introduction

1
INTRODUCTION The mightiest challenge of the yester century was to process the raw data into information. Once mankind cracked the art of information systems it was a huge leap. Systems were involved more in day to day human- activities, right from a metro train ticket till huge constructions. The current day challenge is the “Information security”. It is the art of storing and transmitting information in a secure way. This report explains in detail about the information security, principles of information security, privacy, cyber security threats and ethics of information systems. To use the organisation’s resources and information in an optimized way, thereby achieve a maximum, it is necessary to have a proper information system with required back up securities.

Upload: divansu-d-bansal

Post on 16-Nov-2015

217 views

Category:

Documents


3 download

DESCRIPTION

free

TRANSCRIPT

INTRODUCTIONThe mightiest challenge of the yester century was to process the raw data into information. Once mankind cracked the art of information systems it was a huge leap. Systems were involved more in day to day human- activities, right from a metro train ticket till huge constructions. The current day challenge is the Information security. It is the art of storing and transmitting information in a secure way. This report explains in detail about the information security, principles of information security, privacy, cyber security threats and ethics of information systems. To use the organisations resources and information in an optimized way, thereby achieve a maximum, it is necessary to have a proper information system with required back up securities.