Home BMS Information System Security - BMS NOTES

Information System Security – BMS NOTES

Information System Security

Information systems security, more often known as INFOSEC, describes the procedures and approaches used to ensure the confidentiality, availability, and integrity of information.

It also alludes to:

Unauthorized personnel cannot enter or use a system due to access restrictions.

preserving data regardless of its location, even whether it’s in storage or in transit (like an email).

the identification, correction, and documentation of security breach incidents.

Information systems security includes safeguarding data and information in all of its forms, including phone calls, in addition to computer information.

It is necessary to conduct risk assessments to identify the information that is most dangerous. For instance, one system can contain the most crucial data, in which case it would need more security precautions to remain secure. Additional responsibilities of an information systems security specialist include catastrophe recovery and business continuity planning. This expert will help company to proceed as normal while making plans for potential outcomes in the event of a significant business interruption.

The term “MIS security” describes the safeguards used to keep information system resources safe from compromise or unwanted access. Security vulnerabilities are flaws in hardware, software, or computer systems that an attacker might use to get unauthorized access or compromise a system.

Social engineering methods may also be used to take advantage of people who are components of the information system. Gaining the system’s users’ confidence is the aim of social engineering.

malware on computers

These applications are harmful, as the section above explains. Viruses may be prevented or their effects reduced by using antivirus software and adhering to established security best practices within an organization.

Unauthorized entry

Using a username and password combination is usual practice. If users do not adhere to security best practices, hackers have discovered ways to get around these measures. To provide an additional degree of protection, the majority of firms have started allowing employees to utilize mobile devices, including phones.

Using Gmail as an example, if Google suspects improper login behavior, it will either send an SMS with a PIN number to verify the recipient’s identity in addition to the username and password, or it will ask the recipient to verify their identification using any Android-powered mobile device.

The business might use other strategies if it lacks the means to deploy additional security measures similar to those of Google. These strategies may include inquiring about a user’s upbringing, first pet, and other details throughout the registration process. The user is given access to the system if they respond to these questions accurately.

Data loss

The data on the hardware may be destroyed in the event of a fire or flood in the data center, damaging it. Most companies maintain data backups in faraway locations as basic security best practices. Periodically, backups are created and often stored in many distant locations.

Biometric identification is becoming more popular, particularly with smartphones and other mobile devices. The user’s fingerprint may be recorded by the phone and used for authentication. As a result, it is more difficult for attackers to access the mobile device without authorization. You may also employ such technologies to prevent unauthorized individuals from accessing your gadgets.

Information Security System Ethics and Security Concerns

Nowadays, a lot of firms are successful because to information systems. Without information technology, certain businesses, like Google, Facebook, eBay, and others, would not be able to operate. On the other hand, mishandling information technology may lead to issues for both the company and its staff.

If credit card information is obtained by criminals, the cardholders or financial institution may suffer financial loss. Using corporate information systems, such as sharing offensive material on Facebook or Twitter using an official company account, may result in legal action and perhaps financial loss.

  • Cyber-crime
  • Information system Security
  • Information system Ethics
  • Information Communication Technology (ICT) policy

ALSO READ