How to Control Access to Information System?

We should know how to control access to information system. So here we discuss some topics regarding this matter below:

With the introduction of computers, the need for automated tools for protecting files and other information stored in computers became important. This is especially important for a shared system such as a time-sharing system or distributed system.

In such systems, data can be accessed over a public telephone or data network. The authority of a person or organization to some specific data is defined as access.

The generic name for the collection of tools designed to protect data and thwart hackers is computer security. On the other hand, the right of persons to control the distribution of information is termed privacy.

In order to assess the access, security, and privacy needs of an organization effectively and to evaluate and choose various tools and policies, the responsible manager needs a systematic way of defining requirements and characterizing approaches opt to satisfy the requirements.

This is difficult enough in a centralized data-processing environment. With the use of the local area and wide area networks, the problems are compounded.

A list of persons who cause security problems and their objectives are given in Table.

Table: Persons who cause security problems and their objectives



Sales RepresentativeClaiming to represent all of the country, not just a city
BusinessmanDiscovering a competitor’s strategic marketing plan
HackerTesting out someone’s security system; stealing data etc.

Embezzling money from the company

Con-manStealing credit card numbers for sale
Ex-employeeGetting revenge for being fired
StudentHaving fun with others security, for instance, e-mail
StockbrokerDenying a promise made to a customer by e-mail
How to control access of information system

You May Like Also:

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Scroll to Top