1. History of Information System
•Ancient time: Symbols and images,
•Development of written language
through Mesopotamia and Egypt was
a major milestone.
•Allowed to store & transmit info. In
organized and structured form
--- Anupam Singh
2. History of Information System
•15th Centaury: Invention of the
printing press. The turning point.
•Allowed for mass production of
written material
•Dissemination of knowledge on a
much larger scale.
--- Anupam Singh
3. History of Information System
• 19th century: Development of the
telegraph and the telephone,
•Revolutionized communication
•Allowed: rapid transmission of
information over long distances.
--- Anupam Singh
4. History of Information System
• 20th century: Electronic computing,
development of the first digital
information systems.
•In the 1950s and 1960s, large
mainframe computers were used by
corporations and governments to store
and process large amounts of data.
--- Anupam Singh
5. History of Information System
• 1970: emergence of personal
computers, made computing power
available to individuals & small
businesses.
• 1990s and 2000s: Development of the
internet, revolutionized information
systems, making it possible for people
to access and share information on a
global scale.
--- Anupam Singh
6. History of Information System
• Today, information systems continue
to evolve and develop at a rapid pace,
•with advances in artificial
intelligence, big data analytics, and
cloud computing changing the way we
store, process, and use information.
--- Anupam Singh
7. Importance of Information System
To Control The Creation and
Growth of Records
•The amount of paper in our offices
continue to escalate.
•an effective Information
System addresses both, to stabilize the
growth of records.
--- Anupam Singh
8. Importance of Information System
To Reduce Operating Costs
• Recordkeeping requires
administrative dollars, space in offices,
and staffing to maintain an organized
filing system.
•It costs considerably less per linear
foot to store inactive records in
an Information System.
--- Anupam Singh
9. Importance of Information System
To Improve Efficiency and
Productivity
•Time spent searching for missing or
misfiled records is non-productive;
•a good Information System helps any
organization upgrade its recordkeeping
systems so that information retrieval is
enhanced.
--- Anupam Singh
10. Importance of Information System
To Ensure Regulatory
Compliance
•Organization can be reasonably sure
that it is in full compliance with laws
and regulations is by operating a good
management Information
System which takes responsibility for
regulatory compliance.
--- Anupam Singh
11. Importance of Information System
To Support Better
Management Decision
Making
•A good Information System can help
ensure that managers and executives
have the information they need WHEN
they need it.
--- Anupam Singh
12. Changing Nature of Information Systems
From centralized to distributed
systems:
•In past: information systems were
often centralized
data stored: mainframe computers
Accessible: only to a select few.
•Today: Information systems are
typically distributed
Data stored: multiple servers
Accessible: from anywhere via the
internet.
--- Anupam Singh
13. Changing Nature of Information Systems
From batch processing to real-time
processing:
•In past:
Data processing was often done in
batches, with large amounts of data
processed at once.
•Today:
Data processing is often done in
real-time, with data being processed
as it is collected.
--- Anupam Singh
14. Changing Nature of Information Systems
From transaction processing to
business intelligence:
• In past: information systems were
often used for transaction processing,
such as recording sales or tracking
inventory.
•Today: however, information systems
are often used for business
intelligence, such as analyzing
customer data to identify trends and
opportunities.
--- Anupam Singh
15. Changing Nature of Information Systems
From on-premises to cloud-based
systems:
•In past: information systems were
typically hosted on-premises, with
organizations responsible for
maintaining their own hardware and
software.
•Today: Many organizations are moving
to cloud-based systems, which offer
greater flexibility and scalability.
--- Anupam Singh
16. Need of Distributed Information Systems
Scalability:
•Distributed information systems can
be scaled up or down to meet
Changing demands:
Processing power
Storage capacity.
•This makes it easier to handle
Large volumes of data
Accommodate growing
numbers of users.
--- Anupam Singh
17. Need of Distributed Information Systems
Fault tolerance:
Distributed information systems are
designed to be fault-tolerant:
They can continue to operate
even if one or more components fail.
This is achieved by
Replicating data & processing
across multiple nodes in the network.
--- Anupam Singh
18. Need of Distributed Information Systems
Performance:
•Distributed information systems can
provide faster processing & response
times by leveraging the processing
power of multiple computers.
•This is important for applications that
require high levels of processing
power, such as: scientific simulations
big data analytics.
--- Anupam Singh
19. Need of Distributed Information Systems
Security:
•Distributed information systems can
provide better security by distributing
data and processing across multiple
nodes in the network.
•This makes it more difficult for an
attacker to compromise the system by
targeting a single point of failure.
--- Anupam Singh
20. Need of Distributed Information Systems
Geographic distribution:
•Distributed information systems can
support geographically dispersed
users and data by replicating data
across multiple locations.
•This allows users to access data from
anywhere in the world and ensures
that data is available even if one
location experiences an outage.
--- Anupam Singh
21. Role of Internet and Web Services
Communication:
•The internet has made
communication faster, easier, and
more accessible.
• With web services such as email,
instant messaging, and video
conferencing, people can communicate
with others across the world in real-
time.
--- Anupam Singh
22. Role of Internet and Web Services
Information Access:
•The internet is a vast repository of
information on almost any subject.
•With web services such as search
engines and online databases, people
can access information quickly and
easily.
--- Anupam Singh
23. Role of Internet and Web Services
E-commerce:
•Web services have enabled the
growth of e-commerce, allowing
businesses to sell products and
services online.
•E-commerce has made it easier for
consumers to shop and compare
prices, and for businesses to reach a
global audience.
--- Anupam Singh
24. Role of Internet and Web Services
Social Networking:
•Web services such as social media
platforms have changed the way we
connect with each other
• Enabling us to share photos, videos,
and information with friends and
family around the world.
--- Anupam Singh
25. Role of Internet and Web Services
Cloud Computing:
Web services have enabled the growth
of cloud computing
where software and storage
resources are accessed over
the internet, rather than
being stored locally on a
computer.
--- Anupam Singh
26. Information System Threats and attacks
Malware:
•This is malicious software that is
designed to harm or exploit computer
systems.
•Examples: viruses, worms, Trojans,
and ransomware.
--- Anupam Singh
27. Information System Threats and attacks
Phishing:
•This is a technique used to obtain
sensitive information, such as login
credentials or credit card details, by
posing as a trustworthy entity in an
electronic communication.
--- Anupam Singh
28. Information System Threats and attacks
Social engineering:
•This is a method of manipulating
people to divulge confidential
information or perform actions that
are not in their best interest.
--- Anupam Singh
29. Information System Threats and attacks
Denial of service (DoS) and distributed
denial of service (DDoS) attacks:
•These attacks aim to disrupt the
availability of a network or system by
overwhelming it with traffic.
--- Anupam Singh
30. Information System Threats and attacks
SQL injection:
•This is a type of attack that targets
SQL databases by inserting malicious
code into user input fields to gain
unauthorized access or modify data.
--- Anupam Singh
31. Information System Threats and attacks
Man-in-the-middle (MITM) attacks:
This is a type of attack where an
attacker intercepts communication
between two parties to steal or modify
data.
--- Anupam Singh
32. Information System Threats and attacks
Physical theft or damage:
This involves physically stealing or
damaging computer systems, storage
media, or other hardware components.
--- Anupam Singh
33. Information System Threats and attacks
Insider threats:
These are threats that come from
within an organization, such as
disgruntled employees or contractors
who have access to sensitive
information.
--- Anupam Singh
34. Classification of Threats and Assessing
Damages
Physical Threats:
•These are threats that can cause
physical harm or damage to
individuals, organizations, or property.
•Examples: fire, natural disasters, theft,
and vandalism.
Assess:
•By evaluating the cost of repairs or
replacement of damaged property
•potential injuries or loss of life.
--- Anupam Singh
35. Classification of Threats and Assessing
Damages
Cyber Threats:
•These are threats that target
computer systems and networks
•Ex-malware, hacking, phishing, and
denial-of-service attacks.
•Assess: by evaluating the cost of lost
data, system downtime, and the
impact on the organization's
reputation.
--- Anupam Singh
36. Classification of Threats and Assessing
Damages
Human Threats:
•Come from people, either intentionally or
unintentionally.
•Examples: Insider threats, social
engineering, and human error.
Assess: by evaluating the cost of
remediation, such as:
retraining employees,
implementing new security measures,
conducting investigations.
--- Anupam Singh
37. Classification of Threats and Assessing
Damages
Environmental Threats:
These are threats that arise from the
environment, such as pollution, climate
change, and natural disasters.
Assess: by evaluating the cost of
environmental remediation and any
impact on public health and safety.
--- Anupam Singh
38. Security Challenges in Mobile Devices
Malware:
•Includes: viruses, Trojans, and worms,
can infect mobile devices and
compromise their security.
•Malware can steal data, spy on users,
or even take control of the device.
•Users can inadvertently download
malware by clicking on malicious links
or downloading fake apps.
--- Anupam Singh
39. Security Challenges in Mobile Devices
Data Leakage:
Data leakage occurs when sensitive
information is transmitted from a
mobile device without proper
authorization.
Happens:
• users connect to unsecured Wi-Fi
networks
•data is transmitted over insecure
channels.
--- Anupam Singh
40. Security Challenges in Mobile Devices
Phishing:
• Attacks target mobile users by tricking
them into providing sensitive
information such as usernames,
passwords, and credit card details.
•Occur through email, SMS, or social
media.
--- Anupam Singh
41. Security Challenges in Mobile Devices
Lost or Stolen Devices:
•Can pose a significant security risk.
• If the device is not secured with a
strong password or biometric
authentication, anyone can access the
data stored on the device.
--- Anupam Singh
42. Security Challenges in Mobile Devices
Outdated Software:
Outdated software can be vulnerable
to security exploits, leaving mobile
devices open to attack.
It is important to keep mobile devices
updated with the latest security
patches and software upgrades.
--- Anupam Singh
43. Security Challenges in Mobile Devices
Unsecured Applications:
•Users can inadvertently download
malicious apps that can compromise
their mobile device's security.
•Users should only download apps
from trusted sources, and they should
always check the permissions
requested by the app.
--- Anupam Singh
44. Security Challenges in Mobile Devices
Jail breaking and Rooting:
•Removing software restrictions that
are intentionally put in place by
the device manufacturer.
•Jail breaking and rooting mobile
devices can provide users with
additional functionality and
customization options.
--- Anupam Singh
45. Important Terms in Information Security
Authentication
A crucial aspect of information
security that ensures that the identity
of a user or system is confirmed
before granting access to sensitive
information or resources.
Implemented: username/password
combinations, biometric identification,
or digital certificates.
--- Anupam Singh
46. Important Terms in Information Security
Confidentiality:
Protection of sensitive information
from unauthorized disclosure.
Achieved through encryption, access
controls, and other security measures.
--- Anupam Singh
47. Important Terms in Information Security
Integrity:
Accuracy and consistency of
information, ensuring that it has not
been tampered with or altered in any
way.
Achieved through data validation,
checksums, and other methods.
--- Anupam Singh
48. Important Terms in Information Security
Availability
Accessibility of information and
resources when needed.
Achieved through redundancy,
disaster recovery planning, and other
measures to prevent downtime or
outages.
--- Anupam Singh
49. Important Terms in Information Security
Authorization:
Process of granting or denying
access to specific resources or
actions based on a user's
identity and permissions.
--- Anupam Singh
50. Important Terms in Information Security
Encryption:
Process of transforming information
into a form that cannot be read or
understood without a decryption key
or password.
--- Anupam Singh
51. Important Terms in Information Security
Firewall:
A network security device that
controls incoming and outgoing traffic
based on a set of predefined rules.
--- Anupam Singh
52. Important Terms in Information Security
Intrusion Detection System (IDS):
A software or hardware system that
monitors network traffic for signs of
suspicious activity or attacks.
--- Anupam Singh
53. Important Terms in Information Security
Patch:
A software update that addresses a
vulnerability or bug in a system.
--- Anupam Singh
54. Important Terms in Information Security
Risk:
The likelihood and potential impact of
a security threat or vulnerability.
--- Anupam Singh
55. Important Terms in Information Security
Vulnerability:
A weakness or gap in security that can
be exploited by attackers to gain
unauthorized access to a system or
information.
--- Anupam Singh