Monday, May 27, 2019

Information systems technology Essay

Abstract This paper discusses the scope of Information systems engineering. Information Systems Technology can be delimit as the use of electronic programs and molds and for storage, going, presentation and transfer of information. Information Systems Technology also includes technologies of speech processing, speech recognition, speaker recognition (identification, verification, and authentication), word spotting, language and set phrase identification, speech coding, and speech and audio signal enhancement.It is also inclusive of Machine learning, Information Assurance, detecting and interpreting attacks against large-scale network infrastructures, securing cyberspace, and evaluating the usage of dissimilar tools various environments. For Information Systems Technology to be adequate, static and dynamic analysis of softw are should be performed regularly, to uncover any vulnerabilities, correlate and prioritize alerts from network security devices, try out attacks and potenti al propagation vectors against estimator networks, and develop practical solutions of cryptographic protocols and approaches.Introduction It has been said that Survival is a matter of instinct which requires insight to succeed. Information technology is an absolute necessity for any individual or organization that wants to survive in this ever changing world. Information systems technology can be delineate as the use of electronic machines and programs for the processing, storage, transfer and presentation of information. When the emphasis was on processing the terms electronic data processing EDP was common in earlier days.All aspect of human life is permeated by information technology it is no longer confined to high number- crunching machines housed in air- conditioned computer halls. As evident to all, communication technology is today an important part of it. Devices such as the photocopying machine, telephone and the telefax and not only computers and their software should be included in our definition of information technology. Nowadays the use of information technology is no longer confined to huge number-crunching machines housed in air-conditioned computer halls but permeates all aspects of everyday life.Communications technology is today an important part of IT. Not only computers and their software, but also devices such as the telephone, the photocopying machine and the telefax should thus be included in our definition of information technology. Many of the functions of these devices are in fact increasingly integrated. With the latest generation of laptops computers, and is already possible to send and receive faxes and emails. Recently, more mobile phones which incorporate small microcomputers have started to appear on the market much more. (Bo-Christer Bjork 1999) Overview.Information technology and the systems that process it are among the most valuable assets of any organization. Fundamental management responsibility is adequate security of these assets. Each agency essential implement and maintain a program to adequately secure its information and system assets, something that is consistent with office of Management and Budget (OMB). There is also increased integration in many functions of these devices Consistent with Office of Management and Budget (OMB) policy, each agency must implement and maintain a program to adequately secure its information.Agency programs must 1) assure that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability and 2) protect information commensurate with the level of risk and magnitude of harm resulting from loss, misuse, unauthorized access, or modification. Description of Framework The Framework approach begins with the premise that all agency assets must meet the minimum security requirements of the Office of Management and Budget Circular.The criteria that are outlined in the Framework and provided in detail in the question naire are abstracted directly from long-standing requirements found in statute, policy, and guidance on security and privacy. It should be noted that an agency might have additional laws, regulations, or policies that establish specific requirements for confidentiality, integrity, or availability. Each agency should decide if additional security controls should be added to the questionnaire and, if so, customize the questionnaire appropriately. (Federal Information Technology credential Assessment Framework 2000).References Bo-Christer Bjork (1999) Information technology in construction domain definition and research issues. International daybook of Computer Integrated Design and Construction, SETO, London. Volume 1, Issue 1, pp. 1-16 Federal Information Technology Security Assessment Framework (2000) Prepared for Security, Privacy, and Critical Infrastructure commissioning by National Institute of Standards and Technology (NIST) Computer Security Division November 28, 2000 The N IST Self-assessment Questionnaire will be issued in 2001 as a NIST Special Publication. Swanson, M (2001) Security Self-Assessment Guide for Information Technology Systems.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Winston Churchill Britains Guardian Angel - 759 Words

Winston Churchill: Britain’s Guardian Angel The date was August, 1940. London was a mess of smoking ruins and rubble. Somber visag...