We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Management information system - Essay Example

Comments (0) Cite this document
In the industry of computer sciences and technology, the term computer security refers to the methods and procedures to ensure that the data that has been stored in the computer cannot be used by an unauthorized individual…
Download full paperFile format: .doc, available for editing
Polish This Essay94% of users find it useful
Management information system
Read TextPreview

Extract of sample
"Management information system"

Download file to see previous pages Confidentiality ensures that the information is not accessed by any person who is not authorized. Integrity ensures that the data is not modified or altered by unauthorized users and authentication deals with ensuring that the user is actually the person he claims to be. These days computers are used by everyone from banking to shopping and communicating with others. Though there might not be any secret information in your data but one would not want a stranger getting access to his/her information. Intruders often gain control to anyone’s computer so that they can use it for their attacks on other confidential systems. According to (Caldwell 175) computer security has five fundamental functional areas which are listed below: Risk Avoidance This is a basic security fundamental which deals with questions like unrestricted internet access, business engaging in risky activities and standardization on a desktop operating system. Prevention This consists of implementing security to the system in order to avoid any attacks. Complete prevention is desirable but not achievable. Deterrence It deals with the threats to information assets, consisting of communication strategies which are developed and designed to catch the intruders when they attack the system. Detection It works well with preventive measures. When prevention fails, detection should be started in order to minimize the damage. It also includes activities like log-keeping and auditing. Recovery When all measures fail and the intruder has successfully attacked the system and nothing has worked, it is important to focus on recovery. Includes backing up servers, internet connections and other similar recovery activities. Attacking Techniques There have been various techniques used by intruders these days to attack a single computer or a network. Some of them are listed and described briefly below: Viruses A virus is such a program that when it is executed it works within the security policy completely. When a virus is activated, that is when it becomes a part of a process; it makes use of a Trojan horse to look for the authorized environment for executable programs which are modifiable and then attaches itself with all such programs. Hence, when these programs are executed, the virus activates and spreads throughout the executable code of the computer. Viruses can create, modify, move, replicate and erase the files on a computer in order to engage much of the computer’s memory and causes the system not to function properly. Some viruses even have the ability to duplicate themselves and attack to other programs. An infected email attachment is one of the most common and easy ways to get a virus. (Caldwell 212) Trojan Horse A Trojan horse attack can be designed to attain any desired goals by the attacker. Trojan horse attacks are one of the most serious threats to computer security. If a computer has been attacked with a Trojan horse, it may not be the only computer under attack but unknowingly it is used to attack several other computers. Trojan Horses are usually built and attached to the source code of an original program and is made to remain dormant until an attempt is made to overcome security. For example a Trojan horse may appear in the form of a computer game, which once double clicked, starts writing on parts of your hard drive, corrupting the data. Trap door A trapdoor is normally an entrance to the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Management information system Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Management information system Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/management/1462134-management-information-system
(Management Information System Essay Example | Topics and Well Written Essays - 2000 Words)
Management Information System Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/management/1462134-management-information-system.
“Management Information System Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/management/1462134-management-information-system.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Management Information System: BAM Construct UK case
This paper focuses upon a Management Information System that is concerned with the ‘collecting, processing, storing, and transmitting relevant information to support the management operations in an organization’. The success of operations in the organization depends highly on the accuracy and timeliness of the information to be used in decision-making processes.
7 Pages(1750 words)Essay
Management Information System
This article shall cover the different aspects of communication offered by two of recent devices designed, the Tely HD and Watchiloo1. The Tely HD has been designed to integrate family communication with distant members through their HDTV sets via Skype enabled devices.
5 Pages(1250 words)Essay
Management Information System
Maghrabi and Vidyaranya Gargeya (p.53) define inter-organizational systems (IOS) as automated information systems that are shared by two or more firms. The most common form of inter-organizations system is electronic data interchange which enables instantaneous computer to computer information transfer.
12 Pages(3000 words)Essay
Management Information System Essay
Railways in the public transportation especially account for over 50% of the total market share in the public transport. This makes it clear that the rail transport market in the UK public transport industry not only forms an integral part of the public transportation but also contributes to the Gross Domestic Product.
16 Pages(4500 words)Essay
Management Information System
With the help of the Ship Partner there is no need to communicate to the cruise ship personnel concerning the reservations - it can be done conveniently and fast through the network. Another function of the system allows tracing the customers' purchases and generating accumulated bills afterwards, facilitating in this way the purchasing and making regular payments.
2 Pages(500 words)Essay
Management Information system (journal)
nd designs that facilitate supply chain management (SCM), customer relationship management (CRM) and enterprise resource planning (ERP) are developed with the main objective of satisfying the needs and values of the customers and maximizing the use of the internal resources to
1 Pages(250 words)Essay
Management information system BD 1
For example, payoneer Inc. uses information systems to perform e-commerce activities for global banking transactions. On the other hand, Nokia Inc. uses information systems to perform Nokia care services, which acts
1 Pages(250 words)Essay
Management information system db5
Even though the incidence reduced in the year 2010, following its peak in the year 2009, an increase from the year 2010 to the year 2011 shows suggest continuity of the increasing trend.
1 Pages(250 words)Essay
Fundamental of management information system
at the head office is straining to collect data from all the fifty branches and analyze them before consolidating them into one document that is then used as a profit and loss statement. This move already shows that the company is not in a position to clearly come up with
1 Pages(250 words)Essay
Fundamental of management information system
There are negative implications to the company for this method used for gathering as well as processing data. It is slow, inefficient, ineffective and insecure. This impacts negatively on the performance of business since there are
1 Pages(250 words)Essay
Let us find you another Essay on topic Management information system for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us