Sie sind auf Seite 1von 4

Casas, Patrick Ian M.

MGT112/ BY02

Information System
1. What is Information System?
-

IS is a system composed of people and computers that processes or interprets


information.
It is an integrated set of components for collecting, storing, and processing data and
for delivering information, knowledge, and digital products.
It is the software and hardware systems that support data-intensive applications.

2. What are some samples of Information System being used by the


government?
-

The Government Communication and Information System are both coordinating to


each other to facilitate and strategize the role for all government communication and
to provide a cost-effective communication service to the general public.
The IS is responsible for producing government information, such as the Government
Directory, Directory of Contacts, Media Directory, Profile and Guide to Philippines
Government Departments, and directories of information resources available in
Government. During its first year, GCIS produced or assisted with strategies for 50
communication campaigns, and is helping to build communications capacity across
Government.

3. Organizational Information System Structure

Casas, Patrick Ian M.


MGT112/ BY02

4. System Life cycle of IS

5. Information System Security Measures


There are ten effective security measures that can be use in IS and those are
the :
a. Establish strong passwords
Implementing strong passwords is the easiest thing you can do to
strengthen your security.

b. Put up a strong firewall


In order to have a properly protected network, "firewalls are a must,"
Cloutier says.

c. Install antivirus protection


Antivirus and anti-malware software are essentials in your arsenal of
online security weapons, as well.

d. Update your programs regularly


Making sure your computer is "properly patched and updated" is a
necessary step towards being fully protected; there's little point in installing
all this great software if you're not going to maintain it right.
e.

Secure your laptops


Because of their portable nature, laptops are at a higher risk of being lost
or stolen than average company desktops. It's important to take some
extra steps to make certain your sensitive data is protected.

f. Secure your mobile phones


Cloutier points out that smartphones hold so much data these days that

Casas, Patrick Ian M.


MGT112/ BY02

you should consider them almost as valuable as company computers -and they're much more easily lost or stolen. As such, securing them is
another must.

g. Backup regularly
Scheduling regular backups to an external hard drive, or in the cloud, is a
painless way to ensure that all your data is stored safely.

h. Monitor diligently
One good monitoring tool Cloutier suggests is data-leakage prevention
software, which is set up at key network touchpoints to look for specific
information coming out of your internal network. It can be configured to
look for credit card numbers, pieces of code, or any bits of information
relevant to your business that would indicate a breach.
i.

Be careful with e-mail, IM and surfing the Web


It's not uncommon for a unsuspecting employee to click on a link or
download an attachment that they believe is harmless
only to discover they've been infected with a nasty virus, or worse.

j. Educate your employees


Teaching your employees about safe online habits and proactive defense
is crucial.

6. What is Information Technology Security?


Information technology security is also known as IT Security. As society has
widened, the significance of sharing and securing the important resource of
information has increased. The information security was limited to controlling
physical access to oral or written communications. The importance of information
security led the societies to develop innovative ways of protecting their information.
It is a controlling access to sensitive electronic information so only those with a
legitimate need to access it are allowed to do so. There are three main objective for
information technology security and these are confidentiality, integrity and
availability of data. The first is protecting access to sensitive data from those who
dont have a legitimate need to use it. The second is ensuring that information is
accurate and reliable and cannot be modified in unexpected ways. The last is to
ensure that the data are readily available to those who need to use. It is often the
challenge of balancing the demands of users versus the need for the data
confidentiality and integrity.

Casas, Patrick Ian M.


MGT112/ BY02

Das könnte Ihnen auch gefallen