Page 43 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 43
Unit 3: Building Blocks of Information Security
2. Tactical Information: Tactical information is needed to take medium range decisions and Notes
usually the time period it covers is around one year. Tactical information includes sales
analyses and forecasts, financial projections, production resource requirements and the
annual financial statements. Usually, the data for this type of information is generally
based on current activities and transactions. This requires immediate generation and
processing of data. Tactical decisions require information from several sources, both
internal and external, before making decisions.
3. Operational Information: Operational information is required for routine operations of
a business organization. This information applies to very short-term period, which may
vary from an hour to a few days. It includes information about current stocks-in-hand,
outstanding purchase orders, inventory reorder level, and customers’ outstanding orders
etc. Almost all the operational information is generated internally.
!
Caution Depending upon the different types of decisions made by the management,
information is supplied to them according to the needs of their decision.
Task Make distinction between strategic, tactical, and operational information.
Did u know? Operational information is derived from current activity data.
Self Assessment
Fill in the blanks:
14. ........................... information is the information needed for long range and strategic decisions.
15. ........................... information applies to very short-term period, which may vary from an
hour to a few days.
3.6 Summary
Information security is the prevention and protection of computer assets from unauthorized
access, use, alteration, degradation, destruction, and other threats.
No longer can security be viewed as a backroom operation, separate from the essential
activity of an organization.
Information assets are critical to any business and vital to the survival of any organization
in today’s globalize digital economy. Information leak is therefore intolerable.
Information security is required because most organizations can be damaged by hostile
software or intruders.
The major technical areas of information security are usually represented by the initials
CIA: confidentiality, integrity, and authentication or availability.
Maintaining access control means not only that users can access only those resources and
services to which they are entitled, but also that they are not denied resources that they
legitimately can expect to access.
LOVELY PROFESSIONAL UNIVERSITY 37