Information System Security
Describes the security authentication process and other information security considerations that will affect the design and development process for new information systems.
Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage.
Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.
Provide an overview of several systems and devices that can provide security services to meet the needs raised in the paper
The second most essential aspect of an information system after its reliability is its security. Security as a factor is important as it determines the future and the current performance of the system. Any organization that seeks to install a new system always has to consider the various market trends, existing security risks, and the roles that the system will serve. The more sensitive the system is to the core operations of an organization, the more the security measures to be applied to ensure only authenticated individuals make use of the system. Two notable organizations that apply measures and consideration in their system is the COTS and IBM. This paper will seek to elaborate some of the security consideration that these companies have set in place to determine the effectiveness of their systems.
Security Authentication Process and Other Information Security Considerations of a new System
Security considerations of a system are usually determined by the role of the systems and the various principles that guide development of systems. In effect, it is the understanding of how systems are attacked and thus developing mechanisms of preventing such vulnerabilities. The most notable role of the security measures in a system most accrues to four aspects, unauthorized access, tampering of the data, disruption, and destruction.
Miller (2013) recommends about sixteen approaches that would be essential in determining how the system will function and further to develop an awareness of the performance of the system to mitigate any risks and loss of security on systems. The first aspect as he notes is to determine the role of the system and to evaluate all the components that are associated with the system. Each organization has those unique attributes that are the core components of the system. These attributes should be set prior, and each of the various applied technology and codes analyzed to ensure the system is leak-proof. Closely connected to this is the determination of what counts or the most applied concept of the system in an organization. Once such a problem is identified, the organization can determine the individuals it will task on specific nodes to monitor the system or determine who should log in, where and when they should do so.
In the second batch of considerations of the new system is to understand the systems connections and establishing mechanisms for setting up secure infrastructure. One notable way that an organization prevent themselves is by identifying those sectors on the systems that are likely to be most prone and if they can afford set up ways to prevent intrusion. For example, an organization can decide to encrypt their systems such as secure socket layers to assist them to encrypt their system. Every aspect of the system and not limited to the communication channel would need to be analyzed and understood to resolve any communication platform (Keen, 2012). Keen notes this is how IBM advises its clients