Professional Documents
Culture Documents
Information Systems For Managers
Information Systems For Managers
Q1.
Answer 1:
These days everything is moving online and we can pay our bills from anywhere
using net banking or our debit or credit card. Online transactions are timesaving,
convenient, and popular. However, there is risk of cyber theft involved for those who
don’t take all the required precautions for safe transactions. Cybercrime can range
from security breaches to identity theft. Cybercriminals use different methods to
capture information people enter on sites by targeting computer networks or devices,
such as credit card or debit card information.
Businesses need to protect themselves and their customers personal details from
these fraudulent crimes. Retail sector needs to adopt higher data security measures
for customer data protection due to challenges posed by the government and their
regulations.
5 security threats
Phishing - It is a social engineering attack used by cybercriminals to steal user
personal data such as login credentials and credit card numbers. Phishing is a scam
where cybercriminals impersonate legitimate organizations usually via email.
Spoofing - Spoofing is a cybercriminal activity used to set up fake or mirror sites that
pretend to be the official website of a particular firm. These spoofed sites collect
login details, and stealing credit card information.
Malware - It is software program delivered over the network that alters and modifies
the IS without the authority of the user or owner. It affects the confidentiality,
availability and integrity of the working system.
Data breach - It is a threat that allows confidential information to be exposed to
unauthorized person and makes it viewable to others, so that anyone can steal or
use the other user information.
Distributed Denial of Service (DDOS) attack - It is a cybercrime where users are
unable to access information systems, devices, or other network resources. DDOS
involves hundreds or more computers to launch the attack to the targeted working
system. Businesses experience loss of money, customers and information.
5 Innovative IT security mechanisms
Identity management: Identity management is an organizational process for
validating, identifying, and authorizing individuals or groups of people to have access
to the critical information with established identities. It is to make sure that the
unrelated and unwanted people should not get access to the critical information or
any such information which is not meant to be leaked out.
Firewalls and antivirus system: A firewall is network security device that provides
protection by controlling incoming and outgoing network traffic based on the
implemented security rules. The main purpose of firewall is to keep bad things out of
the protected network environment.
An antivirus is a software designed to detect and neutralize malicious software from
the computer system. Antivirus is important for any business to protect the
computers against viruses such as phishing attacks, worms, Trojan horses, and
more. These days virus attacks are very common, these viruses can easily enter an
unprotected system through emails, external drives, unknown downloads etc and
can steal data from the system. To protect the computer system an organisation
must install antivirus software into their computer systems.
Access control and authorization: Access control is s security policy that allows or
restrict access to computer data to individuals or parties. Only the authorized parties
are given access for reading, viewing, printing, etc. This is called privacy. Access
control and authorization is very important aspect of any organization as it secures
the right of the organization towards the data which it is willing to share or not.
Encryption: Encryption is a technique where the “plain text” is converted into “cipher
text”. The encryption and decryption of data is called cryptography. Encryption stops
cybercriminals to access the data.
The e-governance initiatives in India face the twin challenges of automating the
government departments and taking the on-line services to the common man. While
there are standard approaches available for the former, the later needs innovations
to suit the Indian needs.
Advantages of E-Governance
Providing information: E-governance can provide various information to the
citizens which can be related to political processes, services and choices.
Mysuru is one of the cleanest and attractive cities in India. With the help of technological
assistance, we can make our life convenient and better. In this way, we can make Mysuru city
as smart city. There are many smart cities in the world, but we will take one smart city as
benchmark and emulate the best practices of that city into Mysuru.
Better transport system: In Bhopal, you will find well managed transport system as well as
Intelligent Traffic Management System (ITMS) proactively manage the ongoing traffic
situation, enhance traffic discipline . The Habibganj railways station is developed according to
international standards. It is India’s first world-class railway station. In order to make Mysuru
a smart city, the government needs good transport system as well so this is the first reason, I
have chosen Bhopal.
Waste management: Bhopal is India’s second cleanest city. The waste management system
is very effective. The waste is managed via technology with smart sensors in the bins. This
system is used to reduce the cost and time required for waste management service. In any
developed city, you need to have proper waste management system which should be there in
Mysuru as well.
(3b):
Smart city
For a city to become smart, it requires to smartly manage the various resources such as water,
energy and other natural resources as well as taking smart care of transportation,
infrastructure, etc. so that there will be a growth in investment, trade, jobs, economy,
education, living standards, etc. The foundation of such a growth should be such that it is
sustainable. Cities should be enabled in such a way as to smartly manage the existing
capacity, resources and the infrastructure. The various factors that should be taken into
consideration for a smart city project are:
Infrastructure
Economy
Mobility
Environment
People
Living
Governance
Smart Roads
Smart roads incorporate the use of sensors and IoT technology that makes driving easier and
safer. These roads provide drivers with real-time information about weather and road
conditions. They can also help drivers to find free parking space and prevent accidents by
alerting drivers about incoming traffic. These roads are particularly useful on mountain roads
where landslides are a common occurrence. Roads that are fitted with electric vehicle
charging capabilities can also charge electric vehicles running over them with the help of
electromagnetic effects. In cities like Mysuru which is a preferred travel destination
especially for south people, it is really important to have smart roads.