Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 43

INFORMATION SYSTEMS

OVERVIEW

Information Systems and Management


AN INTRODUCTION TO
INFORMATION SYSTEMS

Information System:
An information system is a set of interrelated components that
collect, manipulate, store data and disseminate information
and provide a feedback mechanism to monitor performance.

ICT Components of IS
five Basic Components of ICT are.....

Storage devices.
Input devices.
Output devices.
Processor.
Communication devices.
WHAT IS AN INFORMATION
SYSTEM? (COMPUTER-BASED)

An organized combination of people, hardware,


software, communications networks, and data
resources that collects data, transforms it, and
disseminates information.
DATA VS. INFORMATION

Data
Raw facts such as an employee’s name and number of hours worked in a week,
inventory part numbers or sales orders.
Information
A collection of facts organized in such a way that they have additional value
beyond the value of the facts themselves.

Data Information

$35,000 12 Units $12,000 Salesperson: J. Jones Sales


J. Jones Western Region Territory: Western Region
$100,000 100 Units 35 Data Processing Current Sales: 147 Units =
Units $147,000
INFORMATION CONCEPTS

Process:
A set of logically related tasks performed to achieve a defined
outcome.

Knowledge:
An awareness and understanding of a set of information and
ways that information can be made useful to support a
specific task or reach a decision
THE VALUE OF INFORMATION

The value of Information is directly linked to how it helps


decision makers achieve their organization’s goals.
SYSTEM

A system is a set of elements or


components that interact to
accomplish goals.
CBIS

Hardware:
Computer Equipment

Software:
Computer Programs

Databases:
An organized collections of facts
CBIS

Telecommunications:
Electronic transmission of signals for communication

 Networks: Distant electronic communication


 Internet: Interconnected Networks
 Intranet: Internal Corporate Network
 Extranet: Linked Intranets
CBIS

People

Procedures:
Strategies, policies, methods, and rules
for using a CBIS.
BUSINESS INFORMATION
SYSTEMS
BUSINESS INFORMATION
SYSTEMS
Management Information System:
A system used to provide routine information to
managers and decision-makers

Decision Support System:


A system used to support problem-specific decision
making
SPECIALIZED BUSINESS I.S.

Artificial Intelligence (AI):


A field in which the computer takes on the characteristics of human
intelligence
Expert System:
A system that gives a computer the ability to make suggestions and act
like an expert in a particular field.

Knowledge Base:
The collection of data, rules, procedures, and relationships that must be
followed to achieve value or the proper outcome.
Systems Development
Systems Development:

The activity of creating or modifying


existing business information systems
SYSTEMS INVESTIGATION AND
ANALYSIS

Understand the problem and potential


solutions
SYSTEMS DESIGN,
IMPLEMENTATION, MAINTENANCE
AND REVIEW

 Determine how the new system will meet


business needs
 Put the new system into operation
 Ensure the system continues to meet changing
business needs
INFORMATION SYSTEMS IN
SOCIETY

Security, Privacy, Ethical


Issues in Information
Systems and the Internet.
Computer Literacy:

Knowledge of computer systems and


equipment and the ways they function
General Information Systems Diagram
Management
Decisions
(Environment)

Data Input Process Output Information

Control

Feedback
Data:
Raw unorganized facts

Information:
Data organized in a meaningful way for the
user (in consideration of the environment)
Informal Information System

Each organization has a unique culture,


or fundamental set of assumptions,
values, and ways of doing things, that has
been accepted by most of its members
Environment:
• Business - other functional areas
• Computer – hardware, software, other IS

Sub System:
Component of a larger system

System Boundary:
Interaction with environment (user or other system) via an interface
INFORMATION SYSTEM
ACTIVITIES

1. Input of Data Resources


2. Process Data into Information
3. Output of Information
INPUT OF DATA RESOURCES

• Data entry
• Editing
• Machine readable
• Source documents
• Formal record of a transaction

• User interface
• How users interact with information system
• Optical scanning; menu; prompts; fill in blanks
PROCESS DATA INTO
INFORMATION
• Calculate
• Compare
• Sort
• Classify
• Summarize

The quality of the data must be maintained by a continual process of


correcting and updating activities
OUTPUT OF INFORMATION

• Transmit information to users


• Display; paper; audio

• Storage of data
• Data are retained in an organized manner
• Fields; records; files; data bases

• Control of system performance


• Feedback must be monitored and evaluated to determine if the
information system is meeting established performance standards
Systems Applications in the Organization

Decisions Management Levels Information Systems

Unstructured Senior ESS


Strategic Management Decision Support
Systems (DSS)
Knowledge and
GIS, CAD/CAM,
Tactical Data Worker
OAS
Middle Management
Management Information
Systems (MIS)

Lower Transaction
Processing
Management Systems (TPS)
Technical
(Operational)
Buy Make Sell Keep
Functions
Structured Track
DATABASE & DBMS
• What is a Database?
• A database is a collection of related data which represents some aspect of the real world. A database system is
designed to be built and populated with data for a certain task.
• What is DBMS?
• Database Management System (DBMS) is a software for storing and retrieving users’ data while considering
appropriate security measures. It consists of a group of programs which manipulate the database. The DBMS accepts
the request for data from an application and instructs the operating system to provide the specific data. In large
systems, a DBMS helps users and other third-party software to store and retrieve data.
• DBMS allows users to create their own databases as per their requirement. The term “DBMS” includes the user of
the database and other application programs. It provides an interface between the data and the software application.
EXAMPLE OF A DBMS
• Let us see a simple example of a university database. This database is maintaining information
concerning students, courses, and grades in a university environment. The database is organized as five
files:

• The STUDENT file stores data of each student


• The COURSE file stores contain data on each course.
• The SECTION stores the information about sections in a particular course.
• The GRADE file stores the grades which students receive in the various sections
• The TUTOR file contains information about each professor.
DBMS VS. FLAT FILE

DBMS Flat File Management System


Multi-user access It does not support multi-user access
Design to fulfill the need for small and
It is only limited to smaller DBMS system.
large businesses
Remove redundancy and Integrity Redundancy and Integrity issues
Expensive. But in the long term Total Cost
It’s cheaper
of Ownership is cheap
Easy to implement complicated
No support for complicated transactions
transactions
POPULAR DBMS SOFTWARE

• MySQL • SQLite
• Microsoft Access • MariaDB
• Oracle • Microsoft SQL Server etc.
• PostgreSQL
• FoxPro
WHAT IS CYBERSECURITY?

Cybersecurity refers to the protection of hardware,


software, and data from attackers. The primary purpose of
cyber security is to protect against cyberattacks like
accessing, changing, or destroying sensitive information.
WHAT ARE THE ELEMENTS OF
CYBERSECURITY?
Major elements of cybersecurity are:

•  Information security
• Network security
• Operational security
• Application Security
• End-user education
• Business continuity planning
WHAT ARE THE ADVANTAGES
OF CYBER SECURITY?
Benefits of cyber security are as follows:

• It protects the business against ransomware, malware, social


engineering, and phishing.
• It protects end-users.
• It gives good protection for both data as well as networks.
• Increase recovery time after a breach.
• Cybersecurity prevents unauthorized users.
HOW TO SECURE YOUR COMPUTER &
PHONE FROM HACKERS
•1. Use a firewall. •10. Secure your network.
•2. Install antivirus software. •11. Use two-factor authentication.
•3. Install an anti-spyware package. •12. Use encryption.
•4. Use complex passwords. •13. Turn off Bluetooth.
•5. Keep your OS, apps & browser up-to-date. •14. Don’t use unsecured public Wi-Fi.
•6. Ignore spam. •15. Get a security app.
•7. Back up your computer. •16. Use a better passcode.
•8. Shut it down. •17. Switch off autocomplete.
•9. Use virtualization. •18. Clear your browsing history.
WHAT IS HACKING?

Hacking is the activity of identifying weaknesses in a


computer system or a network to exploit the security to gain
access to personal data or business data. An example of
computer hacking can be: using a password cracking
algorithm to gain access to a computer system.
WHO IS A HACKER?

A Hacker is a person who finds and exploits the weakness in


computer systems and/or networks to gain access. Hackers are
usually skilled computer programmers with knowledge of computer
security.
TYPES OF HACKERS

• Ethical Hacker (White hat): A security hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration Testing and vulnerability assessments.

• Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent
is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

• Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and reveal them to the system owner.

• Script kiddies: A non-skilled person who gains access to computer systems using already made tools.

• Hacktivist: A hacker who uses hacking to send social, religious, and political, etc. messages. This is usually done
by hijacking websites and leaving messages on the hijacked website.

• Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
WHAT IS CYBERCRIME?

Cybercrime is the activity of using computers and


networks to perform illegal activities like spreading
computer viruses, online bullying, performing
unauthorized electronic fund transfers, etc. Most
cybercrime hacks are committed through the
internet, and some cybercrimes are performed
using Mobile phones via SMS and online chatting
applications.
TYPE OF CYBERCRIME
The following list presents the common types of cybercrimes:

• Computer Fraud: Intentional deception for personal gain via the use of computer systems.

• Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on
social media, hacking a websites, etc.

• Identity Theft: Stealing personal information from somebody and impersonating that person.

• Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and
computer programs etc.

• Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making
illegal fund transfers.

• Electronic money laundering: This involves the use of the computer to launder money.

• ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These
details are then used to withdraw funds from the intercepted accounts.

• Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view
of shutting them down.

• Spam: Sending unauthorized emails. These emails usually contain advertisements.


NATIONAL CYBERSECURITY
STRATEGY

You might also like