Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

INFORMATION SYSTEM FOR MANAGERS

ANSWER:01
Introduction
The modern organisations being highly networked, is constantly under threats from harmful
software and from the malicious intent of certain people. Nowadays many banks and their
customers are facing the threat issues, and this should be reduced for the smooth working of
the organisation. Many technologies have evolved to address the threats from the internal and
external environment of the organisation. These technologies protect data by encrypting it or
protect organisation by monitoring incoming and outgoing network traffics. All modern
organisations use information system that are networked and connected to the external world
via the internet. The threats to the modern information systems environment are many and
varied.

CONCEPT AND APPLICATION


Banks in today’s time faces various threats to their working software and the organisation.
Here are some of the major 5 security threats that a bank may face in today’s time.
➢ Unencrypted data
➢ Malware
➢ Cracking and hacking
➢ Spoofing
➢ Phishing and identity theft

1. Unencrypted data: This is very basic yet crucial part of goods cyber security.
All data stored in computers within your financial institution and online
should be encrypted. Even if your data is stolen by the hacker, it cannot be
immediately used by them if it’s encrypted if left unencrypted hackers cam use
the stolen data right away which may create a serious problem for your
financial institution.

2. Malware: Malicious external software that poses a threat to the security of


organisation comes in many forms. One of the most widely prevalent threats is
that of viruses which are software packages that harm the organisations
information technology assets. Viruses typically enters the organisation
through various application of the internet or through devices such as USB
memory sticks, and then spread within the network to many hosts.

3. Cracking and hacking: Cracking is the act of breaking into computers or


computer network illegally. This is usually done by the expert programmers
who find ways to break into networks by identifying weakness in their security
or by uncovering passwords or some such method that is strictly illegal.
Hacking refers to the same act, but sometimes hacking is also done for use of
stealing the financial data. It is the act of compromising digital devices and
network through unauthorized access to an account or computer system.

4. Spoofing: A newer type of cyber security is spoofing where hackers will find
a way to impersonate a banking websites URL with a website that looks and
functions the same as original. When a user enters his or her login id, that
information is then stolen by the hackers to be used later. Even more
concerning is that new spoofing technique do not use a slightly different but
similar URL they are able to target users who visited the correct URL.

5. Phishing and identity theft: It is another cyber crime that is perpetrated


through social engineering. It is done with fake websites that masquerade as
real ones. The idea of phishing is identity theft, where crackers are
manipulating unsuspecting users into revealing personal details that they can
exploit later.

Five mechanisms to ensure that such threats do not harm the retail store chain are,
I. Encryption
II. Firewall
III. Virtual private network
IV. Wireless sensor network
V. Wi-fi route

Conclusion:
It is very important nowadays to use proper technology to safe guard our personal assets. Use
of proper technology helps to reduce threats to the organisation and also helps in smooth
running of the organisation. Need of new technology every day is important to ensure the
safety in the organisation, the impact of IT in every field has made a lot of difference and has
made the world easy to work upon.
Information technology can help by providing web access for customers, and by making
information available to customers. For the final conclusion information technology is
essentially a wide and varied field and speed up the new products to reach the market.

ANSWER: 02
Introduction
e-governance can be defined as the application of information and communication
technology (ICT) for providing government services, exchange of information, transaction,
integration of previously existing service and information.
e-governance has made country people to access to the required information easily and it
helps the poor and needy people to get their required data at their own locations.
I as a student has chosen the country INDIA to show how it has helped the poor and needy
people of its country by implementing e-governance in the country.

Initiatives Taken for e-Governance in India


Program Details
1. Bhoomi Project (Karnataka): Online Delivery of Land Records. Bhoomi is a self-
sustainable e-Governance project for the computerized delivery of 20 million rural land
records to 6.7 million farmers of Karnataka.
2. Khazana (Karnataka): End-to-end automation of Government Treasury System
Government-to-Government (G2G) e-Governance initiative of the Karnataka State
Government. It has been implemented mainly to eliminate systemic deficiencies in the
manual treasury system and for the efficient management of state finances.
3. e-Seva (Andhra Pradesh): Designed to provide ‘Government to Citizen’ and ‘e-Business
to Citizen’ services. All the services are delivered online to consumers /citizens by
connecting them to the respective government departments and providing online information
at the point of service delivery. The project has become very popular among the citizens
especially for the payment of utility bills.
4. e-Courts: Launched by the Department of Justice, Ministry of Law and Justice. The
Mission Mode Project (MMP) aims at utilizing technology for improved provisioning of
judicial services to citizens.
5. e-District: Launched by the Department of Information Technology. The MMP aims at
delivery of high volume, citizen-centric services at the district level such as the issue of
birth/death certificate, income and caste certificates, old age and widow pension, etc.
6. MCA21: Launched by the Ministry of Corporate Affairs. The project aims to provide
electronic services to the Companies registered under the Companies Act.Various online
facilities offered includes allocation and change of name, incorporation, online payment of
registration charges, change in address of registered office, viewing of public records and
other related services.
7. e-Office: Launched by the Department of Administrative Reforms & Public Grievances.
The MMP aims at significantly improving the operational efficiency of the Government by
transitioning to a "Less Paper Office".
The benefits of having these above systems are,
1. Enhanced transparency and accountability.
2. Expanded reach of governance.
3. Improved public administration.
4. Enables environment for promoting economic development.
5. Less corruption in administration.
6. Cost reduction and revenue growth.
7. Increased legitimacy of government.
8. More efficient government management.
9. Reduces paper work.
10. Improves relationship between public and civil society.
Conclusion:
e-Governance is getting momentum in India, but public awareness and the digital divide are
important issues to be addressed.
The success of e-Governance measures largely depends on the availability of high-speed
internet, and the nation-wide roll-out of 5G technology in the near future will strengthen our
resolve.

ANSWER: 03
Introduction:
Governments and organisations in various parts of the world are in search of solutions to
urban problems such as scarcity of water and other resources, traffic gridlocks, and crime.
Traditional methods of governance are failing to address these emerging challenges of
urbanisation, especially in the face of a huge and growing urban population. In this respect,
one idea that has evolved is that of creating ‘smart cities.’
I choose Gujrat as a benchmark to emulate some of the best practices of that city into
Mysuru.
Three reasons for choosing Gujrat are,
1. Education: At the Senior Secondary School, classrooms have been equipped with
projectors and digital boards that are used with video tutorials to make it easy for
students to learn various theoretical concepts. As mentioned in one source, smart
classrooms are helping to improve the performance of students as well as teachers.

2. Smart Electricity Meters: To enhance consumer convenience, all conventional


meters have been replaced with smart meters by the state in partnership with Energy
Efficiency Services Limited. Smart meters help check data entry errors, reduce billing
inefficiencies, and cut the costs of manual meter reading by using a web-based
monitoring system instead. It is expected that the use of smart meters will result in
savings worth crores of rupees. The GPRS-enabled meters, which are integrated with
the IT system, allow consumers to track energy usage from their mobile phones; a
smart meter tab is added to the state App home page to keep the consumers informed
about their energy consumption habits.

3. Smart Motor Vehicle Parking: Connaught Place (CP) is one of the most happening
places in Gujrat. Every day thousands of people, including foreign tourists, visit CP
for shopping and recreation. Most people prefer to travel to CP in private motor
vehicles (cars, SUVs, two-wheelers), and thus the area receives a large number of
vehicles. CP has several areas designated as surface parking lots. For the convenience
of motorists, and to better utilise parking spaces, the lots are being upgraded under the
SCM.

Content source: Google and college text book

You might also like