Information system security
Tasks 1: Description of the evolution of information systems infrastructure
Information systems infrastructure is known to first come into existence in the past 40 years from now. The existence of the latter stated concept has significantly influenced the manner in which business enterprises carry out their operations. The emergence of information systems security led to business transformation in the sense that IT has now become a strategic component in business rather than simply a tool that supports operations at the back-office. In addition, it is through the introduction or rather evolution of information system security that there has been business reengineering. The most important point to note is that information system security led to enhanced information security, availability, along with integrity.
Moreover, the evolution of information system security led to access control. The latter stated component resulted in the prevention of any unauthorized personnel from engaging or rather invading into the system. Besides that, the evolution of information security system is what led to information protection, and this is regardless of where the information is, that is, whether it is in storage, or whether it is in transition.
Last but not least, the evolution of information systems infrastructure as in tandem with risk management. In this case, for a system to perform properly, it has to have some risk assessment. This aspect has been there since the initiation of the concept of information systems security to date. Risk management is an important portion of information system security as it helps in determining the kind of information that possess the biggest risk. For instance, a given system may have plenty of information on it, and will thus need more security measures. Last but not least, the other important component in information systems security is disaster recovery planning and business continuity. The latter stated elements are important in a business organization.
Task 2: Article review
One of the critical concepts that are derived or rather are based on management information systems is the management functions, and this include, planning, organizing and control (Raymond, & Bergeron, 2018). Without management information systems, it will be difficult for an organization to come up with a detailed plan. This claim is based on the premise that a detailed organizational plan relies on information. However, for the information that is used by the management to be relevant and valid, some security measures have to be in place. A secure information is what will lead to a more organized plan. Besides planning, organizing and controlling is the other element that relies on information system security. Without information security, there will be inadequate and inappropriate organizing and control.
The other important component of information system security is on privacy and confidentiality (Sattarova Feruza, & Kim, 2007). In this case, a secure information system should ensure that there are proper security measures in place between the transacting parties. In this regard, any form of communication should have end-to-end encryption. This is one of the main goals of information system security.
Last but not least information security enhances relevance (Siponen, & Vance, 2014). In this case, the circulating information within the system is always within context. A secure information system is one whereby there is no hackers or rather intruders who may interfere with the relevance of information by uploading their irrelevant content. When there is information system security, it becomes very difficult for the content in the system to be interfered with, thus enhancing relevance. To this end, it is therefore evident that the three components of information systems security relates to planning, organizing and control as the first element, then privacy and security as the second component, and lastly relevance. The latter stated elements are very critical in the operation of an entity
References
Raymond, L., & Bergeron, F. (2008). Project management information systems. An
empirical study of their impact on project manager and project success. International Journal of Project Management, 26(2), 213-220.
Sattarova Feruza, Y, & Kim, T.H. (2007). IT security review: Privacy, protection, access
control, assurance and system security. International journal of multimedia and ubiquitous engineering.
Siponen, M., & Vance, A. (2014). Guidelines for improving the contextual relevance of
field surveys: the case of information security policy violations. European Journal of Information Systems, 23(3).