StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Definition of security in info. sys - Essay Example

Cite this document
Summary
With the advancement of Information technology, more corporations in the world today employ information systems to perform basic functions such as input, processing, storage and output of data to convert it into useful information. The core components of such Information systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Definition of security in info. sys
Read Text Preview

Extract of sample "Definition of security in info. sys"

Definition of Security in Information Systems With the advancement of Information technology, more corporations in the world today employ informationsystems to perform basic functions such as input, processing, storage and output of data to convert it into useful information. The core components of such Information systems are People, Hardware, Software, Data and Network. The input process consists of collecting data and transforming it to a form that is suitable for processing. Manipulation of this data gives information (processing).

The information thus obtained is either stored for future use (storage), or directed to appropriate user (output). A very important aspect of such information systems is the ability to protect the data and information obtained from unauthorized access, exploitation, addition, deletion, or modification. This is called as security of information system. Increased interconnectivity amongst various information systems has raised new issues and threats for the security of information systems. However it is based on some core principles.

First of these is Confidentiality. It refers to protecting personal privacy, and proprietary information from unauthorized access, and disclosure. If sensitive information such as Card Number No., SSN No., company strategy, transactions data for the company, passwords etc. leaks to unauthorized people, it may lead to large level of misuse by the thief. Second core principle is Integrity which refers to preventing unauthorized information modification (addition, editing, and deletion). The integrity of data and information in an information system may suffer because in many cases like attack of virus/worms, hacking of websites, an employee being able to change sensitive corporate information etc.

Another important principle of Information system is to make it reliably and timely accessible to correct users. This aspect of the IS is called availability. This also includes preventing a website from Denial-of-Service Attacks. Information system professionals have to protect their corporate IS from various threats. The first kind of threat that can harm the security of IS is hacking, which refers to obsessive or unauthorized use of company computer and network resources. Often employees or outside people make unauthorized use of network, and make fraudulent transactions.

This is called as cyber theft. Employees may also use corporate computer and networks for purposes such as e-mail abuses, pornography, and moonlighting. This unauthorized use at work is called time and resource theft. Apart from these, corporate IS may also be attacked by computer viruses or worms. Common sources of viruses include e-mails, file attachments, floppy disks, CDs, or shareware software. The IS department has to put strict security policy in order to prevent the system from attacks.

The first technique that they may use is Encryption, in which sensitive information such as password, messages, and other data can be encoded and decoded using special mathematical algorithms. Encryption methods generally make use of public keys or private keys for each individual. Firewalls which can be used to deter unauthorized access by providing a filter and a safe routing point between the corporate network, and the internet are also a necessity to protect the security of the IS. In order to prevent the D-o-S attacks, IS professionals have to set up defense mechanism at 3 levels.

They shall create back up servers at the website. They should continuously monitor traffic and block any abrupt shoot in traffic at the ISP. Enforcement of strict security policies such as scheduled scan for viruses, Trojans etc is necessary at the end-user machines. The IS department personnel shall install antivirus programs such as MacAfee, or Symantec etc to prevent the IS network from virus attacks. Besides, monitoring of the e-mails to prevent spamming shall be done. Besides, IS department can make use of new technologies such as biometric security, and fault tolerant systems.

Thus, to conclude, Security of IS in an organization is to prevent any unethical practices from employees as well as other potential hackers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Definition of security in info. sys Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Definition of security in info. sys Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys
(Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words)
Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys.
“Definition of Security in Info. Sys Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1556500-definition-of-security-in-info-sys.
  • Cited: 0 times

CHECK THESE SAMPLES OF Definition of security in info. sys

Information Technology and Electronic Commerce

The report discusses the importance of security and its effects on online services at the initial part of the report.... Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business.... Passports with Hidden security Chip …….... Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business....
26 Pages (6500 words) Essay

National Security Policies

There is no globally agreed definition of terrorism at present.... Despite the fact that acts of terror campaign are criminal acts as for each the United Nations security Council Resolution and domestic jurisprudence of approximately all countries in the world, terrorism refers to an observable fact including the definite acts, the perpetrators of acts of bombing and their intentions.... A United Nations security Council report stated in November 2004: 'Terrorism as any act intended to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government or an international organization to do or abstain from doing any act'....
10 Pages (2500 words) Essay

Mobile Computing and Mobile Computing Security

The report "Mobile Computing and Mobile Computing security" discusses the advantages of mobile computing technologies and features of mobile computing security.... nbsp;Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications....
6 Pages (1500 words) Report

Wireless Networks

Wireless Transaction Protocol (WTP)The Wireless Transaction Protocol, in a simple definition, deals with the transaction of data.... Wireless networks are the fastest growing trend in networks - no wires are necessary to make the connection their application to mobile computers such as notebook computers and personal digital assistants (PDAs) are the fastest growing segment of the computer industry today....
5 Pages (1250 words) Essay

Security Analysis and Redesign of a Network

The coursework "security Analysis and Redesign of a Network" presents the review of the current network infrastructure of the XYZ company.... Further, the report presents a security policy write-up, which will guide the organization with regards to spyware, antivirus, and adware policies....
14 Pages (3500 words) Coursework

French Immigration Policy

ithout the structuring devices of the state, labor, and the family, the citizen is left to his own devices, forced to search out surrogate means of self-definition in a deinstitutionalized landscape of citizen formation.... The author explains why France found the integration of immigration so difficult....
24 Pages (6000 words) Assignment

Information Technology Security Risk

Vulnerabilities are successful due to policy weaknesses, inadequate implementation of security infrastructure, and information about personal issues.... This research will begin with the statement that threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems.... They explore opportunities for security breaches to cause confidential data invasion via unauthorized access, amendment of data, removal of information from information systems....
13 Pages (3250 words) Research Paper

Homeland Security in the United States

The paper "Homeland security in the United States" highlights that the US homeland security framework was actually based on certain basic objectives.... nbsp;… Homeland security is concerned with the provision of safety to the safety and security of the citizens and the property of a country.... As such, it needs to be known as to what actually homeland security is about and what is actually envisaged in so providing homeland security....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us