Information System
Information System
Information System
Software: It is a set of instruction that tells the hardware what to do. It can be used to
organize, process and analyse data in the information system.
Data: Data is a collection of facts. Information systems work with data. These data can be
aggregated, indexed, and organized into tables and files together to form a database. These
databases can become a powerful tool for every businesses information system.
Network: It includes internet, intranet, extranet to provide successful operations for all
types of organizations and computer-based information system.
Procedures: It specifies the policies that govern the operation of an information system. It
describes how specific method of data are processed and analysed to get the answers for
which the information system is designed.
Mobile Computing-
Mobile computing is a generic term that refers to a variety of devices that allow
people to access data and information from wherever they are. Sometimes
referred to as "human-computer interaction," mobile computing transports data,
voice, and video over a network via a mobile device.
Mobile devices can be connected to a local area network (LAN), or they can take
advantage of Wi-Fi or wireless technology by connecting via a wireless local area
network (WLAN).
Role in IS-
(1)
non- disruptive user interfaces characterised by a low cognitive load,
(2)
hands-free operation,
(3)
an unobtrusive form factor,
(4)
the ability to model, recognise and act upon events in the environment (context
sensitivity), and
(5)
seamless, ubiquitous connectivity.
Web services are self contained, modular applications that can be describe,
published,located and invoked over a network.
Web services performs functions using ranging from simple requests to
complicated business processes.
Web services have been proven to give a strong return on investors(RIO) and
make computer based information system more adaptable. They also help bring
productivity, flexibility,and low maintence cost in the developement of
information system by integring components from various third party vendor’s
product.
Services refer to components and the services offered that can be used to build larger
application services.
Web services are adaptable and can handle changes more readily
Cyber-attack is now an international concern and has given many concerns that hacks and
other security attacks could endanger the global economy. Organizations transmit sensitive
data across networks and to other devices in the course of doing businesses, and
cybersecurity describes to protect that information and the systems used to process or store
it.
As the volume of cyber-attacks grows, companies and organizations, especially those that
deal information related to national security, health, or financial records, need to take steps
to protect their sensitive business and personal information.
4. 1. Confidentiality
5. Confidentiality is roughly equivalent to privacy and avoids the unauthorized
disclosure of information. It involves the protection of data, providing access for
those who are allowed to see it while disallowing others from learning anything about
its content. It prevents essential information from reaching the wrong people while
making sure that the right people can get it. Data encryption is a good example to
ensure confidentiality.
6. Tools for Confidentiality
7.
Encryption
Encryption is a method of transforming information to make it unreadable for
unauthorized users by using an algorithm. The transformation of data uses a secret
key (an encryption key) so that the transformed data can only be read by using
another secret key (decryption key). It protects sensitive data such as credit card
numbers by encoding and transforming data into unreadable cipher text. This
encrypted data can only be read by decrypting it. Asymmetric-key and symmetric-
key are the two primary types of encryption.
Access control
Access control defines rules and policies for limiting access to a system or to physical
or virtual resources. It is a process by which users are granted access and certain
privileges to systems, resources or information. In access control systems, users
need to present credentials before they can be granted access such as a person's
name or a computer's serial number. In physical systems, these credentials may
come in many forms, but credentials that can't be transferred provide the most
security.
Authentication
An authentication is a process that ensures and confirms a user's identity or role that
someone has. It can be done in a number of different ways, but it is usually based
on a combination of-
o something the person has (like a smart card or a radio key for storing secret
keys),
o something the person knows (like a password),
o something the person is (like a human with a fingerprint).
Authorization
Authorization is a security mechanism which gives permission to do or have
something. It is used to determine a person or system is allowed access to
resources, based on an access control policy, including computer programs, files,
services, data and application features. It is normally preceded by authentication for
user identity verification. System administrators are typically assigned permission
levels covering all system and user resources. During authorization, a system verifies
an authenticated user's access rules and either grants or refuses resource access.
Physical Security
Physical security describes measures designed to deny the unauthorized access of IT
assets like facilities, equipment, personnel, resources and other properties from
damage. It protects these assets from physical threats including theft, vandalism,
fire and natural disasters.
2. Integrity
Integrity refers to the methods for ensuring that data is real, accurate and
safeguarded from unauthorized user modification. It is the property that information
has not be altered in an unauthorized way, and that source of the information is
genuine.
Tools for Integrity
Backups
Backup is the periodic archiving of data. It is a process of making copies of data or
data files to use in the event when the original data or data files are lost or
destroyed. It is also used to make copies for historical purposes, such as for
longitudinal studies, statistics or for historical records or to meet the requirements of
a data retention policy. Many applications especially in a Windows environment,
produce backup files using the .BAK file extension.
Checksums
A checksum is a numerical value used to verify the integrity of a file or a data
transfer. In other words, it is the computation of a function that maps the contents
of a file to a numerical value. They are typically used to compare two sets of data to
make sure that they are the same. A checksum function depends on the entire
contents of a file. It is designed in a way that even a small change to the input file
(such as flipping a single bit) likely to results in different output value.
Physical Protections
Physical safeguard means to keep information available even in the event of physical
challenges. It ensure sensitive information and critical information technology are
housed in secure areas.
Computational redundancies
It is applied as fault tolerant against accidental faults. It protects computers and
storage devices that serve as fallbacks in the case of failures.