Infrastructure
consists of the equipment,
systems, software, and
services used in common
areas across an organization,
regardless of
mission/program/project.
Connection between the Firm, IT
Infrastructure and Business
Capabilities
Computing platforms
used to provide computing
services that connect employees,
customers, and suppliers into a
coherent digital environment,
including large mainframes,
midrange computers, desktop and
laptop computers, and mobile
handheld devices.
Application software
provide enterprise-wide
capabilities such as enterprise
resource planning, customer
relationship management,
supply chain management, and
knowledge management
systems that are shared by all
business units.
Physical facilities
management
develop and manage the physical
installations required for
computing, telecommunications,
and data management services.
IT management
plan and develop the
infrastructure, coordinate with the
business units for IT services,
manage accounting for the IT
expenditure, and provide project
management services.
IT standards
provide the firm and its business
units with policies that determine
which information technology will
be used, when, and how.
IT education
provide training in system use to
employees and offer managers training
in how to plan for and manage IT
investments.
IT research and
development
provide the firm with research on
potential future IT projects and
investments that could help the firm
differentiate itself in the marketplace.
Stages in IT Infrastructure
Evolution
General-Purpose Mainframe and Minicomputer Era:
(1959 to Present)
95%
WinTel
PCs user
Stages in IT Infrastructure
Evolution
Client/Server Era (1983 to Present)
vs
Infrastructure Components
OPERATING SYSTEM PLATFORMS
overlap with, and must relate to, the firms general networking
infrastructure and hardware and software platforms
Controls
methods, policies, and organizational procedures that ensure the
safety of the organizations assets; the accuracy and reliability of
its records; and operational adherence to management
standards.
WHY SYSTEM IS
VULNERABLE?
Securing Information Systems:
External Vulnerabilities
Internet
more vulnerable than internal networks because they are
virtually open to anyone.
When becomes part of corporate network, IS are more vulnerable
to actions from outside
External Vulnerabilities
Computer Crime
Identity Theft - a crime in which an imposter obtains key pieces of
personal information, such as social security identification numbers,
drivers license numbers, or credit card numbers, to impersonate
someone else.
Computer Crime
entoryCashAc
collec
t
Rule 1: Each event is linked to at least one resource that it
affects.
Some events affect the quantity of a resource:
If they increase the quantity of a resource, they are called a "get
event. If they decrease the quantity of a resource they are called
a "give event
Relationships that affect the quantity of a resource are
sometimes referred to as stock flow relationships.
If a customer orders goods but has not paid and has not received
goods, this activity is called a
commitment
event.
Rule 2: Each event is linked to at least one other event.
Involves determining:
Order Entry
Manufacturing
Procurement and accounts payable
Payroll
Human Resources