Components of an information system, Computer Network Security

Assignment Help:

COMPONENTS OF AN INFORMATION SYSTEM

The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to enable information to be input, then processed, output and finally stored. Each of these components of information system has its own weakness and strength.

Software


The software components of information system are consisting of applications, operating system and utility programs. This software is the most difficult to information system component to secure. Unfortunately, Software is at root of all the common computer security problems. If your software does not behave properly, a number of diverse sorts of problems can crop up: availability, reliability, safety, and security. The extra twist in security situation is that a bad guy is actively trying to make your software misbehave. This makes security certainly a tricky proposition.

Hardware

Security should be intertwined with every part of the system; the hardware is no exception. The interaction between software and hardware must be carefully planned. While doing so, the security of the whole system is strengthened. Hardware Security Module (abbreviated as HSM) is a physical device in form of a plug-in card or an external security device which can be attached to general purpose computer and servers.

The goals of an HSM are the:

a) Secure generation,
b) Secure storage, and
c) The use of cryptographic and data material which is sensitive.

HSMs provide logical and physical protection both of these materials from non- authorized use and potential adversaries. Several HSM systems have means to securely backup the keys they handle either in a wrapped form by means of the computer’s operating system or externally using a smartcard or some of the other security token. HSMs should never allow secrets exportation in the plaintext form, even when migrating between HSMs and performing the backup operations

Data Security

Data stored, processed, and transmitted through computer system should be protected. Data is the valuable asset possessed by an organization and it is the key target of intentional attacks.

People

People are the critical link in the information security program. Though often overlooked in computer security considerations, people have always acted as a thread to information security. Unless policy, training, education, awareness and technology are properly employed to prevent people from accidentally or intentionally damaging or losing the information, they will remain the weak link. Social network engineering can prey on potential to cut corners and the commonplace nature of human error. It can be used to manipulate actions of people to obtain access information about the system. It is imperative that managers continuously recognize the important role that people play in information security program

Procedures

Procedures are written instructions for accomplishing the specific task. When unauthorized user obtains an organization’s procedures, this poses a threat to integrity of the information. Procedures are information in their rights. Thus, knowledge of procedure, as with all critical information should be disseminated among the members of organization only on a need to know basis.

Networks

The IS component which created much of the requirement for the increased computer and information security is networking. When information systems are linked to each other to form the local area network (LAN), and these LAN’s, and these LAN’s are connected to the other networks like the Internet, new security challenges emerges rapidly.


Related Discussions:- Components of an information system

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Network-based ids (nids), Network-Based IDS (NIDS) A NIDS resides on com...

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

Encapsulation, ENCAPSULATION Network interface layer adds IP datagram ...

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

What do you understand by environmental accounting, Question : Environm...

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Ip datagram format, IP DATAGRAM SIZE:  Datagrams may have different si...

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

What is triple key management scheme, Q. What is Triple Key Management Sche...

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Direct indexing, DIRECT INDEXING It is less usually known method. It i...

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Systems development life cycle (sdlc)-information security, SDLC Systems ...

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Explain the dimension of service quality, Problem 1: Discuss how TWO of...

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

What is the use of digital certificate, Question: (a) What is the use ...

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd