Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security. Examples of threats such as unauthorized access (hacker and cracker), computer viruses, theft, sabotage, vandalism and accidents. Unauthorized Access (Hacker and Cracker): One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data. The main concern comes Continue reading

Open Systems Interconnection (OSI) Model

Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984, as a conceptual framework of standards for communication in the network across different equipment and applications by different merchants. It is now considered the primary architectural model for inter-computing and inter-networking communications.  There are seven layers within the OSI model that serve to differentiate the various hardware and software functions that a network provides. Each layer depends on the proper functioning of the layer immediately below it to provide its raw functionality, which is enhanced and then passed to the next higher layer. Status messages may be communicated up or down the various layers, although each layer only communicates with its immediate neighbors. As each layer is solely dependent on the layer below it for lower-level services, higher layers are shielded from system, hardware, and software implementation details. This leads to the Continue reading

New Trends In E-Business

E-business changed the way business was being done over the years. It created more and more avenues and opportunities. E-business changed the competitive platform. While the old competitive barriers are diminishing it created new entry and competitive barriers. The hard competitive barriers are becoming weak while the soft competitive barriers became more and more prominent. It is believed that not even 50% of the potential of e-business is to be unleashed yet. This definitely indicates that e-business has lot more to offer. E-business has appealed the businesses and customers from all segments. E-business increased the connectivity among different businesses. The integration among departments, different businesses, and different sectors through e-business made it possible to offer variety of services to customers. The new technologies, high speed internet made the transactions possible. Improved integration and interoperability needs of next generation e-business systems are met by new e-business solution architectures. New technologies of Continue reading

Components of Voice Over Internet Protocol (VoIP)

VoIP stands for Voice over Internet Protocol. It is a technology that lets you make telephone calls over the Internet, rather than a regular phone line. Which is almost always cheaper.  VoIP works by using a network technology known as Packet Switching Network whereas landline telephones use the Circuit Switching Network. This is referred to as the Public Switched Telephone Network. The main difference between Packet Switching and Circuit Switching is that Packet Switching uses (data) or Packets and sends them over the Internet while Circuit Switching is accomplished by using electrical circuits to make a telephone connection. Circuit Switching is like the old Switchboard operators, frantically trying to connect the right caller with the receiver. Packet Switching is used to transfer data all across the Internet including E-mail. Packet Switching converts audio formats into data packets and transmits them over the Internet, then reassembles them on the other person’s Continue reading

Protocols used for Voice over Internet Protocol (VoIP)

Voice over Internet Protocol known as VoIP is a relatively new technology whose transmission is based on Packet Switched Networks. It allows making voice calls over the internet broadband connections instead of the using conventional PSTN landlines. It allows calling on another computer and as well as other telephone numbers and mobiles. It therefore provides all the services like a telephone with the addition of some other facilities due to the internet media. VoIP services can be seen as the commercial realization of the Network Voice Protocol which came into being in 1973. VoIP services are increasing at an exponential rate due to the low cost calls. It only requires the setup of the data network transmissions and the call services can be used on this data network which lowers the cost of the VoIP calls very low as compared to other services. The development of standards or ‘protocol’ for Continue reading

Disaster Recovery Plan (DRP) in Business

Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organization’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane. Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organization. A good disaster recovery plan can prevent an organization from any type of disruption. Disaster Recovery Continue reading