Report on Process of Information System

Added on - 03 Dec 2019

  • 12

    Pages

  • 3469

    Words

  • 150

    Views

  • 0

    Downloads

Trusted by +2 million users,
assist thousands of students everyday
Showing pages 1 to 4 of 12 pages
INFORMATION SYSTEM
TABLE OF CONTENTSINTRODUCTION.................................................................................................................................1FINDINGS AND ANALYSIS..............................................................................................................12.1 Databases.....................................................................................................................................12.1.1 Efficiency..............................................................................................................................12.2 Security........................................................................................................................................12.2.1 Data Access..........................................................................................................................5CONCLUSION.....................................................................................................................................6REFERENCES......................................................................................................................................8
LIST OF FIGURESFigure 1SQL Injection...........................................................................................................................2Figure 2Process of Encryption...............................................................................................................5
INTRODUCTIONIn today’s globalized world most of the organizations nowadays are adopting differentdatabase techniques in order to store and maintain their most important data. Databasecontains overall information about the company’s employees as well as their customers andfinancial status. It is the best way through which management team can get any type ofinformation at any time of requirements. One of the most crucial tasks for company is tomaintain security level of their database as there is a huge scope of data loss (Godbole, 2008).Within this increasing need of organizations to collect and store their data, databasemanagement has become a key component of business efficiency. The present report ishighly concern about the data security as well as data efficiency. It defines that howorganizations are dealing with different security threats within their database. Further, it alsoprovides appropriate information related to the benefits that organization can attain fromgood security and efficiency. There are various methods that can be used by company inorder to secure their database system (Ahmad, 2002). Moreover, this study gives deep insightabout the best practice in dealing with security and efficiency issues.FINDINGS AND ANALYSIS2.1 DatabasesThe security and privacy of database are the most important assets of anyorganizations. In today’s globalized and competitive era it is becoming most crucial tasks forcompanies to maintaining essential security for their private as well as personal data.2.1.1 EfficiencyOne of the important tasks for organizations is to maintain the efficiency of theirdatabase. There are varied ranges of IT solutions for creating simple databases in order toaddress some of the most common company needs (Mcleod, 2008). There are various waysthrough which companies can make their database more efficient. In this, they require tomaintain effective security systems so that faster speed of the system can be attained. Itprovides efficient output in a more effective way.With the help of securing their databasecompanies can easily keep their whole information secure and maintain their databaseprivacy. Sensitive information can be exposed when transmitted over non secured channel.2.2 SecurityDatabase security is a major concern which uses a broad range of information securitycontrols in order to protect their database. Database security basically requires storing datathat prevent unauthorized people from accessing it (Rob and Coronel, 2007). Data encryption1|Page
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document