Literature Review on Securing Information Systems

SECURING INFORMATION SYSTEMS


Table of Contents
1. Introduction 2
2. Literature Review: 2
3. Analysis of the security: 4
4. Opinion and critical reflections: 5
5. Conclusion: 6
6. Recommendations: 6
7. References 7

Securing information systems

Introduction
Information systems refers to the system that consists of the computer that helps in processing as well as interpreting of information. It refers to the handling of the database to develop that relates to the software part of the computer. It serves to be one of the most important medium of sharing and storing an individual’s data within a system. It is keep by the company where the employee is working or by the individual himself, while carrying the important data to as the pillar of the information that is to be shared with the people on the whole (Laudon & Laudon, 2010).
It is observed that the main purpose of information system is to collect and store data of an individual or an organization. It helps in developing a database in the form of a software that would help in keeping the integrity of the information intact the security of the information system is important to ensure the confidentiality of this system. This would be studied and discussed in this article.
Literature Review:
There are various researches that have been incorporated in the field of information system and its security throughout the system that helps in ensuring the genuineness and trust on the information system to store data and information for an individual or an organization. These researches are discussed below.
In 1989, Ewald along with few other researchers carried an extensive research of the methods that can be used in securing the information services. They came to the methods that involves using portable means to save this information. They proposed use of a data carrier to store the data that can be embodied in the form of a card or so that can be carried by the owner and also be passed to whomsoever he wants to through sharing of the passwords (Anderl, Frankel, & Zahavi., 1989.).
In1991, Whang and Gurbaxani have displayed the impact that these systems referring to the information systems have on the integrity and overall structure of an organization (Gurbaxani & Whang., 1991). They proposed the use of a computerized system that would help in securing the information throughout and at the same time would ensure the flexibility of the sources. It can be coded and decoded by the users and the company from the database whenever it would be required by them.

In 1996, Swanson and Guttman helped to determine the general principles and practices that are related to the securing of the information systems. The organizations can review as well as use this kind of structure for securing their data in the software related to the information systems that the company has been storing in it. They provided a very common understanding of the elements that are needed and expected to be taken care of while dealing with the information technology and information system of an organization (Swanson & Guttman, 1996).
In 2003, Zhang and Li developed the sharing of an information system that involved the usage of a supply chain management system in the management of the information systems. The derived using of the internet and developing an internet based supply chain management for the securing of the data that is used in the data management and storage of the information service. This kind of securing of the information system helps in improving as well understanding the chain value across the organization. It also helps in achieving and fulfilment of few strategies for the system that could have generated only through effective supply chain management of the resources and the information system (Zhang & Li, 2003).
In 2008, Javidi stressed on utilizing the optimal technologies for the securing of the information system. It stated that the systems need to be protected in terms of the information and data that it contains pertaining to the different field that are to be evaluated through the information system. It involves employing newer systems to store and manage the information system through usage of data in the storage of the information system. They have propagated the next generation of information systems that would be storing information and at the same time ensure its security through the means of optical technologies. These technologies serve to be one of the most significant factor in the growth of the information systems management through portable means that would ensure safety and security in the means of transactions and other interpretation of the files covered in the information system (Javidi, 2008).
This shows the emergence of the security systems that are developed to ensure the integrity of the information systems that would at the same time provide confidentiality in the means of the storage as well as its flexibility in terms of the dedicated use by the owner in terms of the organization or an individual. It therefore, helps in ensuring that the major portion of the system remains intact with very less scope for breaching of the system or leaking of the information stored in it through the use of optimal modes of technology.
These researches not only help the system to emerge as a successful one but also help in achieving the trust of the users that the data and information that is processed through such a system is secure and would not be interpreted or harmed by any other external sources.
Analysis of the security:
It helps in ensuring that the security of the information system is achieved with highest level of intimacy and confidentiality among the system to detect the data and store it. It involves understanding the medium of the information storage system that twill help in easy coding and decoding of the data that is stored in the information system. It also helps in generating a system that would be self- sufficient in providing the entire data to the designated users through controlled access with the help of codes or passwords that only the user would be having with him, thereby ensuring the integrity of the data. It is also found to be one of the most important factor that while achieving confidentiality and security in the information systems, it has to be made sure that there is an equal emphasis on the storage system and retrieving system that would help in regenerating of the data from the information system. This has to be done in such a way that it offers highest level of integrity and movement of information system is not much affected during the entire process (Anderl, Frankel, & Zahavi., 1989.).
Analysing the security can be carried out by storing the data in the information system and then retrieving it through the means for the designed system to use and consume the data that is being taken into consideration. This involves considering the other factors like the security and integrity as well as the trust on the system that it would not manipulate the data or the information that is imbedded in it through a proper security system. There are various choices available while selecting an information system. This involves acting on the possible threats, considering the vulnerabilities that the system possesses and taking measures to ensure that the risk is being managed quite well by the system that we have chosen for the storage and interpretation of the information in the form of data through the information system.
Security choices for an information and system

(Javidi, 2008).
This kind of system will help in achieving robustness of the information that is being processed and utilized through it by easy storage, coding, memory and regeneration of the information through decoding and retrieving the information from the system by various means of management that can be achieved through the system.

Opinion and critical reflections:
There are mixed reviews on the security that this systems provide in storing the data and information through the information system. It involves considering the fact that the major part of the source is obtained through a system which can be controlled or operated by any other person who has an expertise over the system. To some extent, this concern is true (Gurbaxani & Whang., 1991). But, it should not refrain the systems to store the data and retrieve it through the information system in a different manner. It should be observed that highest level of security and integrity is obtained by safeguarding these systems and using measure that would prevent them from being getting tampered and manipulated by any other sources from outside.
Conclusion:
Thus, it can be stated the methods that are used for the storage and retrieval of the information system must be such that it ensures security and integrity of the information naps well as data that is being stored and processed by in the system through the use of technology and other secure sources.
It also helps in easy retrieval of the information through decoding of the system and the data would be retrieved back from the software that will help in ensuring the security of threat with respect to the user.
Recommendations:
There are various methods that could be incorporated in improving the structure as well as the modes of obtaining the stored information from the system. This could be very well achieved through more advanced means that would track the user or the company for the retrieval of data and information through them. It can also be achieved with higher level of technology in the system that will help in easy storage and retrieval of the information from the software that would be merged to store the information system in it.
These methods will help in achieving the security and integrity of the information and data that is stored in the information systems.
(Chaffey, 2015)
(Hofstede, Van Deusen, Mueller, & Charles, 2002)
(Talke & Hultink, 2010)
(Fraj-Andrés, Martinez-Salinas, & Matute-Vallejo, 2009)

References
Anderl, E. C., Frankel, O., & Zahavi., A. (1989.). Security file system and method for securing data in a portable data carrier.” . U.S. Patent No. 4,882,474. .
Gurbaxani, V., & Whang., S. (1991). The impact of information systems on organizations and markets. Communications of the ACM , 59-73.
Javidi, B. (2008). Securing information with optical technologies. Physics Today, 27-32.
Laudon, K., & Laudon, J. (2010). Management Information Systems: International Edition, 11/E. Pearson Higher Education.
Swanson, M., & Guttman, B. (1996). Generally Accepted Principles and Practices for Securing Information Technology Systems. US: National Institute of Standards and Technology.
Zhang, C., & Li, S. (2003). Securing information sharing in internet-based supply chain management systems.

Skills

Posted on

March 9, 2018

Submit a Comment

Your email address will not be published.