Free

Definition of security in info. sys - Essay Example

Comments (0) Cite this document
Summary
With the advancement of Information technology, more corporations in the world today employ information systems to perform basic functions such as input, processing, storage and output of data to convert it into useful information. The core components of such Information systems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Definition of security in info. sys
Read TextPreview

Extract of sample "Definition of security in info. sys"

Definition of Security in Information Systems With the advancement of Information technology, more corporations in the world today employ informationsystems to perform basic functions such as input, processing, storage and output of data to convert it into useful information. The core components of such Information systems are People, Hardware, Software, Data and Network. The input process consists of collecting data and transforming it to a form that is suitable for processing. Manipulation of this data gives information (processing). The information thus obtained is either stored for future use (storage), or directed to appropriate user (output).
A very important aspect of such information systems is the ability to protect the data and information obtained from unauthorized access, exploitation, addition, deletion, or modification. This is called as security of information system. Increased interconnectivity amongst various information systems has raised new issues and threats for the security of information systems. However it is based on some core principles. First of these is Confidentiality. It refers to protecting personal privacy, and proprietary information from unauthorized access, and disclosure. If sensitive information such as Card Number No., SSN No., company strategy, transactions data for the company, passwords etc. leaks to unauthorized people, it may lead to large level of misuse by the thief. Second core principle is Integrity which refers to preventing unauthorized information modification (addition, editing, and deletion). The integrity of data and information in an information system may suffer because in many cases like attack of virus/worms, hacking of websites, an employee being able to change sensitive corporate information etc. Another important principle of Information system is to make it reliably and timely accessible to correct users. This aspect of the IS is called availability. This also includes preventing a website from Denial-of-Service Attacks.
Information system professionals have to protect their corporate IS from various threats. The first kind of threat that can harm the security of IS is hacking, which refers to obsessive or unauthorized use of company computer and network resources. Often employees or outside people make unauthorized use of network, and make fraudulent transactions. This is called as cyber theft. Employees may also use corporate computer and networks for purposes such as e-mail abuses, pornography, and moonlighting. This unauthorized use at work is called time and resource theft. Apart from these, corporate IS may also be attacked by computer viruses or worms. Common sources of viruses include e-mails, file attachments, floppy disks, CDs, or shareware software.
The IS department has to put strict security policy in order to prevent the system from attacks. The first technique that they may use is Encryption, in which sensitive information such as password, messages, and other data can be encoded and decoded using special mathematical algorithms. Encryption methods generally make use of public keys or private keys for each individual. Firewalls which can be used to deter unauthorized access by providing a filter and a safe routing point between the corporate network, and the internet are also a necessity to protect the security of the IS. In order to prevent the D-o-S attacks, IS professionals have to set up defense mechanism at 3 levels. They shall create back up servers at the website. They should continuously monitor traffic and block any abrupt shoot in traffic at the ISP. Enforcement of strict security policies such as scheduled scan for viruses, Trojans etc is necessary at the end-user machines. The IS department personnel shall install antivirus programs such as MacAfee, or Symantec etc to prevent the IS network from virus attacks. Besides, monitoring of the e-mails to prevent spamming shall be done. Besides, IS department can make use of new technologies such as biometric security, and fault tolerant systems.
Thus, to conclude, Security of IS in an organization is to prevent any unethical practices from employees as well as other potential hackers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Definition of security in info. sys Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Definition of security in info. sys Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys
(Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words)
Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys.
“Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Definition of security in info. sys

Networking and communication sys (sockets)

....,2007) References Eric S, Raymond Richard, Stallman Linus, 2007. The scheduler 4.4, Premptive Priority basedScheduling[Online]Avaliable:http://book.opensourceproject.org.cn/embedded/cmprealtime/opensource/5107final/lib0024.html.[9March 2011]. GinniT.2010.SocketProgramming.[Online].Avaliable:http://www.ezest.net/socket_programming-India.html.[10 March 2011]. Khanna.S,Sebree.M, and Zolnovsky.J. Realtime scheduling in SunOS 5.0, Proceedings of the USENIX Winter Conference. 1992: 375–390. Landrieu Severine & Francois Planque.2008.Network Security Researches and Projects: Internet Speed optimization[Online]. Avaliable: http://securebits.org/blog/blog.php/2008/09/20/internet-speed-optimization Olira G.Online Multi Threading...
3 Pages(750 words)Assignment

Read info

...? Meaning of Multiculturalism and its implication with respect to different aspects After going through the meaning of multiculturalism and its implications with respect to the different aspects, it can be perceived that different roles have to be rightly played and challenges conquered for multiculturalism to attain its purpose. In simple language multiculturalism means existence of diverse cultures in the same community. Multiculturalism is a concept which needs to be understood from both an historical and conceptual perspective. Historically it came into being in the context of public school curriculum and came into wide public use during the early 1980s. Multiculturalism is also related to the global shifts of power... Meaning of...
3 Pages(750 words)Essay

Enterprise Info Security

...?Running head: Enterprise Info Security Enterprise Info Security Insert Insert Grade Insert 22 November Enterprise InfoSecurity Question 4.1 How can the ability to distinguish between programs and data help to construct a defense against buffer overrun/overflow attacks? Buffer overflow/overrun is a form of interference where a program overruns the buffer's boundary and overwrites adjacent memory, while writing data to a buffer. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system...
5 Pages(1250 words)Essay

Computer info

...that map into each cluster on the partition. Every records, at the start, usually have the address of the next cluster in a chain and an EOF (End of File) character to signal the end of a chain in the last part. This may also contain a special character to indicate a bad cluster, a character signifying a reserved cluster, or a zero to note that the cluster is not being use. As we mentioned earlier, different FAT file system uses different size for FAT entries. This means that a FAT32 files system is using 32 bits for each entry and it can map a larger number of clusters. This will enable efficient and less wasted space because a 32 bits FAT file system can deal with smaller clusters. References: Microsoft, (2000), "Hardware White...
2 Pages(500 words)Essay

Manfucturing quality sys

...the department and the company must ensure that the spare part reaches the engineer immediately. To avoid further delay they must maintain a record that shows the parts that have been delivered to the engineer. This can definitely improve the supply of spare parts to the user. Identify and recommend realistic improved inventory control systems that will reduce stock and improve efficiency Inventory control systems are an important part of a company. This system will manage and control the stock and its operations. These systems can be implemented in the company to reduce the human work and to improve the efficiency in maintaining the inventory. Since the level of investment in the inventory is very high, the...
10 Pages(2500 words)Case Study

Computer info

...by Microsoft software engineers. UNIX is a multi-user, multitasking operating system. It has some 20 years of history and is very established in terms of performance, reliability, scalability and security. UNIX has undergone thirty years of continuous research and development with contributions from quite a number of volunteers, which resulted in an operating system which has powerful multiprocessing capabilities and whose performance is still unmatched. It not only meets the demands of todays computing needs, but in many cases exceeds them. Microsofts Windows NT server is well known this also is a multi-user and multitasking operating system. It is much younger compared to UNIX, but Windows operating system is well...
2 Pages(500 words)Essay

Info technology

...Key Word: Supply Chain Management Definition: According to Johnson and Pyke (1999), Supply Chain Management is “the term used to describe the management of flow materials, information and funds across the entire supply chain, from suppliers to competent producers to final assemblers to distribution (warehouses and retailers), and ultimately to the customers. Supply Chain Management can also be described as the process of efficiently planning, implementing and controlling the operations of the supply chain which includes movement and storage of raw materials, work in process inventory and movement of finished goods from the point of origin to the point of consumption. Article Summary: “An Approach for Supply Chain...
2 Pages(500 words)Essay

Enterprise Info Security

...Running head: Enterprise Info Security Enterprise Info Security Insert Insert Grade Insert Tutor’s Name 22 November 2011 Enterprise Info Security Question 4.1 How can the ability to distinguish between programs and data help to construct a defense against buffer overrun/overflow attacks? Buffer overflow/overrun is a form of interference where a program overruns the buffers boundary and overwrites adjacent memory, while writing data to a buffer. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior, including memory access...
8 Pages(2000 words)Essay

Info technology

...Essay Question One Info Technology Businesses Employing Information System Integration of information system with the businessoperations facilitates the development of a design that improves and maintains a business processes. In fact, this integration has become a complex technical product, which is intensely disheveled with the operations of the business. Moreover, this has led to a significant dependence between businesses and information system; thus, when a problem in the information system, the business is affected significantly. Nevertheless, there are some forms of businesses are highly dependent on the information systems such as financial institutions, multinationals, assurance companies, and travel businesses....
6 Pages(1500 words)Essay

Australia info

... Australia Businesses do not exist in isolation, they require a specific support system from thegovernment and other regulatory bodies; and countries differ in the kind of environment they provide to business owners. The World Bank “Ease of doing Business” index places Australia at the number 11 out of rankings of 189 countries. The index indicates the relative ease of starting and operating a business within the regulatory environment of a particular country calculated through 10 factors; Australia’s high ranking is due to the support provided to business owners through legislation, tax requirements, permits accessibility as well as the infrastructure and public goods sustaining the economy. Australia has very high scores... Australia...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Definition of security in info. sys for FREE!

Contact Us