Professional Documents
Culture Documents
IS-Overview - Updated 04-09-22
IS-Overview - Updated 04-09-22
OVERVIEW
Information System:
An information system is a set of interrelated components that
collect, manipulate, store data and disseminate information
and provide a feedback mechanism to monitor performance.
ICT Components of IS
five Basic Components of ICT are.....
Storage devices.
Input devices.
Output devices.
Processor.
Communication devices.
WHAT IS AN INFORMATION
SYSTEM? (COMPUTER-BASED)
Data
Raw facts such as an employee’s name and number of hours worked in a week,
inventory part numbers or sales orders.
Information
A collection of facts organized in such a way that they have additional value
beyond the value of the facts themselves.
Data Information
Process:
A set of logically related tasks performed to achieve a defined
outcome.
Knowledge:
An awareness and understanding of a set of information and
ways that information can be made useful to support a
specific task or reach a decision
THE VALUE OF INFORMATION
Hardware:
Computer Equipment
Software:
Computer Programs
Databases:
An organized collections of facts
CBIS
Telecommunications:
Electronic transmission of signals for communication
People
Procedures:
Strategies, policies, methods, and rules
for using a CBIS.
BUSINESS INFORMATION
SYSTEMS
BUSINESS INFORMATION
SYSTEMS
Management Information System:
A system used to provide routine information to
managers and decision-makers
Knowledge Base:
The collection of data, rules, procedures, and relationships that must be
followed to achieve value or the proper outcome.
Systems Development
Systems Development:
Control
Feedback
Data:
Raw unorganized facts
Information:
Data organized in a meaningful way for the
user (in consideration of the environment)
Informal Information System
Sub System:
Component of a larger system
System Boundary:
Interaction with environment (user or other system) via an interface
INFORMATION SYSTEM
ACTIVITIES
• Data entry
• Editing
• Machine readable
• Source documents
• Formal record of a transaction
• User interface
• How users interact with information system
• Optical scanning; menu; prompts; fill in blanks
PROCESS DATA INTO
INFORMATION
• Calculate
• Compare
• Sort
• Classify
• Summarize
• Storage of data
• Data are retained in an organized manner
• Fields; records; files; data bases
Lower Transaction
Processing
Management Systems (TPS)
Technical
(Operational)
Buy Make Sell Keep
Functions
Structured Track
DATABASE & DBMS
• What is a Database?
• A database is a collection of related data which represents some aspect of the real world. A database system is
designed to be built and populated with data for a certain task.
• What is DBMS?
• Database Management System (DBMS) is a software for storing and retrieving users’ data while considering
appropriate security measures. It consists of a group of programs which manipulate the database. The DBMS accepts
the request for data from an application and instructs the operating system to provide the specific data. In large
systems, a DBMS helps users and other third-party software to store and retrieve data.
• DBMS allows users to create their own databases as per their requirement. The term “DBMS” includes the user of
the database and other application programs. It provides an interface between the data and the software application.
EXAMPLE OF A DBMS
• Let us see a simple example of a university database. This database is maintaining information
concerning students, courses, and grades in a university environment. The database is organized as five
files:
• MySQL • SQLite
• Microsoft Access • MariaDB
• Oracle • Microsoft SQL Server etc.
• PostgreSQL
• FoxPro
WHAT IS CYBERSECURITY?
• Information security
• Network security
• Operational security
• Application Security
• End-user education
• Business continuity planning
WHAT ARE THE ADVANTAGES
OF CYBER SECURITY?
Benefits of cyber security are as follows:
• Ethical Hacker (White hat): A security hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration Testing and vulnerability assessments.
• Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent
is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
• Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and reveal them to the system owner.
• Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
• Hacktivist: A hacker who uses hacking to send social, religious, and political, etc. messages. This is usually done
by hijacking websites and leaving messages on the hijacked website.
• Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
WHAT IS CYBERCRIME?
• Computer Fraud: Intentional deception for personal gain via the use of computer systems.
• Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on
social media, hacking a websites, etc.
• Identity Theft: Stealing personal information from somebody and impersonating that person.
• Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and
computer programs etc.
• Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making
illegal fund transfers.
• Electronic money laundering: This involves the use of the computer to launder money.
• ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These
details are then used to withdraw funds from the intercepted accounts.
• Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view
of shutting them down.