StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Management information system - Essay Example

Cite this document
Summary
In the industry of computer sciences and technology, the term computer security refers to the methods and procedures to ensure that the data that has been stored in the computer cannot be used by an unauthorized individual…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Management information system
Read Text Preview

Extract of sample "Management information system"

Download file to see previous pages

Confidentiality ensures that the information is not accessed by any person who is not authorized. Integrity ensures that the data is not modified or altered by unauthorized users and authentication deals with ensuring that the user is actually the person he claims to be. These days computers are used by everyone from banking to shopping and communicating with others. Though there might not be any secret information in your data but one would not want a stranger getting access to his/her information.

Intruders often gain control to anyone’s computer so that they can use it for their attacks on other confidential systems. According to (Caldwell 175) computer security has five fundamental functional areas which are listed below: Risk Avoidance This is a basic security fundamental which deals with questions like unrestricted internet access, business engaging in risky activities and standardization on a desktop operating system. Prevention This consists of implementing security to the system in order to avoid any attacks.

Complete prevention is desirable but not achievable. Deterrence It deals with the threats to information assets, consisting of communication strategies which are developed and designed to catch the intruders when they attack the system. Detection It works well with preventive measures. When prevention fails, detection should be started in order to minimize the damage. It also includes activities like log-keeping and auditing. Recovery When all measures fail and the intruder has successfully attacked the system and nothing has worked, it is important to focus on recovery.

Includes backing up servers, internet connections and other similar recovery activities. Attacking Techniques There have been various techniques used by intruders these days to attack a single computer or a network. Some of them are listed and described briefly below: Viruses A virus is such a program that when it is executed it works within the security policy completely. When a virus is activated, that is when it becomes a part of a process; it makes use of a Trojan horse to look for the authorized environment for executable programs which are modifiable and then attaches itself with all such programs.

Hence, when these programs are executed, the virus activates and spreads throughout the executable code of the computer. Viruses can create, modify, move, replicate and erase the files on a computer in order to engage much of the computer’s memory and causes the system not to function properly. Some viruses even have the ability to duplicate themselves and attack to other programs. An infected email attachment is one of the most common and easy ways to get a virus. (Caldwell 212) Trojan Horse A Trojan horse attack can be designed to attain any desired goals by the attacker.

Trojan horse attacks are one of the most serious threats to computer security. If a computer has been attacked with a Trojan horse, it may not be the only computer under attack but unknowingly it is used to attack several other computers. Trojan Horses are usually built and attached to the source code of an original program and is made to remain dormant until an attempt is made to overcome security. For example a Trojan horse may appear in the form of a computer game, which once double clicked, starts writing on parts of your hard drive, corrupting the data.

Trap door A trapdoor is normally an entrance to the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Management information system Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Management information system Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/management/1462134-management-information-system
(Management Information System Essay Example | Topics and Well Written Essays - 2000 Words)
Management Information System Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/management/1462134-management-information-system.
“Management Information System Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/management/1462134-management-information-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Management information system

CIS Management Information System

In the outlined case above, this is the main problem which is of concern where piracy is reigning supreme as a result of the system used that makes it possible for musical files to be shared amongst individuals without the owners' consent.... The availability of software that enabled file sharing system meant that music can be accessed virtually for free thus causing a severe blow to the recording companies and producers as they would be prejudiced money worth billions of dollars from millions of their potential customers....
2 Pages (500 words) Essay

Buckie Management Information System

This case study "Buckie management information system" discusses the government that requires Buckie Management Company to carry out a continuous check on their equipment.... To establish whether the system would be successfully implemented, a feasibility study had to be carried out.... The technical feasibility study was to establish whether the company had the infrastructure laid down in readiness for the deployment of the system.... The system is supposed to work in the construction industry where it is supposed to allow for easier recording of the different types of equipment....
6 Pages (1500 words) Case Study

Management Information System Project

The paper "management information system Project" discusses that Employee Record Keeping System has been implemented to keep a complete record of employees and information system to provide insight about the human resource position of the firm in the industry.... nbsp;… Information systems have grown less taken the place business enterprise and successful businesses are those which have sound information system developed for their every function.... Similarly, to stay competitive, ABC Company has taken an initiative to develop its information system for human resource....
8 Pages (2000 words) Term Paper

Management information system ip2

ow does employee empowerment relate to whether management believes in theory X or Y style of management and the decision-making process?... The theory X of management and decision-making process revolves around an authoritative form of leadership in which the managers hold the sole authority of making decisions whereas the theory Y states that the employees have an equal say in the decision making process.... ?Team Performance management, 14 (1-2), Pp....
2 Pages (500 words) Essay

Management information system project

Fact means a true piece of data or information while opinion means a belief, way of thinking or judgment.... These are considered to be critical modes of communication.... The links at ASOS work perfectly.... They are well placed and are well titled.... These titles are very accurate and specific to certain tasks, thereby making them very easy… The links at Net-a-porter are quite impressive....
3 Pages (750 words) Essay

Cloud Based Management Information System

The paper "Cloud-Based management information system" describes that Cloud MIS is an emerging technology that offers a large number of benefits to companies, such as, low capital investment, no need to hire IT professionals, user-friendly interface, and increased data storage capacity.... The name of the technology is the Cloud management information system (Cloud MIS).... et us first have a look at the basic workings of management information system and Cloud Computing in order to get a better understanding of the benefits that the merger of these technologies can provide to businesses....
8 Pages (2000 words) Essay

Management Information System, Recommendations

hellip; It refers to the case of the Newark Ophthalmic Centre as a case study to identify the elements of management information system.... It also considers the tasks that are performed by the system.... In Newark Ophthalmic Centre, there are major tasks such as system Acquisition and system search.... system acquisition is, for example, split into subtasks such as system requirement study, preliminary study, feasibility search, conceptual design, logical design, functional design and development, testing and documentation tasks....
16 Pages (4000 words) Assignment

Management Information System Project

The author of this coursework "management information system Project" describes key concepts of MIS.... Using different kinds of content to pass information to clients and followers has been the objective of creating a website for many businesses.... he web audience surf the internet looking for information about the product they want to buy.... For the website to be useful to its visitors it must offer them the kind of information they need, support, and guidance through the web pages and making transactions online if the business involves such....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us