The structure of the information system, subsystem. Safe PDSistems Safe PDSistems

Golovna / 2 Cool Readers

Information system - mutually the collection of funds, methods and personnel that are victorious for saving, processing and proving information on the merit of the achievement of the delivered mark.

Today, on small businesses, there is a need for processing significant communications, as well as a need for automation of automated information systems. Automated information system (AIS)- A complex of software, technical, informational, linguistic, organizational and technological benefits and personnel, appointments for collection, primary processing, savings, search, secondary processing and type of data in a given form (type) for the selection of reliable systemic professional managers In AIS, part of the management functions and processing of data are processed by the system, and part - by the people. АІС can be considered as a human-machine system with an automated technology for extracting the resultant information necessary for information services to the economy and optimization of the management process in various areas of human activity.

Strictly seeming, understandable information system transferring obov'yazkovoї presence at the warehouse of the computer. Respectfully vivchivshi tse appointment, tse become obvious. ІС transmitting the form and seeing the information for additional assistance, methods and personnel, although the appointed ones themselves were not informed. Vykhodyachi s appointment pid ІС understand all the information that circulates in the organization. ALE! Today, the information system transferring the word as the main technical task of processing the information of the computer. Incl. Vikoristovuyuchi term ІС (ЕІС) may be heard on the uvazі itself automated system. It is necessary to understand the difference between computers and information systems. Computers, equipped with special software, technical base and tools for information systems. An information system is inconceivable without personnel, which interacts with computers and telecommunications. Tobto. the technical implementation of the information system is not meaningful by itself, as the role of a person is not guaranteed, for which the information is recognized and without it it is impossible to remove that manifestation.

Economic Information System (EIS) - it is the totality of internal and external flows of direct and circulating information links of the economic object, methods, zasobiv, fahivtsiv, which take part in the process of processing information and making managerial decisions.

It is obvious that the appointment of the EIC stuns all the enterprises (organizations) as a whole. What is logical, because undertaking (organization) is the name of the economic system. ALE! We will vikoristovuvat the term "EIS" in a larger "higher" rozumіnі. Same as automated EIS, tobto. such a system with a bark processing of information flows in the form of additional current VT.

Economic information system- the purpose of recruiting hardware and software tools, information resources, and developing management services, creating information processes for ensuring the preparation and adoption of economical decisions.

The structure ІС is seen functional subsystem , which reflects the goals of that managerial, і secure subsystem - To avenge the accomplishment of the task. Subsystems do not function by powerful forces, but are closely tied to one another. Decomposition is developed only for the purpose of facilitating and simplifying analysis, designing and implementing IV.

Among subsystems, which are safe, sound see information, technical, mathematical, software, organizational, legal, personnel, as well as linguistic and technological security.

Subsystems, which are safe, are sleeping for all ІС, regardless of specific functional subsystems, in which there are those other types of security. In robots, that organizational subsystem is combined into one subsystem, which is secure. Based on such a solution, it is possible to understand that these warehouses will ensure the implementation of the goals and functions of the system.

Warehouse for secure subsystems cannot be stored in the selected subject area and may:

functional structure;

information security;

mathematical (algorithmic and programmatic) security;

technical security;

organizational security;

personnel security.

And at the stage of development of ІV additional security:

law;

linguistic;

technological and in.

Zagal work ІV at the control circuit is assigned її functional structure and information security; behavior of a person - organization of that personnel; automaton functions - mathematical and technical security.

The functional structure is the change in the implementation of its functions (zavdan) and the subordination of them.

Under the function of ІС, it is understood about the number of ІІV, investments at the reach of private management.

The warehouse of functions that are implemented in the IS is regulated by the state standard and is subdivided into information and key functions.

Information functions:

  • - centralized control:
  • - Vymiryuvannya parametrіv value;
  • - Vimіryuvannya їх vіdhilen vіd zadah znachen;

Numerical and logical operations:

  • - Testing of practicality IV;
  • - preparation and exchange of information with other systems;

Key functions are responsible for:

  • - Research and development of rational regimes of management;
  • - implementation of the tasks of the control modes.

Information security is the totality of tools and methods to create an information base (Fig. 2).

It is up to you to choose the ways to form the image of the object of management by looking at the data in the middle of the IC, documents, graphics, and signaling the position of the IC. Information security is shared by calls and internal.

Mathematical security is composed of algorithmic and software (Fig. 3).

Algorithmic security is a collection of mathematical methods, models and algorithms that are victorious in the system for completing tasks and processing information.

Rice. 2.

Software Security:

from the general software (OS, translators, tests and diagnostics and others, so all those who ensure the operation of the hardware devices);

special PP (applied PP, which ensures the automation of control processes in a given subject area).

Technical security consists of outbuildings:

win;

transformation;

transmission;

saving;

obrobki;

fermentation;

registration;

input/visualization of information;

vikonavchih outbuildings.

Personnel security - the consistency of methods and zasobіv s organization and training of staff of receptionists of ІС.


Rice. 3.

Yogo method є pіdtrimka pratsezdatnostі ІV and the possibility of a distant її development. Personnel security includes training methods, course programs and practical exercises, technical training and rules for working with them, etc.

Organizational security - the totality of resources and methods of organizing and managing them in the minds of the IC.

Method of organizational security є: selection and setting of the head of management, analysis of the management system and ways to thoroughly, development of solutions for the organization of interdependence and for the staff, promotion of the head of management. Organizational security includes methods of carrying out work, helping to draw up documents, planting instructions, etc.

It is one of the most important IS subsystems, in order to successfully implement the goals and functions of the system. Prior to this warehouse, there are several groups of components (Fig. 4).


Rice. four.

Legal security is recognized for the regulation of the process of creation and operation of IV, as it includes the collection of legal documents with the statement of regulatory documents on how to form, collect, process and process the resulting information of the system.

Lailing is forgotten (LO) є punish-technical terminals of the Termi-Movny Put, Vikoristovye in the formal systems, and the rules of the formaliza of natural movis, and the method of the rizniyahi

The bones that enter before the LP subsystem are divided into two groups:

traditional movies (natural, mathematical, algorithmic, movie modeling);

recognized for dialogue with EOM (information-poshukovsky, DBMS movies, operating environments, input movie packages in application programs).

The subsystem "Technological security" (TO) EIC confirms the subsystem EIC on the subsystem for the technological stages of processing various types of information:

primary and resultant information (stages of the technological process of collecting, transferring, accumulating, saving, processing primary information, omitting that type of resultant information);

organizational and ordering of documentation (stages of omitting incoming documentation, transferring to vikonannya, stages of forming and collecting certificates, folding and reproducing internal documents and information);

technological documentation and armchair (stages of introducing into the system and updating templates of production, introduction of external data and formation of design documentation for new types of production, view on the plotter chair, updating the bank of GOSTs, OSTs, technical minds, normative technological preparation of data, see virobiv);

bases of data and knowledge (stages of forming databases of data and knowledge, introduction and processing of requests for search results, vidachі variant of solution and explanation to the new one);

scientific and technical information, GOST and technical minds, legal documents and references (stages of forming search images of documents, forming an information fund, maintaining the thesaurus of the key words and their codes, coding for a request for a search, coding for a search for an address of the type of a document).

FUNCTIONAL AND SAFETY

PIDSYSTEMS OF ECONOMIC

INFORMATION SYSTEMS (EIS)

Lecture plan:

1. Functional subsystems of EIC

2. Subsystems of the EIC to ensure

EIS - Complexes, functioning of some kind of economic objects of those developments.

Structure of the EIC consists of functional (PSFZ), which will secure (PSIT) subsystems and systems of support to make a decision (SSPR). Functional subsystem revenge planning, shape, control, regulation and motivation. Subsystem, which is secure revenge technical, linguistic, mathematical, legal, organizational and other types of security. Bezpechennya be-like ІС - a set of methods, facilitating that entry, directing to automated processing of data (collection, transfer, accumulation, collection, processing, generation of results in rozrahunkiv at the necessary for the koristuvach look) for the help of calculation technology. PSIT ensures the implementation of functional management tasks, and within the framework of the DSS, it allows managers and other organizational managers to conduct analytical and predictive work in an interactive mode to take management decisions further away.

1. Functional subsystems of EIC

Functional subsystem (FP) - A complex of organizational and economic heads of management with a high level of information and technology communications.

manager such a work process with information that clearly defines impersonal input and output information (for example, the form of a worker's salary).

The objects of the PSFZ are the tasks of automation of the development of functional tasks. For industrial production, it is necessary to automate the process of technological preparation of production, operational management of the main production, development of business plans, management of logistics processes, financial management, accounting and internal audit, etc. These processes serve the most important management functions and functional subsystems of the ІС organization (Business). The skin of functional subsystems is a set of task complexes, as well as other tasks from a specific algorithm for converting input information to the result one.


Main tasks of FP pointed to Fig. 2. Let's look at some more actions from them:

· Technical training of virobnitstva

· Operational planning

· Financial and accounting activities

Management of material and technical supplies (at the same time it is called logistics)

· Personnel management

· Budgeting

· Managing vodnosinami with clients

2. Subsystems of the EIC to ensure

Technological security of IT, call, behind the warehouse for ІС different economic objects uniformly, which allows to implement the principle of consistency of information systems in the process of functioning.

In the capacity of subsystems, which are safe, there are about a dozen (three more) subsystems. Three primordial ones: only one of them destroys the system without success. Before them one can see:

Information security (IV);

Technical security (TO);

Software security (PS)

The heads of their importantness can be seen in the rest of the black, and the back of the head is taken apart from the less important ones.

· 1. Mathematical security (MO)- A set of tools and methods that allow the development of mathematical models of the control task and the algorithm of their implementation. Such a collection of mathematical methods, models, and algorithms for processing information, which are victorious in the process of solving functional tasks and in the process of automation of design robots. Mathematical security includes problems, modeling of management processes, methods and methods for improving typical management tasks, methods for optimizing subsequent management processes and making decisions (methods of rich-criteria optimization of mass, mathematical programming, mathematical engineering). Technical documentation of this kind of security to describe the description of the task, the task of the algorithmization, the economic and mathematical methods of the model, the completion of the task, the texting and control applications of their completion. Personnel are put together by the departments of the organization of the management of the object, directors of the functional departments, mathematicians-fachists of the modeling of the processes of management and calculation methods, IT designers.

· 2. Linguistic security (LO) to increase the collection of current assets for the formalization of natural movement, to encourage that increase in informational units in the course of the compilation of coristuvachs from the methods of computational technique. For the help of linguistic security, people are brought together from the car. LO includes:

Infomovies for the description of structural units of the information base (documents, indications, requisites, etc.);

Move management and manipulation of data in the IT information base;

Movnі zasobi іnformatsіyno-poshukovyh systems;

Movnі zasobi avtomatizatsії ІС и ІТ;

Dialogue language of special recognition and other language;

The system of terms and designation, which are distinguished in the development process and the functioning of automated IC and IT.

· 3. Organizational security (GO)- Internal organization of the IC, which ensures the management of all subsystems of the EIC as a single system.

Organizational. security is a complex of documents, warehouses in the process of designing ІВ, confirmations and provisions in the basis of operation. They regulate the activity of the IS personnel in the minds of the functioning of the PSIT , PSFZ and DSS. At the process of vyvіshennya zavdnіnnya tsey type of security depends on the vzaєmodії pratsіvnіkіv administrative services аnd technology personnel ІТ with technical zabami and among themselves. Organizational security is implemented in various methodological and core materials at the stages of development, implementation and operation of IV, PSIT, PSFZ and DSS. Zakrema, it is formed during the pre-project maintenance, storage of technical and technical and economic planning for the design, development of design solutions for the design process, selection of automated tasks, typical design solutions and packages of "technical programs (APP) to be reviewed". , and the process of implementing the system and її exploitation is being corrected and growing in the world of expansion of the cool of rozvyazuvanih tasks.


Functions of organizational security:

Selection of primary information about the objects and the current medium,

Transfer of information and її rozpodіl,

Taking care of that podtrimka in the work station of information,

Obrobka and given information.

In fact, the organization of security is put into the hands of information technology.

Functions according to information technologies :

Security, integrity and confidentiality of data.

Administration, storage of service plans and development of IC.

· 4. Legal security (Pro)- The set of norms expressed in official normative documents that establish the legal status of the EIC.

Legal security is the sequence of legal norms that regulate the legal framework in the case of the creation and implementation of ІС and ІТ. Legal security at the stage of distribution of ІВ and ІТ includes normative acts, related to the contractual permits of the retailer and the depositor, to the legal regulation of various allowances during the course of the process, as well as acts necessary for the provision of the process of distribution of resources ІВ and ІВ ІніТіТ Laws are forgotten for Etapi to the functions of the same time, the legal camp, the legal camp of the competence of Lanok, is in the organized, right, vikoristan, the order that processing, ordering, that numbering calculation and telecommunication technology and other technical facilities, the creation of that mathematical and software engineering

vidi: - global legal security (sovereign, іn.),

Local legal security (in the middle of business).

For example: - identification system (access exchange: electronic keys, code),

Support for standard forms of documents,

Protection of software security.

* 5. Security mode (RV)- Transferring the nature of the work of ІС during the processing of closed information. In this way, all types of defense are victorious: organizational defense, technical and program defense

8 6. Ergonomic safety (EO) as a combination of methods and techniques that are victorious at various stages of development and functioning of ІС and ІТ, it is recognized for the creation of optimal minds of a high-yielding, highly effective and unforgiving activity of a person in ІТ, for the best mastered. Until the warehouse of the Yergonachny, to enter the: Complex of Documentary, Scho Main Ergonichni Khimogi to the timids of the MISTS, INformation models, minds of the DIYLOSTILS, and tacitan canceles a set of methods of initial and methodological, documentation and technical assistance, which ensured the formation and preparation of the staff, as well as the formation of the system for selection and training of IT personnel; a set of methods and methods that ensure the high efficiency of the work of IT personnel.

· 7. Information security (ІВ) compiling methods and techniques for converting the present day data from the machine, a description of the saved and processed information and further transformation of data from the machine view from the machine.

ü normative

ü dovіdkovі (terms of selection of materials)

2. Type of withdrawal method:

ü first

u travel

3. For a number of operations, which are shown

ü single-row

ü Bagatoria

4. Behind the method of shutting down the state's operations

one time

ü accumulative

5. Behind the stage of automation

ü Fill in manually

ü Partially automated

ü electronic

Economic information is one of the most important warehouse information resources of the region.

Information resources of Russia

In 1999 between a group of fakhіvtsіv pіd kerіvnitstvom Mіnzvjazku Rosії, prepared an additional report "Information Resources of Russia", for whom the report will look at the camp, trends in the development of state information resources and seen the main Russian resource categories.

Sovereign information resources of Russia:

1) Information resources of the library

Regardless of the lack of financial support, the library system of Russia continues to function and has close to 150 thousand. libraries. Less than 2.5 yew. science and public libraries are being beaten by automated library and information technologies. The largest data bases are formed in the libraries of INION, Russian National Library, Russian State Library, State Public Scientific and Technical Library of Russia.

Under the auspices of the Ministry of Culture of the Russian Federation, the program "Creation of the Central Russian Information and Library Computer Network - LIBNET" is being implemented.

Website www. gpntb. jw.org uk DPNTB

2) Resources of the sovereign system of economic and scientific and technical information.

One of the important elements of DSNTI is the association Rosinformresurs of the Ministry of Industry and Science of Russia (www.rosinf.ru). Here you can take the information:

About new technical solutions for industry, everyday life, agriculture, trade.

About the market of industrial products (about products, goods and services 57 thousand enterprises);

3) Russian resources of legal information.

State and commercial systems.

Commercial organizations - retailers of legal systems to get the full representation of the Internet:

NVP "Garant-service" - www. guarantee. ru;

Consortium "Kodeks" - www. ;

JSC "Consultant Plus" - www. consultant. ru.

4) Information resources of federal and regional authorities.

Information about legal issues;

Information about physical conditions;

normative legal documents;

Socio-economic and financial indications of administrative-territorial units and state-sponsored objects.

5) Information resources in the sphere of finance and other economic activities.

6) Information resources of galleys of material production.

The basis of information resources of enterprises and organization of the galleys of material production is to establish documents and electronic arrays of information, creation and victorization in the process of their activities.

www. vpk. ru. General information about the activities of the military-industrial complex, additional information about the great enterprises of the military-industrial complex, information about the comrades and services of enterprises and organizations of the military-industrial complex.

7) Information resources of the national system of statistics.

Website of the State Statistics Committee www. gks. ru. Three new transition to the site:

- Information Center of the State Statistics Committee of Russia;

-The head interregional center for the processing and dissemination of information to the State Statistics Committee of Russia (GMTs).

To the warehouse of the information fund of the HMC enter:

- about promiscuity,

- science and innovation,

- the cost of life is that income of the population,

- statistics on economic activity,

- Passport of the territory of the Russian Federation,

- Register of the city of Russia,

- The Unified State Register of Enterprises and Organizations of Russia (EDRPO) Vіdomostі about 2,700,000 legal issues ,

- register of industrial enterprises,

- Register of agricultural enterprises.

Access to the most important part of statistical publications is paid.

8) Information resources of the social sphere.

To the warehouse of the most significant galleys of the social sphere enter:

- health protection;

- ablution;

- employment and social security;

- physical culture and tourism.

The most important informational services in the social sphere:

Availability of drugs in wholesale and retail trade (www. pharm. mos. ru for Moscow);

Vіdomosti about vouchers to sanatoriums and more expensive then.

9) Information about natural resources, phenomena, processes.

Information about natural resources, manifestations and processes of zoseredzhen in a number of Galuze systems and sectors of the information sphere. The largest of these systems was created in the Ministry of Natural Resources of the Russian Federation Unified Information System for Supercorrecting (ЄІSP). To її to a warehouse to enter:

All-Russian Geological Funds - Rosgeofond 5 specialized and 62 territorial geofunds of the subjects of the Russian Federation;

State Bank of Digital Geological Information (GBTsDM);

Bank of data for state monitoring of the geological environment (GMGZ);

Museum-library and collection fonds, fonds of standard mineral syrovina and core material.

These funds have a wealth of valuable scientific information. For example, the results of the weather forecast for the hydrometeorological situation from 1725 are presented. You can get acquainted with geoinformation information on the websites: www. gbdgi. ru, www. gisa. ru, www. fccland. en

8. Software security (PZ) includes a set of programs that implement the functions and tasks of the ІС and ensure the operation of the complex technical tasks. The warehouse of software security includes the main system and special programs, as well as instructive and methodological materials for the development of software security staff, which is engaged in yogo development and support for the entire period of the IT life cycle.

Before the global system software security, there are programs that are covered in a wide range of ways and are used for organizing the calculation process, and the options for processing information are often reduced. They allow you to expand the functionality of the EOM, automate the planning of the number of jobs, and start automating the work of programmers. Shorter seeming, tse:

operational and service systems,

programming systems,

Get control and dynamics.

Special software security or application software security (APP) is a set of programs that are developed when IT is created for a specific functional purpose. It includes application software packages that created the organization of data and their processing for the completion of functional tasks of the IC.

· , (.supply of software systems and documents required for the operation of these programs.

· 9. Technical security (THEN)- A complex of technical zasobіv, scho zabezpechuyut functional ІС.

To the warehouse to enter service personnel, technical documentation, method. materials.

Warehouse for a complex of technical zasobіv, which will ensure the support of IV:

Computers and peripherals,

Carry information,

Take care of the collection and registration of primary information,

Transfer of information

Zasobi office equipment and additional possession.

The head element of the KTS, of course, is the EOM chi computer.

Characteristic figures of modern computers are:

High productivity;

The diversity of the forms of sampled data - double, tenth, symbolic, with a great range of changes and high accuracy of appearance;

The nomenclature of vikonuvannyh operations is great, like arithmetic, logical, and navit special;

Large capacity of operational memory;

The organization of the system for the introduction and display of information, which ensures the connection of various types of outbuildings, has been decried.

Historical aspects of the development of VT.

Three information vibes in the history of mankind:

First - if writing was found. The written transmission of knowledge from generation to generation has become richly nadіynіshoy porіvnjano z usnou.

The other one is like the 16th century, if Gutenberg is a vinaish drought. The circulation of others has grown up in orders of magnitude.

The third - the middle of the XX century, from the moment of the promotion of BT for the processing of information, which caused the creation of that promotion of IT.

Five generations of EOM from the technological base

Charles Bebidzh - from 1833 having begun the work on the counting machine, in the same way the control of the rachunk was put on the machine itself. Vidpovidno to the spirit at that time, the main nodes of the yogo analytical machine were called "warehouse", factory "and" office. Today is a memory, an arithmetic attachment and a stability of management. Byron's daughter Ada helped with the creation of the program (one of the programs is named after her). An analytical machine, over which the winemaker himself was, and then yoga syn was practiced for 70 years, so it was not done. The stench on the whole of the century ahead of the world. Dosi EOM will follow the principle, proponed by Ch. Bebidzh. I wrote to myself Bebidzh having blocked the light of the nose of information - a punched card.

Yosiro Nakamatsu is a winemaker of the KMT diskette. Tse bulo born in 1952, youmu bulo 24 years old. The first wine was born at five rokiv. Until 2000 having grown over three thousand wines. According to the rating compiled by the American Academy of Sciences, to include up to five of the largest winemakers of mankind (Archimedes, Michael Faraday, Marie Curie, Mykola Tesla, Yosiro Nakamatsu).

Persha in the world EOM ordered from the baby 1946. American engineers Mauchl and Eckert called її ENIAK (Electronic Numerical Integrator and Computer) Electronic integrator and calculation.

The first in the SRSR EOM was initiated in 1952 by Academician Lebedev. Vaughn was called MESM.

Nobert Wiener is considered to be the founder of the science of managing and chanting EOM (cybernetics).

Have 1977 r. two American enthusiasts of the Polish campaign - Stefan Wozniak and Steve Jobs took the Apple computer from the garage. So Vinic PC.

Peter Norton in ~ 1985 having created a software intermediary Norton Commander between the core and the MS DOS operating system.

Bill Gates is the creator of financial security for IBM's personal EOMs, the creator of Window's, the creator of the Internet Explorer browser, and the ideologist of encouraging information society.

Tim Berners-Lee- Winemaker of today's Internet. Pratsyuyuchi have 80 rocky. at the European center of nuclear researches, vin vigadav і through the method, the names of the hypertext. Autumn 1990 the first world Internet server and Internet browser appeared. Spring 2004 Internet wine maker Tim Berners-Lee was awarded the first in the history of mankind with the "Technology of a thousand people" award.

Examined subsystems of IT, which, as a rule, are similar to the warehouse for other economic objects. On the right - a set of functional subsystems that enter the warehouse ІС, PSFZ and DSS. Їх склад залежить від типу основної діяльності об'єктів (економічна, виробнича, адміністративна, збутова тощо), сфери їхньої функціональної спрямованості (що виробляють продукцію того чи іншого виду, що надають послуги транспортні, фінансові, банківські, страхові тощо) , рівнів управлінської діяльності (foreign states, regional, municipal ones).

As it was planned, the EIC should be up to the class of folding objects, like a system, it is composed of elements, which are one and the same for singing vessels. Impersonal tsikh vіdnosin together with the elements utvoryuyut the structure of the system. In this manner, pid system structure sukupnіst її okremih elementіv z urakhuvannyam їх vzaєmozv'yazkіv and put before the system of goals. Signs of structurization of the system are set indefinitely in the task that stands in front of it. EIC is built on subsystems (great elements), yak, in its own way, more other elements are added (for example, blocks). The subsystem is a part of the system, seen as a sign.

The most extensive approach to the structurization of the EIC is to see the safety of the functional part (Fig. 1.5).

Functional part determines the recognition of the EIC, the main goals, tasks, functions and the model of the system for managing the economic object. The functional part includes the functional subsystems that

Rice. 1.5.

complex head of the keruvannya tsim object. To the skin economic object, the warehouse of functional subsystems is different and depends on its features, scale, nature of activity and other officials. For example, for the EIC industrial business, one can name the following types of functional subsystems:

  • s resource management - production of finished products, manufacturing, material and technical supply, finance, personnel;
  • behind the functional sign - planning, appearance, analysis and regulation (operational management).

Safe part allows realizing the implementation of the tasks set, revealing the day and the warehouse of resources necessary for the functioning of the EIS. Її the structure of the meaningful world is typical and the same for the EIC of different species. Warehouse subsystems, which are safe, do not lie in a particular subject area. Among subsystems that provide security, see information, technical, software, mathematical, organizational, ergonomic, legal and other security. All subsystems, which are safe, are connected with each other and with functional subsystems.

Information security includes a single system of classification and coding of economic information, a unified system of documentation, schemes of information flows in an economic object, as well as methods and principles of motivation, warehouse and synthesis of databases and serve as the basis for communication

Technical securityє a complex of technical assistance (CTS) for the collection, storage, transfer, processing and submission of information necessary for ensuring the practicality and efficiency of the EIS (technology). Information technology can be implemented as in a local computer, and in a number of interdependent computers. For the first type, the computer implements the entire set of overhauled functions of transforming information, for the other, some of them may be more than capable of computers, included in the mesh, and some are split between others. Zagalom warehouse for a complex of technical zasob_v is presented in Table. 1.3.

Table 1.3

Warehouse for a complex of technical facilities

Function

Technical data

Obrobka

(transformation

information)

Computers, computer systems

Choice of entry

Keyboard, mouse, stylus pen, trackball, joystick, optical scanner, barcode reader attachment, active screen, graphic panel, video recording card, microphone/sound card, digital camera and ID.

saving

Computer memory (internal / operational that zovnishnya - floppy disks, hard disks, magnetic stripes, external disks - SO-YaOM, OOO that in.

Gifts and visnovok

Monitors, printers, plotters and other attachments (adaptation to sound, microfilms)

Broadcast

Set up communications and data transfers from local and global networks (modems, hubs, routers, add-on org.

Given the correct choice of KTZ to ensure the efficiency of the EIC functioning, great respect is attached to that nutritional complex of technical benefits. The complex of technical benefits is responsible for the satisfaction of the following factors:

  • gnuchka structure, which ensures the possibility of including up to the yogo warehouse of new, advanced technical facilities in the world of their mastery of industry;
  • reliability, which guarantees the uninterrupted functioning of the system;
  • minimal varity like the complex itself, and yogo service.

The task of designing the KTS is based on additional modeling, which guarantees the development of that thorough information system, which is connected with the creations of the KTS, the re-working of the new tasks.

Software security - a set of programs that implement the functions and tasks of the EIS. The software warehouse (PS) includes operating systems (clients and servers), server software, programming systems, software services, software database management systems (DBMS), core (or applied) software.

Mathematical security includes a collection of mathematical methods, economic and mathematical models, and algorithms for processing information for the completion of the EIC task.

Organizational security ob'ednuє the order of the organization of the external synths and functions, so that the skin structural unit can be overcome (for example, pіdrozdіl, viddіl, okremy spіvrobіtnik), which functions for the minds of the EIC. It is necessary for ensuring mutual cooperation between EIS personnel with technical assistance and among themselves in the process of supervising managerial tasks.

Ergonomic safety - a set of methods and zabiv, scho allow shaping the ability to work, brains and staff and ensure the training and highly effective performance of the skin specialist for the development and operation of the EIC. For example, for the EIC, which works in the real time mode, it is important to correctly place the technical complex at the work station of the specialist. Tse pritamanno banking, tax, insurance and other EIC, where customer service is carried out at the time of their presence. Ergonomic safety includes documentation for the ergonomics of working areas and technical complexes, as well as carrying out a viable ecological examination.

Legal security regulates the process of functioning of the system and determines, in what order it is necessary to perform the functions of the system participants. It includes the collection of normative acts, which establishes and seals agreements between the retailer and the deputy in the process of setting up and functioning of the system, various internal instructions of the organization, as well as the relevant instructions of the leading bodies, laws of the Russian Federation.

POWER CONTROLS

  • 1. Expand the understanding of the economic object management system, name the main functions.
  • 2. What is the structure of the economic object management system?
  • 3. Give an understanding of the economic information system.
  • 4. Give a clear understanding of "information". Who has special features?
  • 5. What is economical information? What are the special features?
  • 6. Expand the main characteristics of economic information.
  • 7. By what criteria can economic information be classified?
  • 8. Explain the meaning of syntactic, semantic, pragmatic aspects of evaluating economic information.
  • 9. What are the main structural units of economic information?
  • 10. Give the definition of "information technology" and describe its power.
  • 11. Give a clear understanding of the "system" and explain the components of the warehouse and power.
  • 12. Introduce the EIC classification for different characters.
  • 13. What are the main ambush of the creation and functioning of the EIS?
  • 14. Give an understanding of the functional and security of the EIC subsystem
  • 15. What kind of warehouse will ensure the subsystem and its characteristics?

Subsystems, which are safe, are sleeping for all ІС, regardless of specific functional subsystems, in which there are those other types of security. Warehouse secure subsystems cannot be stored in the selected subject area and maє (Fig. 3.4): functional structure, informational, mathematical (algorithmic and software), technical, organizational, personnel, and at the stage of development IV dodatkovo - legal, linguistic, technological , interfaces from foreigners I Z.

Rice. PER. Subsystems ІС

Zagal work ІV at the control circuit is assigned її functional structure and information security; behavior of a person - organization of that personnel; automaton functions - mathematical and technical security.

Functional structure(fig. 3.5) є transfer of functions implemented by it (zavdan) and subordination. Under the function of ІС, it is understood about the number of ІІV, investments at the reach of private management. The warehouse of functions that are implemented in IS is regulated by GOST and is subdivided into information and key functions.

Informational functions – centralized control ( 1 - Change the value of parameters, 2 - vimіr їх vіdhilenі vіd zadіh znacheni) i kolіzlyuvalі і logicalіchі operatsії (3 - testing of practicality IV and 4 - preparation and exchange of information with other systems). Keruyuchi functions are responsible for: 5 - research and development of rational management regimes, 6 - implementation of the tasks of the control modes.

Information security - tsukupnіst zabіv and methodіv pobudovі іnformаtsiynoї ї base (Fig. 3.6). It is up to you to choose the ways to form the image of the object of management by looking at the data in the middle of the IC, documents, graphics, and signaling the position of the IC. Information security is shared by calls and internal.

Mathematical security is composed of algorithmic and software (Fig. 3.7). Algorithmic security is a collection of mathematical methods, models and algorithms that are victorious in the system for completing tasks and processing information. Software security is made up of the global (OS, translators, tests and diagnostics, etc., that is, all those who ensure the work of the “load”) and special (applied software security, which ensures the automation of processes in a given subject area).

Technical security folded (Fig. 3.8) from extensions: relocation, conversion, transfer, savings, processing, display, registration, introduction / display of information and outbuildings.

Personnel security- tse succession of methods and zasob_v s organization and training of staff of receptions of IC work. Yogo method є pіdtrimka pratsezdatnostі ІV and the possibility of a distant її development. Personnel security includes me-

todiki navchannya, programs kursіv and practical to take, tehnіchnі zasobi nauchannya and the rules of work with them just.

Organizational security- tse sukupnіst zabіv і methodіv organіzаtsії virobnitstvа і adminіnnya іm for the minds zastosuvannya IS. The method of organizational security is: choosing and setting up a management manager, analyzing the management system and ways, thoroughly developing solutions for organizing interdependence and the staff, promoting the management manager. Organizational security includes methods of carrying out work, assistance to the execution of documents, planting instructions, etc.

It is one of the most important IS subsystems, in order to successfully implement the goals and functions of the system. Prior to this warehouse, chotiri groups of components should be included.

The first group includes the most important methodological materials that regulate the process of creation and functioning of the system for conducting pre-project furnishing at enterprises; methodological materials for the development and implementation of project documentation).

The other group includes the totality of the facilities necessary for the effective design and functioning of the IV (complexes of the management task, including typical application software packages; typical business management structures; unification of the document system; central system and classifiers, etc.).

The third group includes technical documentation, obtained from the process of installation, design and implementation of the system (technical and economic installation; technical task; technical and working project and documents that draw up the system building in operation in stages).

Up to the fourth group, there is a subsystem, in which there is an organizational and staff layout, which is designated, zokrema, a warehouse of facivists from functional management subsystems.

Legal security it is recognized for the regulation of the process of creation and operation of the ІС, as it includes a set of legal documents with a statement of regulatory documents on how to form, collect, process industrial and resulting information of the system.

Linguistic security(LO) is a collection of scientific and technical terms and other technical features that are victorious in information systems, as well as the rules of formalization of natural language, which include methods for compressing and decoding textual information for improving the automation efficiency. The objects that enter the subsystem of the LP are divided (Fig. 3.9) into two groups: traditional movies (natural, mathematical, algorithmic, movie modeling) and those used for dialogue with the EOM (information-based, DBMS movies, operational packages of media, input movies applied) programs).

Rice. 3.9. Warehouse of linguistic security ІС

Technological security(Electronic Data Processing - EDP)

    primary information (stages of the technological process of collecting, transferring, accumulating, saving, processing primary information, removing that type of resultant information);

    organizational and ordering of documentation (stages of omitting incoming documentation, transferring to vikonannya, stages of forming and collecting certificates, folding and reproducing internal documents and information);

    technological documentation and armchair (stages of introducing into the system and updating templates of production, introduction of external data and formation of design documentation for new types of production, view on the plotter chair, updating the bank of GOSTs, OSTs, technical minds, normative technological preparation of data, types of viruses);

    bases of data and knowledge (stages of forming databases of data and knowledge, introduction and processing of requests for search results, vidachі variant of solution and explanation to the new one);

    scientific and technical information, GOST and technical minds, legal documents and references (stages of forming search images of documents, forming an information fund, maintaining the thesaurus of the key words and their codes, coding for a request for a search, coding for a search for an address of the type of a document).

Technological security of rozvinennyh І С includes subsystems: OLTP - operational processing of data of a transactional type, as a high security processing of a large number of transactions, focused on fixing search algorithms and processing of database information; OLAP - operational data analysis to support the adoption of managerial decisions.

OLAP technologies provide:

Analysis and modeling of data in online mode;

Work with subject-oriented data collections;

Implementation of the demand for a sufficient sight;

Formation of the system and knowledge about the subject area; that in.

Interfaces from external ICs(Interfaces) secure the exchange of data, expand the functionality of add-ons for the program interface of the Application Program Interface, API and access:

    Microsoft Jet objects (database, spreadsheets, records, sets of records, etc.) for programs Microsoft Access Basic, Microsoft Visual Basic - DAO (Data Access Object);

    relational database for WOSA (Microsoft Windows Open Standards Architecture) - ODBC (Open Database Connectivity);

    component model of objects - COM (Component ObjectModel), which supports a standard interface for access to objects and methods for processing objects independently of their nature, location, structure, mov programming;

    local and remote objects of other add-ons based on Automation (OLE Automation) manipulation technology, which ensures the interaction between the server and the client;

    ActiveX objects (OLE and OCX controls) for including them before web add-ons while saving collapsible formatting and animation; that in.

The information system supports the work of the next categories of employees (User):

    kіntsі koristuvachі (End Users, Internal Users) - managerial staff, specialists, technical staff, yakі for their kind of activity vikoristovuyut іnformatsiynі tekhnologii ї administrіnnya;

    administration of IC, including:

S constructor or system analyst (Analyst) - ensuring the management of the efficiency of ІВ, determining the prospects for the development of ІВ;

S application administrator (Application Administrator) - in charge of formalizing the information needs of business applications, managing the efficiency and development of business applications;

S data administrator (Data Base Administrator) - zdіysnyuє ekspluatatsіyu and pіdtrimannya yakіsnyh characteristics ІB (DB);

S computer network administrator (Network Administrator) – secures the work of the network, authorizes access to the network, installs the protection of network resources;

    system and application programs (System Programmers, Application Programmers) - creation, support and modernization of software І С;

    technical staff (Technicians) - providing services for technical data processing;

    Zovnishnі koristuvachі (External Users) - spozhivachі external information ІВ, contractors.

© 2022 androidas.ru - All about Android