Question

In: Computer Science

Principles of Information Security Using nothing less than 1000 words Identify and explain in details the...

Principles of Information Security

Using nothing less than 1000 words Identify and explain in details the six components of an information system. Which are most directly affected by the study of computer security? Which are most associated with its study?

Solutions

Expert Solution

The six components of an information system are:

Hardware

Hardware is the most obvious part of a computer-based information system. Hardware refers to the computers themselves, along with any and all peripherals, including servers, routers, monitors, printers and storage devices. A CBIS may use a single computer or thousands.

Software

Without software, the hardware wouldn't be very useful. Software, the second element of a CBIS, is what tells the hardware how to function. It gathers, organizes and manipulates data and carries out instructions. Everything you do using a computer is done by the software.

Data

Data, or information, is the third element of a CBIS. Just as hardware cannot function without software, software cannot function without data. This is the information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animations, it is all key to a CBIS.

Procedures

It is commonly said that "procedures are to people what software is to hardware." The fourth element of CBIS, procedures are the rules, descriptions and instructions for how things are done. In computer-based information systems, procedures are frequently covered in instruction or user manuals that describe how to use the hardware, software and data.

People

People are the most often overlooked and most important part of a computer-based information system. It is people who design and operate the software, input the data, build the hardware and keep it running, write the procedures and it is ultimately people who determine the success or failure of a CBIS.

Communication

Communication is left out of some lists of CBIS elements, but for a CBIS that involves more than one piece of hardware to function, communication or connectivity is a necessity. This is, in part, because parts of it are covered under hardware. The components that allow one computer to communicate with another are hardware and are controlled by software. If communication between people is included in this element, though, it is an important element.

The most directly affected by the study of computer security are Software and Data.

The most associated with its study are People.


Related Solutions

Principles of Information Security Using nothing less than 1000 words Identify and explain the six components...
Principles of Information Security Using nothing less than 1000 words Identify and explain the six components of an information system. Which are most directly affected by the study of computer security? Which are most associated with its study?
Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List...
Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List and describe the five selecting control strategies for controlling risk.
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and...
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and nondiscretionary access controls (NDACs)
Principles of Information Security Using about 1000 words List and describe which members of an organisation...
Principles of Information Security Using about 1000 words List and describe which members of an organisation are involved in the security systems development life cycle. Who leads the process?
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change...
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change management model.
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
In no than less than 200 words, explain a package policy and the advantages of a...
In no than less than 200 words, explain a package policy and the advantages of a commercial package policy to a business frim as compared to the purchase of separate policies.
In no less than 200, but no more than 300 words explain to the class your...
In no less than 200, but no more than 300 words explain to the class your definition of Quality of Care. Make sure that your definition is in your own words, you provide references in your definition, and you format your writing in APA style.
What information must be included in a tax invoice for supplies of less than $1000? List...
What information must be included in a tax invoice for supplies of less than $1000? List six of those information and give brief description of each one of them and provide an example for each one of them. (Please consider this is in Australian Taxation Environment) (Please type up your answer)
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Compare and contrast audits and assessments. •Pick at least 3 things that are the same and 3 things that are different. •Compare the goals, the timing, and the roles that are involved.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT