Module 4 Part 2
Module 4 Part 2
Awareness
MODULE 4:
Web Surfing: An Overview: working of Internet, Browsing the Internet, E-Mail, Components of E-
Mail, Address Book, Troubleshooting in E-Mail, Browsers: Netscape Navigator, Microsoft Internet
Explorer, Google Chrome, Mozilla Firefox, Tor, Search Engines like Google, DuckDuckGo etc.,
Visiting web sites: Downloading.
Cyber Security: Introduction to Information System, Type of information system, CIA model of
Information Characteristics, Introduction to Information Security, Need of Information Security,
Cyber Security, phishing, spamming, fake news, general issues related to cyber security, Business
need, Ethical and Professional issues of security.
MODULE 4:
Web Surfing and Cyber Security
INFORMATIO
DATA PROCESSING
N
INFORMATION SYSTEM
Set of interrelated components that collect, process, store and distribute data and
information, and provide a feedback mechanism to meet an objective.
An information system is a set of interrelated components that works together to collect,
process, store and breakdown the information to support decision making.
Arrangement of people, data, processes, interfaces, networks and technology that interact
to support and improve both day-to-day operations in a business as well as support the
problem-solving and decision-making needs of management.
TYPES OF INFORMATION SYSTEM
1. Transaction Processing System (TPS)
2. Management Information System (MIS)
3. Decision Support System (DSS)
4. Executive Information System (EIS)
5. Knowledge Management Systems
6. Office Automation System
1 Transaction Processing Systems
A transaction processing system ensures that all of the contractual, transactional, and
customer relationship data is stored in a safe location and accessible to everyone who
needs it. It also assists in the processing of sales order entries, payroll, shipping, sales
management, or other routine transactions needed to maintain operations.
By utilizing a TPS, organizations can have a high level of reliability and accuracy in their
user/customer data while minimizing the potential for human error.
It helps
in automate repetitive information processing activities within organizations •Increases
speed •Increases accuracy • Greater efficiency • Supports the monitoring, collection,
storage, processing, and dissemination of the organization’s basic business transactions
2 Management Information Systems
A management information system uses various transaction data from a TPS to help middle
management optimize planning and decision-making.
Most of the report formats encompass summaries of annual sales data, performance data, or
historical records. This provides a secure and systemized way for managers to meet their
targets and oversee business units.
Management Information Systems are specially designed to help middle managers and
supervisors make decisions, plan, and control the workflow. The MIS pulls transactional data
from various Transactional Processing Systems, compiles the information, and presents it in
reports and displays.
Focus on the information requirements of low to middle level managers
Some examples of MIS • Sales management systems
• Inventory control systems • Budgeting systems
3 Decision Support System (DSS)
Decision models are programmed into the IS to analyze and summarize large quantities of
information and put it into a visual that makes it understandable
4 Executive Information System (EIS)
Executive support systems are similar to a DSS but are primarily used by executive leaders
and owners to optimize decision-making.
An executive support system provides better telecommunication functionality and a bigger
computing functionality.
Graphics software is integrated within an ESS to display data about tax regulations, new
competitive startups, internal compliance issues, and other relevant executive information.
This allows leaders to track internal performance, monitor the competition, and pinpoint
growth opportunities.
5 Knowledge Management Systems
A knowledge management system stores and extracts information to help users enhance
their knowledge and optimize collaboration efforts to complete tasks. Examples of
documents found in a knowledge management system include employee training materials,
company policies, and procedures, or answers to customer questions.
The CIA triad refers to an information security model made up of the three main components: confidentiality,
integrity and availability.
The three components of the CIA triad are
Confidentiality involves the efforts of an organization to make sure data is kept secret or private. To accomplish
this, access to information must be controlled to prevent the unauthorized sharing of data—whether intentional or
accidental. For example, those who work with an organization’s finances should be able to access the spreadsheets,
bank accounts, and other information related to the flow of money. However, the vast majority of other employees—
and perhaps even certain executives—may not be granted access.
Integrity Integrity involves making sure your data is trustworthy and free from tampering. The integrity of your data
is maintained only if the data is authentic, accurate, and reliable. For example, if your company provides information
about senior managers on your website, this information needs to have integrity. If it is inaccurate, those visiting the
website for information may feel your organization is not trustworthy.
Availability: This means that the information is available to authorized users when it is needed. for example, there
is a power outage and there is no disaster recovery system in place to help users regain access to critical systems,
availability will be compromised.
Information Security
There are three different types of information security controls used to protect data.
Physical Control: Physical controls are the simplest form of information security. These are
the things that can actually be touch and seen, such as password-protected locks to avoid
unauthorized entry to a secure server room, alarm systems, fences and more.
Administrative Control: These controls mainly involve manual efforts to ensure data
security. These include enforcing policies, standards, guidelines and following procedures to
ensure business continuity and data protection. Some of the examples of administrative
controls include disaster recovery plans, internet usage policies and termination procedures.
Technical Control: These controls are considered the most effective of all because they
make use of the latest technologies and systems to limit access to information. Some of the
examples of technical controls include firewalls, anti-virus software, file permissions, access
control lists and cutting-edge data security technologies that are hard to penetrate.
Ethics in information security
Ethics can be defined as a moral code by which a person lives. For corporations, ethics can
also include the framework you develop for what is or isn’t acceptable behavior within
your organization.
In computer security, cyber-ethics is what separates security personnel from the hackers.
It’s the knowledge of right and wrong, and the ability to adhere to ethical principles while
on the job.
Simply put, actions that are technically compliant may not be in the best interest of the
customer or the company, and security professionals need to be able to judge these matters
accordingly.
Key principles in computer ethics
The Association for Computing Machinery (ACM) has created a Code of Ethics and Professional
Conduct for those who work in computer systems. This code includes:
1) General Ethical Principles: These ground rules detail honesty, respect for privacy issues and
intellectual property rights, and refrain from discrimination and other potential forms of harm.
2) Professional Responsibilities: This portion of the code refers to a professional’s responsibility to
the field by performing the work to the best of his or her ability and maintaining a high level of
competence. This category also mentions the increase of public awareness of their work and the
ability to accept review when needed.
3) Professional Leadership Principles: Computer science professionals are asked to work towards the
public good, improve working life for their colleagues, and encourage other members of the field to
learn and grow.
These principles are merely suggestions, but they provide a good starting place for discussing ethics
within the field.