Search This Blog

Showing posts with label Information Systems Dissertation. Show all posts
Showing posts with label Information Systems Dissertation. Show all posts

27 Jun 2011

Information Systems Dissertation - Computers Security Business

While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization's business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside attacker will have a higher probability of successfully breaking into the system and extracting critical information. The insiders also represent the greatest challenge to securing the company network because they are authorized a level of access to the file system and granted a degree of trust.


Read more on Computers Security Business here...

Information Systems Dissertation - Information Technology Management

This is an era of information and technology where every management aspect is dependent on information to achieve their objectives and goals. Information in this modern age is regarded as ‘Power’ and those who have it are regarded as ‘Powerful’ therefore nothing can progress without information. It is widely accepted as a vital resource that is required to build up other resources. Management has now realized that ever changing business environment and conditions require appropriate distribution of information at various management levels.


Read more on Information Technology Management here...

Information Systems Dissertation - Intrusion Prevention Security

Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting and reporting to the network personnel. The Intrusion Prevention Systems got both characteristics i.e. threat detection and prevention. The detection process analyzes the events for any possible threats while the intrusion prevention stops the detected possible threats and reports the network administrator.


Read more on Intrusion Prevention Security here...

27 May 2011

Information Systems Dissertation - Transformation UML Language

The Unified Modeling Language is a graphical modeling language used for the visualization, specification, construction, and documentation of object-oriented software systems. It has been adopted by the Object Management Group (OMG) and is widely accepted as a standard in industry and research. The UML provides thirteen types of diagrams for different purpose. This thesis focuses on sequence and class diagram known as structure diagram and behavior diagram.


Read more on Transformation UML Language here...

Information Systems Dissertation - Computer Network Data

A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing. A computer network can also be seen as a collection of Personal computers and other related devices which are connected together, either with cables or wirelessly, so that they can share information and communicate with one another. Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe.


Read more on Computer Network Data here...