Page 43 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 43

Unit 3: Building Blocks of Information Security




          2.   Tactical Information: Tactical information is needed to take medium range decisions and  Notes
               usually the time period it covers is around one year. Tactical information includes sales
               analyses and forecasts, financial projections, production resource requirements and the
               annual financial statements. Usually,  the data for this type of information is generally
               based on current activities and transactions. This requires  immediate generation  and
               processing of  data. Tactical decisions require  information from several sources,  both
               internal and external, before making decisions.
          3.   Operational Information: Operational information is required for routine operations of
               a business organization. This information applies to very short-term period, which may
               vary from an hour to a few days. It includes information about current stocks-in-hand,
               outstanding purchase orders, inventory reorder level, and customers’ outstanding orders
               etc. Almost all the operational information is generated internally.

               !
             Caution Depending upon  the different types of  decisions made  by the management,
             information is supplied to them according to the needs of their decision.




              Task  Make distinction between strategic, tactical, and operational information.




             Did u know? Operational information is derived from current activity data.
          Self Assessment


          Fill in the blanks:
          14.  ........................... information is the information needed for long range and strategic decisions.
          15.  ........................... information applies to very short-term period, which may vary from an
               hour to a few days.

          3.6 Summary

              Information security is the prevention and protection of computer assets from unauthorized
               access, use, alteration, degradation, destruction, and other threats.
              No longer can security be viewed as a backroom operation, separate from the essential
               activity of an organization.

              Information assets are critical to any business and vital to the survival of any organization
               in today’s globalize digital economy. Information leak is therefore intolerable.
              Information security is required because most organizations can be damaged by hostile
               software or intruders.
              The major technical areas of information security are usually represented by the initials
               CIA: confidentiality, integrity, and authentication or availability.

              Maintaining access control means not only that users can access only those resources and
               services to which they are entitled, but also that they are not denied resources that they
               legitimately can expect to access.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   37
   38   39   40   41   42   43   44   45   46   47   48