Running head: WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 1
Week 1 Short Paper - Concepts of Information Assurance
Santhosh Jagan Kumar Sadasivuni
Wilmington University
SEC 8100 Information Assurance Integration
Professor Harold Lowe
Nov 4, 2018
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
2
Introduction
Complex organizations require complex systems to manage their data and to make things
easier and more organized. Knowledge of the use and management of information systems is
essential for every organization. Information systems provide computer-based methods of
storing, organizing and evaluating information or data (Robson, 2015). The process of managing
information systems has its benefits and challenges for the organizations depending on which
information systems they use. to increase efficiency, organizations should have basic knowledge
of fundamental concepts in managing information systems. Different departments in an
organization require different systems, for example, management information systems, risk
management information systems and so on. There are fundamental principles that govern the
use of information systems which give the user a guide on what to expect from information
systems.
The Concept of Risk in Information Systems
Information systems are human made which means they are exposed to many risks. One
of the dangers which is very common is hazard risks. They are risks associated with the
environment in which the systems are used for example, equipment breakdown, and theft and so
on. Financial risks are also a reality in information systems; every year the cost of maintaining
high-quality technology or infrastructure rises which makes purchase and maintenance
challenging for users. When using information systems, it is common to experience operational
risks which interfere with the performance of the system, for example, service interruptions or
security breaches. They are also prone to natural risks which can result in the loss of vital
information and destruction of the system, for example, fires, floods et cetera. Concerning risk,
there are information systems that help users to predict the levels of risk when making certain
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
3
decisions; they are called Risk Management Information Systems (RMIS). These systems assist
organizations to put in place risk protection measures and exercise risk management which
cushions them when risks occur or eliminate the occurrence of the risk.
Use of Information Systems
For organizations to realize their primary goal of profitability, they must improve the
efficiency of their operations. They, therefore, need information systems unique to every
department for the organization. Information systems transform raw data into valuable
information which is used to inform the decision-making process. The data they use is from both
internal and external sources which make them especially useful when making informed choices.
Their use is widespread over a range of different industries because they support specific tasks in
an organization. For example, there are those systems used for management, others for risk,
human resource management and so forth. Their specificity enables organizations to undertake a
particular analysis of the different issue. They give organizations an advantage in a competitive
industry as they greatly influence the activities of the organization. They provide useful
information in a format that is most suitable to the user; they are flexible in their use and meet
the user’s specific needs.
Processing in Information Systems
The processing of information involves the manipulation of digitized raw data to produce
meaningful data. It also consists of making the data usable and understandable to the user. The
raw data received by the system is not readable to the user however after processing; he or she
can access the readable information viable for decision making. Information processing generally
involves four primary sites; the first is the input. Data is fed into the system from a variety of
internal and external sources. Next is the processing stage where the information is transformed
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
4
so that it is usable by the users and easily understood. The other step is storing the data so that it
is available anytime it is needed. The final step is output, where the information is availed to the
user at his or her request. Information processing validates raw data and presents information
helpful to organizations.
Storage in Information Systems
Information systems can store data which may be used to validate claims or for future
reference. Data storage on hardware devices is possible by transferring information to any
hardware that is within or outside the computer, server or any other computing device.
Depending on the need and urgency of the data, users may store information temporarily or
permanently. in the use of software devices, data is stored in non-tangible spaces for example,
cloud spaces. Information systems assist in gathering and prioritizing stored information. Data
warehouses are created to save large amounts of data for organizations. The data can go back
years since it storage date and is free from tampering. To increase the efficiency of storage
systems, backup appliances are sued which contain the most crucial information for the
organization. In case of loss or damage, the backed up data is used. When information is not
needed for significant periods, it is archived. Archived information is essential to the
organization even though it not frequently used.
Transmission of Data in Information Systems
The transfer of data from one source to another is known as transmission. Transmission
of data can take place in the physical and digitally. Physically, data is moved from one device to
another or is retrieved from one system and fed into another (Hashem et al, 2015). However,
there is a current trend in data transmission which demands digitized transmissions over physical
or analog transfers. Digital transmissions improve signal processing and are faster and more
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
5
reliable than physical transfers. Digital transmissions and digital communications go hand in
hand as they both involve the transfer of data from one source to another.
Core Principles in Information Assurance
There are three fundamental principles used in ensuring the security of data. The first and
the most important according to me is confidentiality. It involves safeguarding information from
unauthorized uses. Privacy provides that only the people who should view the data are the ones
doing so. It is possible by the use of cryptography and encryption. Encryption makes the data
unreadable to users by providing characters that are not understandable; the authorized person
may enter the security code and decode the information. The second principle is integrity; it
involves the storage of the data in a way that deters theft, alteration of the data, witness
tampering and so in. The third is availability. It involves the connection between the computer
and other information systems which enable users to view information on the computer device
used. The three principles work hand in hand to ensure the security of data and consequently, its
reliability.
Conclusion
Information systems provide useful information to organizations which is essential for
decision making. There are various Information systems unique to each department of an
organization. When used successfully, they can help organizations to beat their competition and
improve their productivity and performance. There are numerous risks such as hazard risks,
natural risks and so forth, which are associated with using information systems, most of which
can be avoided or controlled (Laudon & Laudon, 2015). Numerous organizations use
information systems which allow the storage and transmission of information. During storage
organizations should develop backup devices for use in case of the occurrence of a risk. New
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
6
trends in the market show an inclination in digital transmission over physical transfers. The vital
principles essential in information security involve, confidentiality integrity and availability.
Without these three, information is not secure for use by individuals or organizations.
WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE
7
References
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
systems, 47, 98-115.
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice Hall.
Pearlson, K. E., Saunders, C. S., & Galletta, D. F. (2016). Managing and Using Information
Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Robson, W. (2015). Strategic management and information systems. Pearson Higher Ed.
Purchase answer to see full
attachment