Question

In: Computer Science

Principles of Information Security Using nothing less than 1000 words Identify and explain the six components...

Principles of Information Security

Using nothing less than 1000 words Identify and explain the six components of an information system. Which are most directly affected by the study of computer security? Which are most associated with its study?

Solutions

Expert Solution

Information System:

An information system is a set of practices intended to keep data secure from unauthorized access or alterations.

Computer Security:

Computer security is the assurance of protection to the computer systems that store confidential data from the threats.The security is given to both hardware and software components.

The six components of an information system are:

1.Software:

The programs/application program used to control and coordinate the hardware components.It is used for analysing and processing of the data.These programs include a set of instruction used for processing information.

2.Hardware:

Physical equipment used for input,output and processing.What hardware to use it depends upon the type and size of the organization.It consists of input,an output device,operating system,processor, and media devices.This also includes computer peripheral devices.

3.Data:

This is the primary target of thieves.Proprietary and confidential personal data is a particularly source of income for criminals,especially in the fields of industrial and identity theft.

4.People:

The users or system operators who have the knowledge of accessing data present in system.

5.Procedure:

The policies which are used to govern the process in a secured manner to complete the task assigned.

6.Network:

Networks resources refer to the telecommunication networks like the intranet,extranet and internet.These resources facilitate the flow of information in the organisation.

Networks include communication media, and Network Support.

  

Of these six components data is most critical and therefore the most directly affected by the study of computer security.However in the order to make data secure.


Related Solutions

Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List...
Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List and describe the five selecting control strategies for controlling risk.
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and...
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and nondiscretionary access controls (NDACs)
Principles of Information Security Using about 1000 words List and describe which members of an organisation...
Principles of Information Security Using about 1000 words List and describe which members of an organisation are involved in the security systems development life cycle. Who leads the process?
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change...
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change management model.
Explain what an information security blueprint is, identify its major components, and explain how it supports...
Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
In no than less than 200 words, explain a package policy and the advantages of a...
In no than less than 200 words, explain a package policy and the advantages of a commercial package policy to a business frim as compared to the purchase of separate policies.
In no less than 200 words, discuss: Of the six market segments, discuss how "actionable" will...
In no less than 200 words, discuss: Of the six market segments, discuss how "actionable" will ensure the quality of service meets/exceeds your  web development client expectations.
In no less than 200, but no more than 300 words explain to the class your...
In no less than 200, but no more than 300 words explain to the class your definition of Quality of Care. Make sure that your definition is in your own words, you provide references in your definition, and you format your writing in APA style.
What information must be included in a tax invoice for supplies of less than $1000? List...
What information must be included in a tax invoice for supplies of less than $1000? List six of those information and give brief description of each one of them and provide an example for each one of them. (Please consider this is in Australian Taxation Environment) (Please type up your answer)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT