Information Systems
Information Systems
INTRODUCTION:
Security Challenge:
The number of smart phone devices capable of offering internet
technology and experience rivaling desktop computer standards is
growing at a fast pace. Security and privacy concern for mobile devices
rival or go beyond similar concern for a laptop computer as mobile
device are even more mobile by nature and are less likely to be managed
by an organization.
Ensure Security:
In order to ensure security, it is necessary to provide at least the
following services, which are given below.
1. Authorization:
It is act of determining whether an (authenticate) entity has the
right to execute action.
2. Audit:
An auditing service providing a history of action that can be used
to determine what (if anything) went wrong and what caused it to
go wrong.
3. Physical authentication:
Some firm of authentication such as an object (a key or a smart
card ) or a personal characteristic like a fingerprint, retinal
pattern, hand geometry.
4. Data Confidentiality:
It protects against disclosure of any data while in transit and is
provided by encryption of data.
ADVANTAGES OR DISADVANTAGES:
Advantages of implementing information system and security include:
Many who come across the term information system for the first time
think of it as some software based on information storage or something
like that. Well, the name does sound that way. However, an information
system is way bigger than that. So, what is an information system?
Now that you know what an information system is, let’s look at its
components. It has five components – hardware, software, data, and
telecommunications.
The products of information technology are part of our daily lives. Here
are some of the facts about information systems.
Building a career in IT
But ambition and hard work alone is not enough. Having strong
fundamentals, a creative mindset, and the ability to communicate
effectively is highly important to become successful in such a technical
field.