Page 19 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 19

Unit 1: Information Systems




          Security Information Management: It is a type of software that automates the collection of event  Notes
          log data  from security devices, such as such as firewalls, proxy servers, intrusion-detection
          systems and anti-virus software.
          System: A  system  is  defined as  an organized  collection  of  people, machines, procedures,
          documents, data or any other entities such that they interact with each other as well as with the
          environment to reach a predefined goal.

          1.12 Review Questions

          1.   What is information system? Also explain the importance of information system.
          2.   Elucidate the concept of global information system.

          3.   Explain the function of internet and web services in global information system.
          4.   Discuss the necessity of information system security for an organization.
          5.   Explain the working of information system security.

          6.   Illustrate the advantages and disadvantages of information system security.
          7.   Scrutinize the trait for traditional telecommunication solution.
          8.   Information systems overlap with both the computer science and business management
               disciplines. Comment.
          9.   Discuss the  assumptions on which traditional approaches to  information systems are
               based upon.

          10.  Identify the standards defined by web services.
          Answers: Self  Assessment


          1.   Information System                2.  system
          3.   Sub-system                        4.  managerial
          5.   processing                        6.  target
          7.   telecommunication                 8.  web-hosting

          9.   internet                          10.  Simple Object Access Protocol (SOAP)
          11.  host server                       12.  Security information management (SIM)
          13.  highest                           14.  traditional
          15.  heterogeneous

          1.13 Further Readings




           Books      An Introduction to Computer Security: The NIST Handbook

                      Managing Enterprise Information Integrity: Security, Control and Audit Issues, By IT
                      Governance Institute
                      Principles of Information Security by Michael E. Whitman and Herbert Mattord;

                      Risk Management Guide for Information Technology Systems



                                           LOVELY PROFESSIONAL UNIVERSITY                                   13
   14   15   16   17   18   19   20   21   22   23   24