How to Control Access of Information System?

We should know how to control access of information system. So here we discuss some topic regarding this matter below:

With the introduction of computers, the need for automated tools for protecting files and other information stored in computers became important. This is especially important for a shared system such as a time –sharing system or distributed system.

In such systems data can be accessed over a public telephone or data network. The authority of a person or organization to some specific data is defined as access.

The generic name for the collection of tools designed to protect data and thwart hackers is computer security. On the other hand, the right of persons to control distribution of information is termed as privacy.

In order to assess the access, security and privacy needs of an organization effectively and to evaluate and choose various tools and policies, the responsible manager needs systematic way of defining requirements and characterizing approaches opt satisfy the requirements.

This is difficult enough in a centralized data-processing environment. With the use of local area and wide area networks the problems are compounded.

A list of persons who cause security problems and their objectives are given in Table.

Table: Persons who cause security problems and their objectives

Adversaries

Objectives

Sales Representative Claiming to represent all of the country, not just a city
Businessman Discovering a competitor’s strategic marketing plan
Hacker Testing out someone’s security system; steal data etc.
Accountant

Embezzling money from the company

Con-man Stealing credit card number for sale
Ex-employee Getting revenge for being fired
Student Having fun with others security, for instance, e-mail
Stockbroker Denying a promise made to a customer by e-mail

How to Control Access of Information System

You May Like Also:

Leave a Reply

Your email address will not be published. Required fields are marked *