Page 18 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 18
Information Security and Privacy
Notes An automated solution converging the three systems Proficio Geo Technologies on
Thursday announced the launch of its product that provides complete employee logistics
from design to security by helping them route planning and tracking of vehicles and
system-activated SMS for end-user reception to ensure security confidentiality and optimum
use of the vehicles, said Mr Shashidhar Joshua, Vice-President, Business Development.
Profico is the second company to announce a complete solution for the BPO company to
deal with their transportation logistics and employee security issues.
The system not only helps in bringing down the time taken for designing of logistics
planning considerably, it also provides a voice-cum- automatic alert facility in the cars for
the both the driver and the passenger to reach the automate help desk for quick relief at
times of emergencies.
Source: http://www.proficio.in/resources/press/http___www.thehindubusinessline.pdf
1.10 Summary
A system is defined as an organized collection of people, machines, procedures, documents,
data or any other entities such that they interact with each other as well as with the
environment to reach a predefined goal.
Information system is the study of information production, flows and use
within organizations. Information system makes extensive use of information technology
means.
The information system of an organization may be defined as a system that serves to
provide information within the organization when and where it is needed at any managerial
level.
An information system is a logically interrelated set of business processes that accomplish
organizational goals.
Telecommunication systems are considered as global. When developing infrastructures,
the focus on closed, stand-alone systems has to be replaced by one focusing on the
infrastructures as open and global as is the case for development of telecommunication
technologies.
The function of the World Wide Web is offered and assured by the web-hosting
organizations. These organizations are the groups of people, who have rooms, full of
prevailing computers, named host servers.
Security information management is a type of software that automates the collection of
event log data from security devices, such as such as firewalls, proxy servers, intrusion-
detection systems and anti-virus software.
A Security Information Management, to a great extent, adds value with its capability of
finding patterns in network traffic.
Security Information Managements (SIM) is by its very nature a heterogeneous
product, and thus SIM rollouts involve complex technical integration and political
negotiations.
1.11 Keywords
Information System: An information system is a logically interrelated set of business processes
that accomplish organizational goals.
12 LOVELY PROFESSIONAL UNIVERSITY