0% found this document useful (0 votes)
5 views

Information Systems

Information systems

Uploaded by

aann34890
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Information Systems

Information systems

Uploaded by

aann34890
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INFORMATION SYSTEM ASSIGNMENT

1. Discuss the emerging trends in information systems.


 Cloud Computing: Allows users to access applications, data and services over the
internet without having to install and maintain them on their own computers or servers.
 Artificial intelligence: Used to automate many of the tasks that traditionally required
humans to do such as data analysis, decision making, and problem solving.
 Internet of things: This technology can be used to collect data from various sources
such as sensors, and analyze it to identify patterns and trends.
 Big Data: Used to gain insights into customer behavior, market trends and operational
efficiency.
 Blockchain: Used to securely store and transfer data, as well as to create digital
contracts and secure transactions.
2. (a) Transaction Management System.
 Automated Payment Processing: Used to process payments from customers quickly and
securely.
 Inventory Management: Helps businesses manage their stock levels and ensure that
they have the right amount of items in stock at any given time by tracking inventory
levels, orders and shipments.
 Customer Relationship Management: Used to store customer information, track
customer interactions and manage customer relationships.
 Supply Chain Management: Used to manage the entire supply chain, from the purchase
of raw materials to the delivery of finished products.
(b) Management Information System
 Retail store: Can be used to inventory levels, customer orders and sales trends hence
optimize inventory levels, increase customer satisfaction and improve store efficiency.
 Healthcare Setting: Can be used to track patient’s records, medical history and
treatments hence provide better patient care, improve diagnoses and reduce medical
errors.
 Manufacturing Plant: Can be used toto track production levels, quality control and
maintenance schedules hence increase efficiency, reduce downtime and improve
product quality.
 Financial Institution: Can be used to track investments, customer accounts and financial
transactions hence optimize investments, reduce risks and improve customer service.

(c) Decision Support System.

 Healthcare: Used in healthcare to help doctors and nurses make better decisions
about patient care by providing real-time access to patient record, medical research
and clinical guidelines hence making clinicians make informed decisions about the
best course of treatment.
 Business: Used to help managers make better decisions about resource allocation,
pricing, marketing and other business operations by providing access to data and
analytics hence helping managers understand the market, customer needs and
competitor activities.
 Education: Used to help teachers and administrators make better decisions about
curriculum design, assessment and student performance by providing access to
data and analytics to help educators understand the needs of their students and
customize instruction to meet those needs.
 Government: Used to help policy makers make better decisions about public
services, taxation and other government operations by providing access to data and
analytics to help policy makers understand the needs of their constituents and make
informed decisions about how best to serve those needs.

(d) Exclusive Information System

 Financial Institutions: Institutions such as banks, investment firms and insurance


companies often requires exclusive information systems to manage their customer
data, financial transactions and other confidential information.
 Government Agencies: Agencies such as military, law enforcement and intelligence
services require exclusive information systems to protect sensitive information from
unauthorized access.
 Healthcare: Such organizations use exclusive information systems to store and
protect patient medical records, health insurance information and other
confidential data.
 Educational Institutions: They use exclusive information systems to store student
records, grades and other confidential data.
 Corporations and Businesses: Corporations and businesses use exclusive
information systems to store customer data, financial information and other
confidential data.

3. Mobile security threats.


o Malware: Malicious software such as viruses, worms and Trojans can be used to steal
personal information, damage devices and corrupt data.
o Unauthorized Access: Unauthorized access to a mobile device can allow attackers to
access sensitive data and use the device for malicious purposes.
o Phishing: Phishing attacks use deceptive emails or texts messages to lure users into
providing personal information or clicking on malicious links.
o Unsecured Wi-Fi: Unsecured Wi-Fi networks can allow attackers to intercept data sent
over the network.
o Weak Password: Weak passwords can be easily guessed, allowing attackers to gain
access to a device or account.
o Unsecure Apps: Unsecure apps can be used to access data stored on the device or to
gain access to other accounts.
4. Defense strategies against the threat identified above.
 Use strong passwords: Strong Passwords is one of the most important steps in
protecting your mobile device from security threats.
 Use Encryption: Encryption is a process of scrambling data so that it is unreadable to
anyone who does not have the right key to decrypt it.
 Install Security Software: It is important to keep up to date to ensure the best
protection hence helping protect the device from viruses and other malicious software.
 Use Firewalls: Firewalls help prevent malicious traffic from entering your device hence it
is important to keep the firewall up to date and well configured.
 Use Virtual Private Networks: Virtual private networks (VPNs) are a great way to
protect your data as it travels between your device and the Internet.
 Be Cautious of Apps: Always be cautious when downloading apps. Make sure that the
app is from a trusted source and read the permissions that it requires before installing
it.
5. Web threats and Security.
 Web threats: Can be defined as any malicious activity or attack that is conducted over
the internet. These threats can range from malicious software such as viruses, worms
and Trojans to phishing scams, malicious websites attacks among others.
 Security measures: Are techniques and tools used to protect computer systems and
networks from malicious attacks. These measures can include firewalls, antivirus
software, intrusion detection systems, encryption, authentication and web filtering.
 Phishing: Type of attack where the attacker attempts to gain sensitive information such
as usernames, passwords and credit card details by masquerading as a legitimate entity
in an online communication. Security measures to protect against phishing include using
strong passwords, two-factor authentication and educating users about the dangers of
phishing.
 Malicious website: Involves malicious code being injected into a website in order to gain
access to sensitive information. Security measures to protect against this type of attack
include using SSL/TLS encryption, web application firewalls and regularly patching the
website.
 Identity theft: Occurs when an attacker gains access to personal information such as
social security numbers, bank account numbers and credit card numbers. Security
measures to protect against identity theft include using strong passwords, two-factor
authentication and shredding documents containing personal information.
 Malicious Software: Viruses, worms and Trojans can be spread over the internet and
can cause damage to computer systems. Security measures to protect against malicious
software include using antivirus software, keeping systems up to date with the latest
security patches and avoiding opening suspicious emails or downloading files from
untrusted sources.

You might also like