- Trending Categories
- Data Structure
- Operating System
- MS Excel
- C Programming
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What is Global information system in information security?
A Global information system is a system that generates, manages, analyzes, and maps all types of data. GIS connects data to a map, integrating location information with all types of descriptive data. This supports a foundation for mapping and analysis that is used in science and almost each industry.
GIS provides users understand patterns, associationship, and geographic context. The benefits involve improved communication and efficiency and better management and decision making.
The information system of an organization can be defined as a system that serves to provide information within the organization when and where it is required at some managerial level. An information system is a group of people, processes and resources that interact to satisfy the information processing requirement of an organization.
During the processing, the data is collected, saved, changed and distributed in an organization. Such a system must create the information received and store, retrieve, transform, process, and interact it using the computer system or multiple means. It is not important that an information system cannot function in the absence of computers. An information system is a logically interrelated group of business procedure that accomplish organizational goals.
Traditional methods to information systems development are implicitly based on assumptions where the information systems are closed, stand-alone systems used inside closed organizational limits. Telecommunication systems are worldwide. The most essential design work or decisions at least are taken care of by standardization bodies (CCITT and ITU).
When developing infrastructures, the target on closed, stand-alone systems has to be restored by one focusing on the infrastructures as open and global as is the case for development of telecommunication technologies. However, there are some parts of the telecommunication method which is more problematic.
Characteristic for traditional telecommunication solutions have been their security. This is in specific true for their functionality and client interface. It is the basic functionality has been durable for more than hundred years. A telephone service has one function such as the user can dial a number, talk to the person at the other end, and hand up when done.
All technologies are designed and defined as global standards. Such standards have been view as absolutely required to allow smooth services and use of the infrastructure. However, the development of such standards creates time generally about ten years for each standard.
While the telephone functionality and client interface has been completely stable and simple, information systems are featured by very rich and highly dynamic functionality. Information systems are closely tied to the working procedure they provide. These processes are documented into the systems creating them unique and local not universal. The environments of information systems are hugely dynamic.
In the case of telecommunication technologies the stability of the functionality and client interface has create users irrelevant in the design process. The client interface has been given, and one can concentrate only on technological problems.
- Related Articles
- What is Management Information System in information security?
- What is information classification in information security?
- What is an Intrusion Detection System in information security?
- What is an Intrusion Prevention System in information security?
- What is Host Intrusion Prevention System in information security?
- Principles of Information System Security
- What is the importance of Security Information Management in information security?
- What is Information Security?
- What is Physical Security in information security?
- What is Security Management in Information Security?
- What is Database Security in information security?
- What is Security Model in information security?
- What are the methodologies for Information System Security?
- What is SIM in information security?
- What is WAN in Information Security?