Wednesday, May 15, 2019
Definition of security in info. sys Essay Example | Topics and Well Written Essays - 500 words
Definition of gage in info. sys - Essay ExampleA very important view of such information systems is the ability to treasure the data and information obtained from unlicenced access, exploitation, addition, deletion, or modification. This is called as security of information system. Increased interconnectivity amongst various information systems has raised new issues and threats for the security of information systems. However it is ground on some core principles. First of these is Confidentiality. It refers to protecting personal privacy, and proprietary information from unauthorized access, and disclosure. If naked as a jaybird information such as Card Number No., SSN No., company strategy, transactions data for the company, passwords etc. leaks to unauthorized people, it may lead to large level of misuse by the thief. Second core principle is rightfulness which refers to preventing unauthorized information modification (addition, editing, and deletion). The integrity of dat a and information in an information system may suffer because in many cases like attack of virus/worms, hacking of websites, an employee being able to change cutting corporate information etc. Another important principle of Information system is to suck it faithfully and timely accessible to correct users. This aspect of the IS is called availability. This also includes preventing a website from Denial-of-Service Attacks.Information system professionals have to protect their corporate IS from various threats. The first kind of threat that can harm the security of IS is hacking, which refers to obsessive or unauthorized use of company computing machine and network resources. Often employees or outside people make unauthorized use of network, and make fraudulent transactions. This is called as cyber theft. Employees may also use corporate computer and networks for purposes such as e-mail abuses, pornography, and moonlighting. This unauthorized use at work is called time and resour ce theft. by from these,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.