.

Tuesday, November 12, 2019

Information systems technology Essay

Abstract This paper discusses the scope of Information systems technology. Information Systems Technology can be defined as the use of electronic programs and machines and for storage, processing, presentation and transfer of information. Information Systems Technology also includes technologies of speech processing, speech recognition, speaker recognition (identification, verification, and authentication), word spotting, language and dialect identification, speech coding, and speech and audio signal enhancement. It is also inclusive of Machine learning, Information Assurance, detecting and interpreting attacks against large-scale network infrastructures, securing cyberspace, and evaluating the usage of various tools various environments. For Information Systems Technology to be adequate, static and dynamic analysis of software should be performed regularly, to uncover any vulnerabilities, correlate and prioritize alerts from network security devices, analyze attacks and potential propagation vectors against computer networks, and develop practical solutions of cryptographic protocols and approaches. Introduction It has been said that Survival is a matter of instinct which requires insight to succeed. Information technology is an absolute necessity for any individual or organization that wants to survive in this ever changing world. Information systems technology can be defined as the use of electronic machines and programs for the processing, storage, transfer and presentation of information. When the emphasis was on processing the terms electronic data processing EDP was common in earlier days. All aspect of human life is permeated by information technology; it is no longer confined to high number- crunching machines housed in air- conditioned computer halls. As evident to all, communication technology is today an important part of it. Devices such as the photocopying machine, telephone and the telefax and not only computers and their software should be included in our definition of information technology. Nowadays the use of information technology is no longer confined to huge number-crunching machines housed in air-conditioned computer halls but permeates all aspects of everyday life. Communications technology is today an important part of IT. Not only computers and their software, but also devices such as the telephone, the photocopying machine and the telefax should thus be included in our definition of information technology. Many of the functions of these devices are in fact increasingly integrated. With the latest generation of laptops computers, and is already possible to send and receive faxes and emails. Recently, many mobile phones which incorporate small microcomputers have started to appear on the market much more. (Bo-Christer Bjork 1999) Overview. Information technology and the systems that process it are among the most valuable assets of any organization. Fundamental management responsibility is adequate security of these assets. Each agency must implement and maintain a program to adequately secure its information and system assets, something that is consistent with office of Management and Budget (OMB). There is also increased integration in many functions of these devices Consistent with Office of Management and Budget (OMB) policy, each agency must implement and maintain a program to adequately secure its information. Agency programs must: 1) assure that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability; and 2) protect information commensurate with the level of risk and magnitude of harm resulting from loss, misuse, unauthorized access, or modification. Description of Framework The Framework approach begins with the premise that all agency assets must meet the minimum security requirements of the Office of Management and Budget Circular. The criteria that are outlined in the Framework and provided in detail in the questionnaire are abstracted directly from long-standing requirements found in statute, policy, and guidance on security and privacy. It should be noted that an agency might have additional laws, regulations, or policies that establish specific requirements for confidentiality, integrity, or availability. Each agency should decide if additional security controls should be added to the questionnaire and, if so, customize the questionnaire appropriately. (Federal Information Technology Security Assessment Framework 2000). References Bo-Christer Bjork (1999) Information technology in construction: domain definition and research issues. International Journal of Computer Integrated Design and Construction, SETO, London. Volume 1, Issue 1, pp. 1-16 Federal Information Technology Security Assessment Framework (2000) Prepared for Security, Privacy, and Critical Infrastructure Committee by National Institute of Standards and Technology (NIST) Computer Security Division November 28, 2000 The NIST Self-assessment Questionnaire will be issued in 2001 as a NIST Special Publication. Swanson, M (2001) Security Self-Assessment Guide for Information Technology Systems.

3 comments:

  1. Much obliged to you for such an elegantly composed article. It's brimming with keen data and engaging portrayals. Your perspective is the best among many.spss help

    ReplyDelete
  2. This article is the peak of a genuine request of the considerable number of information It has valuable and what's more charming articles.An obligation of appreciation is all together for taking the opportunity to bestow this to the world. I genuinely esteem this. Keep doing what you're doing.my crm system

    ReplyDelete
  3. Decent blog..I am truly intrigued with your post my crm system

    ReplyDelete