LS 03
LS 03
Data:
Data consist of the raw numbers that computers organize to produce information. It is the streams
of raw figures and facts representing events such as business transactions.
Information:
Information is data that has been processed into a form that is meaningful to the recipient and is of
real or perceived value in current or progressive decision. Information is valuable when it is
reliable, clear, complete, timely, right quantity and relevant. Information depicts the precise,
structural and organized presentation of data indicating, summarizing the position of a
phenomenon. Basically, information is used for decision making, calculating or exchanging ideas
and plans. The evolution of technology started due to increase demand of information. Information
should be preserved and retrieved whenever want.
Information system:
An information system is organized combination of people, hardware, software, communication
network and data resources that collets, transforms and disseminates information in an
organization. In other way Information system is a mechanism that helps people to collect,
organize and use information.
Components of an information system:
1
An information system contains information about the organization and surrounding environment.
The basic components of information system are input, processing and output. Form all these
components, organization gets information for decision and control the organization. An
information system also requires feedback and control components to meet the objectives.
Input: The connection of computer with outside world is made through input devices. Input devices
enable users to input characters such as letters and numbers. It is the activity of gathering and
capturing raw data from within the organization and /or from its external environment.
Processing: The microprocessor performs processing tasks under the direction of a program.
Processing involves converting or transforming data into more meaning form.
Output: Output shows the results of processing operations. It involves producing useful
information in a proper from such as reports, paychecks or documents and transferring the
processed information to the users. Output from one information system can become input for
another.
Feedback:
Feedback or control mechanism to allow people to evaluate the performance of the systems and
make necessary changes to input or processing activities.
Information technology:
In the broadest sense, information technology refers to both the hardware and software that are
used to store, retrieve and manipulate information. It is the use of computers and software to
manage information. The information technology department of an organization would be
responsible for storing information, protecting information, processing the information, transmitting
the information as necessary and later retrieving information as necessary. Information technology
can help business process, managerial decision making and workgroup collaborations. The
following information technologies are used in a computer based information system:
Computer based hardware technologies;
Computer based software technologies;
Telecommunication network technologies;
Data resource management technologies.
2
Criteria for access authorization are:
Granting access: Departmental heads are responsible for authorizing access to systems
with sensitive information.
Restricting access: Access to sensitive information is restricted until granted.
Identity based access: Each user requires a unique user ID in order to gain access to
sensitive information.
Information security:
Information security means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification or destruction. It can be accomplished by
implementing a plan that incorporates the appropriate components for providing the required
protection, including controls, rules, procedure, user training and computer hardware and software.
Once the plan is completed, the following steps must be taken to ensure that the organization’s
information security objectives include:
Implementing the plan;
Monitoring logs to verify compliance and identify problems;
Measuring the results;
Identifying potential improvements;
Refining processes and procedures.
Information security ensures the confidentiality, integrity and availability of data of the organization.
Confidentiality is the term used to prevent the disclosure of information to unauthorized
individuals or systems.
Integrity means data cannot be modified without authorization.
Availability ensures the information or data must be served when it is needed.
Encryption:
Encryption of data has become an important way to protect sensitive information transmitted over
Internet and other networks. Encryption is the coding and scrambling of messages to prevent
unauthorized access to or understanding of the data being transmitted. A message can be
encrypted by applying a secret numerical code, called an encryption key, so that the data are
transmitted as a scrambled set of characters (The key consists of a large group of letters, numbers
and symbols). To be read the message must be decrypted (unscrambled) with a matching key.
There are several alternative methods of encryption, but public key encryption is becoming
popular. Public key encryption has two keys, one private key and one public key. The keys are
mathematically related so that data encrypted with one key can be decrypted using only the other
key. To send and receive messages, communicators first create separate pairs of private and
public keys. The public key is kept in a directory and private key must be kept secret. The sender
encrypts a message with the recipient’s public key. On receiving the message, the recipient uses
his or her private key to decrypt it. Encryption is especially useful to shield messages on the
3
Internet and other public networks because they are less secure than private networks. Encryption
helps protect transmission of payment data, such as credit card information and addresses the
problems of message integrity and authentication.
Firewalls:
A computer within a LAN uses a gateway to connect to the Internet, the worldwide consortium of
computer networks. The connection is a security risk, as a LAN has no control over users on the
Internet. Applications transferred through the Internet to the LAN may contain computer viruses
that can harm the components of the LAN. Besides, unauthorized users may have other objectives
such as prying into a competitor's database or obtain classified information that are otherwise not
available for public use. A firewall is a special gateway that protects the users within a LAN from all
such hazards while letting item access the external information.
Firewalls use to prevent unauthorized users from accessing private networks. A Firewall isolates a
computer system from unauthorized access of another computer system on the Internet. As
growing numbers of businesses expose their networks to Internet traffic, firewalls are becoming a
necessity. A firewall is a combination of hardware and software that controls the flow of incoming
and outgoing network traffic. It is generally placed between the organization's private internal
networks and un-trusted external networks such as the Internet, although firewalls can also be
used to protect one part of a company's network from the rest of the network. The firewall acts like
a gatekeeper that examines each user's credentials before access is granted to a network. The
firewall identifies names, Internet Protocol (IP) addresses, applications and other characteristics of
incoming traffic. It checks this information against the access rules that have been programmed
into the system by the network administrator. The firewall prevents unauthorized communication
into and out of the network, allowing the organization to enforce a security policy on traffic flowing
between its network and other un-trusted networks, including the Internet.
In large organizations, the firewall often resides on a specially designated computer separate from
the rest of the network so no incoming request can directly access private network resources.
There are a number of firewall screening technologies, including static packet filtering, stateful
inspection, Network Address Translation and application proxy filtering. The following techniques
are used in combination to provide firewall protection.
To create a good firewall, an administrator must write in very fine detail and maintain the internal
rules identifying the people, applications or addresses that are allowed or rejected. Firewalls can
deter, but not completely prevent, network penetration by outsiders and should be viewed as one
element in an overall security plan. To deal effectively with Internet security, broader corporate
policies and procedures, user responsibilities and security awareness training may be required.
E-mail monitoring:
Internet and other online e-mail systems are one of the favorite avenues of attack by hackers for
spreading computer viruses or breaking into networked computers. For this e-mail is also the
battlefield for attempts by the organization to enforce policies against illegal, personal or damaging
messages by employees through monitoring software.
Virus defense:
Corporate antivirus protection is a centralized function of information technology by adopting anti-
virus program runs in the background. Large organization builds defenses against the spread of
viruses by centralizing the distribution and updating of antivirus software as responsibility IT
department. Other organizations are outsourcing the virus protection responsibility to their internet
service providers or to telecommunications or security management companies.
Security code:
Security codes are a type of multilevel password system for security management. An end user
logs into the computer system by entering his or her unique identification code or user ID and the
user is then asked to enter a password in order to gain access in the system.
Back-up files:
Back-up is nothing but copying of data and programs or whatever computers document it is, on to
spare magnetic tapes/disk to provide security. The simplest and the most inexpensive way to avoid
disastrous loss of data are to implement a schedule of periodic backups with storage off-site. It is
one of the few simple, economical ways to ensure that data safe and usable. Back-up files are
kept in off-premises for ensuring future security. The following resources must be considered;
4
Personnel;
Hardware;
Facilities;
Documentation;
Supplies;
Data/Information;
Application software;
System software.
Security monitors:
Security of a network may be provided by specialized system software packages known as system
security monitors. System security monitors are programs that monitor the use of computer system
and networks and protect them from unauthorized use, fraud and destruction.
Biometric security:
The word biometric can be defined as "life-measure". It is used in security and access control
applications to mean measurable physical characteristics of a person that can be checked on an
automated basis. Security personnel look for biometric data that does not change over the course
of one’s life; that is, they look for physical characteristics that stay constant and that are difficult to
fake or change on purpose. Biometric identification is becoming commonplace as hardware and
software come down in price.
Biometric security is a fast-growing area of computer security. This security measure is provided
by computer devices that measure physical traits that make each individual unique. This includes
voice verification, fingerprints, hand geometry, signature dynamics, keystroke analysis, retina
scanning, face recognition and genetic pattern analysis.
Disaster recovery:
Natural and manmade disasters do happen. Hurricanes, earthquakes, fires, floods, criminal and
terrorist acts and human error can all severely damage an organization's computing resources and
thus the health of the organization itself. Many organizations like airlines, banks and online
services, for example, are crippled by losing even a few hours of computing power. Many firms
5
could survive only a few days without computing facilities. That's why organizations develop
disaster recovery procedures and formalize them in a disaster recovery plan. It specifies which
employees will participate in disaster recovery and what their duties will be; what hardware,
software and facilities will be used and the priority of applications that will be processed.
Arrangements with other companies for use of alternative facilities may be done in disaster period.
Disaster event
Establish temporary
communication link
between the hot-side and
Commence
Information systemoperations
controls: the command center
6
Information system controls are methods and devices that attempt to ensure the accuracy, validity
and propriety of information system activities. Information system controls must be developed to
ensure proper data entry, processing techniques, storage methods and information output. These
controls are designed to monitor and maintain the quality and security of the input, processing,
output and storage activities of any information system.
Audit trail:
An audit trail can be defined as the presence of documentation that allows a transaction to be
traced through all stages of its information processing. This journey may begin with a transaction's
appearance on a source document and may end with transformation into information on a final
output document or record. The audit trail of manual information systems was quite visible and
easy to trace. However, computer based information systems have changed the form of the audit
trail information formerly available to the auditor in the form of visual records may no longer be
available. Now auditors must know how to search electronically through magnetic disk and tape
files of past activity to follow the audit trail of most business systems.
Many times, this electronic audit trail takes the form of control logs that automatically record all
computer network activity on magnetic disk or tape devices. This audit feature can be found on
7
many online transactions processing systems, performance and security monitors, operating
systems and network control programs. Software that records all network activity is also widely
used on the Internet, especially the World Wide Web, as well as corporate intranets and extranets.
Such an audit trail helps auditors check for errors or fraud, but also helps IS security specialists
trace and evaluate the trail of hacker attacks on computer networks.
Operational-level systems:
These support operational managers by keeping track of the elementary activities and transactions
of the organization such as sales, receipts, cash deposits, payroll, credit decision, flow of materials
in factory etc. The principal purpose of the systems at this level is to answer routine questions and
to track the flow of transactions through the organization.
Management-level systems:
These serve the monitoring, controlling, decision-making and administrative activities of the middle
managers. It ensures that all the things of the organization are working well. Management-level
systems typically provide periodic reports rather than instant information on operations. Some
management-level systems support non-routine decision making. They tend to focus on less-
structured decisions for which information requirements are not always clear.
Strategic-level systems:
It helps senior management tackle and address strategic issues and long-term trends, both in the
firm and in the external environment. Their principal concern is matching changes in the external
environment with existing organizational capability.
8
Strategic: To forecast the future plan, policies of the organization;
Tactical: Tracks the reason of better performance or worse performance of the activities of the
organization;
Knowledge: To design promotional and/or other important documents of the organization for
betterment of its activities;
Operational: To record daily transactions.
9
great help in this direction. Development of PC's, computer networks, communication systems,
internets, all types of software’s has basically helped in wide use of DSS concept in business,
industry, management and many other fields
DSS has come of age and is preceding hand-in-hand with MIS. MIS is the backbone information
system for management and DSS is providing the constant scope for adhoc optimization with
management intervention. Management has to be resourceful and well-equipped to derive the
benefits. The evaluation of computer and communication technology is realty helping the process
very well.
Characteristics of DSS:
They support semi structured or unstructured decision making;
They are flexible enough to respond to the changing needs of decision makers; and
They are easy to use.
Component of DSS:
A DSS has four basic components:
The users;
Database;
Planning languages;
Model base
Example of DSS:
Cost accounting system;
Capital budgeting system;
Budget variance analysis system;
General decision support system
10
Criteria for applications of expert system:
The basic factors that should be taken into account for an expert system is required to be
developed for a potential application area are as follows:
Domain: The domain or subject area of the problem is relatively small and limited to well-defined
problem area.
Expertise: Solutions to the problem require the efforts of an expert. That is a body of knowledge,
techniques and intuition is needed that only a few people possess.
Complexity: Solution of the problem is a complex task that requires logical inference processing,
which would not be handled as well by conventional information processing.
Structure: The solution process must be able to cope with ill-structured, uncertain, missing and
conflicting data and a problem situation that change with the passage of time.
Availability: An expert exists who is articulate and cooperative, and who has the support of the
management and end-users involved in the development of the proposed system.
11
office. It is also known as enterprise collaboration system and this system enhance team and work
group communications and productivity.
Artificial intelligence:
Artificial intelligence (AI) is a branch of computer science concerned with designing intelligent
computer systems, that is, systems that exhibit the characteristics we associate with intelligence in
human behavior-understanding, language, learning, reasoning, solving problems and so on. AI is
an interdisciplinary field. It is influenced and shaped by disciplines such as psychology,
mathematics, cognitive science, computational linguistics, data processing, decision support
systems and computational modeling. AI is made up of various branches of study, such as expert
systems, fuzzy logic, generic algorithms, virtual reality, intelligent agents, natural language
interfaces, neural networks and robotics.
Some of the attributes of intelligent behavior that AI is attempting to duplicate these capabilities in
computer-based-systems are as follows:
Think and reason;
Use reason to solve problems;
Learn or understand from experience;
Acquire and apply knowledge;
Exhibit creativity and imagination;
Deal with complex or perplexing situations;
Respond quickly and successfully to new situations;
Recognize the relative importance of elements in a situation;
Handle ambiguous, incomplete or erroneous information.
Though much work has been done in many of the subgroups that fall under the AI umbrella, critics
believe that no computer can truly pass the Turing test. They claim that developing intelligence to
impart true humanlike capabilities to computers is simply not possible. But progress continues and
only time will tell if the ambitious goals of artificial intelligence will be achieved and equal the
popular images found in science fiction.
12
as powerful graphics, analytical tools and communications and document management tools.
These systems require great computing power to handle the sophisticated graphics or complex
calculations necessary for such knowledge workers: a scientific researcher, product designers and
financial analysts. Because knowledge workers are so focused on knowledge in the external world,
these systems also must give the worker quick and easy access to external databases.
A user-friendly interface is very important to a knowledge worker's system. User-friendly interfaces
save time by enabling the user to perform needed tasks and get to required information without
having to spend a lot of time learning how to use the computer. Saving time is more important for
knowledge workers than for most other employees because knowledge workers are highly paid.
Wasting a knowledge worker's time is simply too expensive and knowledge workers can easily fall
prey to information overload. Knowledge workstations often are designed and optimized for the
specific tasks to be performed; so, for example, a design engineer requires a different workstation
setup than a financial analyst. Design engineers need graphics with enough power to handle three
dimensional computer-aided design (CAD) systems. However, financial analysts are more
interested in access to a myriad of external databases and technology for efficiently storing and
accessing massive amounts of financial data.
The end
13