Skip to content
Related Articles

Related Articles

Information System and Security

View Discussion
Improve Article
Save Article
Like Article
  • Last Updated : 18 May, 2021

Prerequisite – Information Security, Threats to Information Security 
The Information System is an integrated set of the component for collecting, storing, processing and communicating information. Business firm and other organization on the information system to manage their operation in the marketplace supply service and augment personals lives. 

Types of information system: 
There are two types of the information system which are given below: General purpose information system, and Specialized information system. 

  1. General purpose information system: 
    There are some general types of information system .for example a database management system(DBMS) is a combination of software and data that makes it possible to organize and analyze data. Database management system software is typically not designed to work with a specific organization or a specific type of analysis. 
  2. Specialized information system: 
    In contrast, there is a number of a specialized information system that has been specifically designed to support a particular process within an organization or to carry out very specific analysis task. 

    Example: Enterprise resource planning (ERP) (used to integrate management of information system across an entire organization) 

Security Challenge: 
The number of smart phone devices capable of offering internet technology and experience rivaling desktop computer standards is growing at a fast pace. Security and privacy concern for mobile devices rival or go beyond similar concern for a laptop computer as mobile device are even more mobile by nature and are less likely to be managed by an organization. 

Ensure Security: 
In order to ensure security, it is necessary to provide at least the following services, which are given below. 

  1. Authorization: 
    It is act of determining whether an (authenticate) entity has the right to execute action. 
  2. Audit: 
    An auditing service providing a history of action that can be used to determine what (if anything) went wrong and what caused it to go wrong. 
  3. Physical authentication: 
    Some firm of authentication such as an object (a key or a smart card ) or a personal characteristic like a fingerprint, retinal pattern, hand geometry. 
  4. Data Confidentiality: 
    It protects against disclosure of any data while in transit and is provided by encryption of data. 
My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!