ASAD QUIZ CH 8
docx
keyboard_arrow_up
School
Texas A&M University *
*We aren’t endorsed by this school
Course
624
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by BaronHummingbird3800
ASAD QUIZ CH 8
System Value
The most important computer asset in any organization is not the equipment; it is the organization’s
data.
In some cases, the information system itself has value that far exceeds the cost of the equipment
as well. For example, for an Internet bank that has no brick-and-mortar branches, the website
is a mission critical system
.
Encryption and Authentication Requirements
One of the best ways to prevent unauthorized access to data is encryption
, which is a means of
disguising information by the use of mathematical algorithms
A symmetric encryption algorithm [such as Data Encryption Standard (DES) or
Advanced Encryption Standard (AES)] is one in which the key used to encrypt a message is the
same as the one used to decrypt it.
In an asymmetric encryption algorithm (such as public key encryption
), the key used to
encrypt data (called the public key
) is different from the one used to decrypt it (called the private
key
). Public key encryption also permits authentication (or digital signatures). When one user
sends
a message to another, it is difficult to legally prove who actually sent the message. Legal proof
is important in many communications, such as bank transfers and buy/sell orders in currency
and stock trading, which normally require legal signatures. Public key encryption algorithms are
invertible
, meaning that text encrypted with either key can be decrypted by the other.
This is where the Internet’s public key infrastructure (PKI) becomes important.
6 The PKI is a
set of hardware, software, organizations, and policies designed to make public key encryption work
on the Internet. PKI begins with a certificate authority (CA)
, which is a trusted organization that
can vouch for the authenticity of the person or organization using authentication (e.g., VeriSign).
The encryption and authentication requirements state what encryption and authentication
requirements are needed for what data.
A promising new security technology is blockchain
. Blockchain is used to secure the transactions
taking place between users in the same network.
The single most common security problem comes from viruses
. Recent studies have shown that
over 50% of organizations suffer a virus infection each year
Cultural and political requirements are specific to the countries in which the system will be used.
In today’s global business environment, organizations are expanding their systems to reach users
around the world.
The first and most obvious difference between applications used in one region and those designed
for global use is language. Global applications often have multilingual requirements
, which
means that they have to support users who speak different languages and write with non-English
letters (e
Some systems are designed to handle multiple languages on the fly so that users in different
countries can use different languages concurrently; that is, the same system supports several different
languages simultaneously (a concurrent multilingual system
). Other systems contain separate
parts that are written in each language and must be reinstalled before a specific language can be
used; that is, each language is provided by a different version of the system so that any one installation
will use only one language (i.e., a discrete multilingual system
).
For global applications, the project team will need to give some thought to customization
requirements
: how much of the application will be controlled by a central group and how much
of the application will be managed locally?
Many countries have unstated norms that are not shared internationally. It is important for the
application designer to make these assumptions explicit, because they can lead to confusion otherwise.
Legal requirements are imposed by laws and government regulations. System developers sometimes
forget to think about legal regulations, but unfortunately, ignorance of the law is no defense
Generally speaking, information systems that have high performance requirements are best suited
to client–server architectures
Generally speaking, server-based architectures tend to be more secure because all software is in
one location and because mainframe operating systems are more secure than microcomputer
operating systems.
The hardware and software specification is a document that describes
what hardware and software are needed to support the application.
First, you will need to define the software that will run on each component.
Next, you must create a list of the hardware needed to support the future system.
Finally, you need to describe, in as much detail as possible, the minimum requirements for
each piece of hardware.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help