We should know how to control access of information system. So here we discuss some topic regarding this matter below:
With the introduction of computers, the need for automated tools for protecting files and other information stored in computers became important. This is especially important for a shared system such as a time –sharing system or distributed system.
In such systems data can be accessed over a public telephone or data network. The authority of a person or organization to some specific data is defined as access.
The generic name for the collection of tools designed to protect data and thwart hackers is computer security. On the other hand, the right of persons to control distribution of information is termed as privacy.
In order to assess the access, security and privacy needs of an organization effectively and to evaluate and choose various tools and policies, the responsible manager needs systematic way of defining requirements and characterizing approaches opt satisfy the requirements.
This is difficult enough in a centralized data-processing environment. With the use of local area and wide area networks the problems are compounded.
A list of persons who cause security problems and their objectives are given in Table.
Table: Persons who cause security problems and their objectives
|Sales Representative||Claiming to represent all of the country, not just a city|
|Businessman||Discovering a competitor’s strategic marketing plan|
|Hacker||Testing out someone’s security system; steal data etc.|
Embezzling money from the company
|Con-man||Stealing credit card number for sale|
|Ex-employee||Getting revenge for being fired|
|Student||Having fun with others security, for instance, e-mail|
|Stockbroker||Denying a promise made to a customer by e-mail|
You May Like Also: