Information System and Security

Prerequisite – Information Security, Threats to Information Security
The Information System is an integrated set of the component for collecting, storing, processing and communicating information. Business firm and other organization on the information system to manage their operation in the marketplace supply service and augment personals lives.

Types of information system:
There are two types of the information system which are given below: General purpose information system, and Specialized information system.

  1. General purpose information system:
    There are some general types of information system .for example a database management system(DBMS) is a combination of software and data that makes it possible to organize and analyze data. Database management system software is typically not designed to work with a specific organization or a specific type of analysis.

  2. Specialized information system:
    In contrast, there is a number of a specialized information system that has been specifically designed to support a particular process within an organization or to carry out very specific analysis task.

    Example: Enterprise resource planning (ERP) (used to integrate management of information system across an entire organization)

Security Challenge:
The number of smart phone devices capable of offering internet technology and experience rivaling dekstop computer standards is growing at a fast pace. Security and privacy concern for mobile devices rival or go beyond similar concern for a laptop computer as mobile device are even more mobile by nature and are less likely to be managed by an organization.



Ensure Security:
In order to ensure security, it is necessary to provide at least the following services, which are given below.

  1. Authorization:
    It is act of determinig whether an (authenticate) entity has the right to execute action.

  2. Audit:
    An auditing service providing a history of action that can be used to determine what (if anything) went wrong and what caused it to go wrong.

  3. Physical authentication:
    Some firm of authentication such as an object (a key or a smart card ) or a personal characteristic like a fingerprint, retinal pattern, hand geometry.

  4. Data Confidentiality:
    It protects against disclosure of any data while in transit and is provided by encryption of data.



My Personal Notes arrow_drop_up

Check out this Author's contributed articles.

If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.

Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.




Article Tags :

Be the First to upvote.


Please write to us at contribute@geeksforgeeks.org to report any issue with the above content.