Project 2 template.doc - Running head: SECURITY ASSESSMENT...

This preview shows page 1 - 4 out of 7 pages.

Running head: SECURITY ASSESSMENT REPORT1Security Assessment ReportAshley HidalgoUniversity of Maryland University College
INFORMATION SYSTEMS AND IDENTITY MANAGEMENT2Information Systems and Operations System OverviewAn information system (IS) is defined as an organization system that helps organize andanalyze data. This collection of information is composed of five main elements: software, data,networks, people, and process. (Bourgeois, 2014)Within an information system, operating systems (OS) fall under software, and play acrucial part in building a foundation in having a functional computer. With the use of an OS, auser is given an interface, called the graphic user interface (GUI) so that users may interact withhardware and build additional applications that can allow the system to conduct key tasks.People, also known as users, can navigate through this interface to use additional applicationsthat can be installed, called software, or create new software programs. Popular operatingsystems, such as Microsoft’s Windows or Apples Mac IOS dominate the mainstream markettoday.The kernel of the OS is the connection between the hardware and the software of yourcomputer. The kernel loads first and remains in memory until the operating system is shut downand is responsible for low level tasks such as disk, memory and task management.(“Techopedia”, n.d.) This application is distinctly different from other applications, which aremuch more specialized in nature. Application software that is installed by an organization or usercan be used for productivity or utility purposes. Productivity software, such as Microsoft Word,allows users to conduct word processing. Utility software allows for computer modification, suchas installing an Antivirus to protect against malicious actors.An embedded operating system is a system that is directly built into the hardware of asystem, with a compulsory task built in, such as within the wash setting within a washing
INFORMATION SYSTEMS AND IDENTITY MANAGEMENT3machine or the anti-brake system within a car. They are designed to be efficient and reliable, butnot versatile, as they usually are programmed with one function or task in it’s coding.Many threats are present within information and operating systems. It is important to takethese threats seriously within the information infrastructure as decisions to choose types ofsoftware can be critical in business decision making. Choices in choosing open source (freesource code) or proprietary (licensed) software can have huge implications on several factors,

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Dr. Bass

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture