Site Loader
Rock Street, San Francisco

1.      Identify, list, and define the six
components of an information system.

Which are most directly
affected by the study of computer security?Which are most commonly
associated with its study?Provide examples of at least
three components.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

            The six components of an information
system are data, software, hardware, procedures, people, and communication. Data
is the information element of an information system and is necessary for
software to function. Data can be in the form of letter, numbers, or even
images. Procedures is a set of rules or instructions for how something should
be done. Hardware is used to define a computer or the accessories, such as
routers, printers, or servers. Software instructs the hardware on how to
function and collects, manage, and manipulate data while executing the
instructions. Examples of software include programming, application and
operation software. People, also called users, are also a vital part of an
information system as they design and operate the software, input the data,
build the hardware and keep it running. Lastly, communication is another
important element because it allows for all of the parts, including the
computer itself, to communicate and work with each other and other systems. All
are directly affected by the study of computer security as certain methods must
be followed and systems working together in order to achieve a successful
information system.




2.       Why is the top-down approach to
information security superior to the bottom-up approach? Provide an example.

The top-down approach is done by
management by first initiating a framework and implementation of practical
security practices. In contrast, the bottom-up approach is when management
initiates the process to detect malfunctions and improve system security. The
top-down approach is superior to the bottom-up approach because the method
includes a formal development strategy to attain better security measures and
include significant features such as strong upper management, dedicated
funding, strategies, and planned methods to implement the strategies. Unlike
the top-down approach, the bottom-up approach isn’t clear on strategies,
funding, management, and there isn’t much accessibility to resources.


Post Author: admin


I'm Anna!

Would you like to get a custom essay? How about receiving a customized one?

Check it out