ASAD QUIZ CH 8

docx

School

Texas A&M University *

*We aren’t endorsed by this school

Course

624

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by BaronHummingbird3800

Report
ASAD QUIZ CH 8 System Value The most important computer asset in any organization is not the equipment; it is the organization’s data. In some cases, the information system itself has value that far exceeds the cost of the equipment as well. For example, for an Internet bank that has no brick-and-mortar branches, the website is a mission critical system . Encryption and Authentication Requirements One of the best ways to prevent unauthorized access to data is encryption , which is a means of disguising information by the use of mathematical algorithms A symmetric encryption algorithm [such as Data Encryption Standard (DES) or Advanced Encryption Standard (AES)] is one in which the key used to encrypt a message is the same as the one used to decrypt it. In an asymmetric encryption algorithm (such as public key encryption ), the key used to encrypt data (called the public key ) is different from the one used to decrypt it (called the private key ). Public key encryption also permits authentication (or digital signatures). When one user sends a message to another, it is difficult to legally prove who actually sent the message. Legal proof is important in many communications, such as bank transfers and buy/sell orders in currency and stock trading, which normally require legal signatures. Public key encryption algorithms are invertible , meaning that text encrypted with either key can be decrypted by the other. This is where the Internet’s public key infrastructure (PKI) becomes important. 6 The PKI is a set of hardware, software, organizations, and policies designed to make public key encryption work on the Internet. PKI begins with a certificate authority (CA) , which is a trusted organization that can vouch for the authenticity of the person or organization using authentication (e.g., VeriSign). The encryption and authentication requirements state what encryption and authentication requirements are needed for what data. A promising new security technology is blockchain . Blockchain is used to secure the transactions taking place between users in the same network. The single most common security problem comes from viruses . Recent studies have shown that over 50% of organizations suffer a virus infection each year
Cultural and political requirements are specific to the countries in which the system will be used. In today’s global business environment, organizations are expanding their systems to reach users around the world. The first and most obvious difference between applications used in one region and those designed for global use is language. Global applications often have multilingual requirements , which means that they have to support users who speak different languages and write with non-English letters (e Some systems are designed to handle multiple languages on the fly so that users in different countries can use different languages concurrently; that is, the same system supports several different languages simultaneously (a concurrent multilingual system ). Other systems contain separate parts that are written in each language and must be reinstalled before a specific language can be used; that is, each language is provided by a different version of the system so that any one installation will use only one language (i.e., a discrete multilingual system ). For global applications, the project team will need to give some thought to customization requirements : how much of the application will be controlled by a central group and how much of the application will be managed locally? Many countries have unstated norms that are not shared internationally. It is important for the application designer to make these assumptions explicit, because they can lead to confusion otherwise. Legal requirements are imposed by laws and government regulations. System developers sometimes forget to think about legal regulations, but unfortunately, ignorance of the law is no defense Generally speaking, information systems that have high performance requirements are best suited to client–server architectures Generally speaking, server-based architectures tend to be more secure because all software is in one location and because mainframe operating systems are more secure than microcomputer operating systems. The hardware and software specification is a document that describes what hardware and software are needed to support the application. First, you will need to define the software that will run on each component. Next, you must create a list of the hardware needed to support the future system.
Finally, you need to describe, in as much detail as possible, the minimum requirements for each piece of hardware.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help