Preview

Term Paper

Good Essays
Open Document
Open Document
1970 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Term Paper
Term Paper: A Key Concept in Information Systems
Protecting Information Resources
CIS Management Information Systems

The subject of my paper is about the history and origin of protecting information resources. Data protection dated back as far as 1890 was with the U.S. Census. Then, employers used a punch card to record equipment which was known as a tabulating machine. The punch cards were used for data storage for several years. The photo below shows what a punch card looks like. (Global Data Vault, 2012) There were enough cards to create new ones if cards were lost or destroyed which was very good for companies back then. By the 1950’s, data storage was on a magnetic reel. The reels contained anywhere from 5 MB to 150 MB. That was definitely a lot of MB for the 1950’s. During later years, data storage was used on disks. Floppy disks as they were called held a lot of data as well. I do not believe there was a way for you to lock the disk to keep others from getting the information. As I recall floppy disks had a lock to keep you from erasing the data but not locking it so that no one could access the information stored on it. Now days, there are new ways for of protecting data. Computers back in the 50’s were very expensive to maintain but now, computers are more easily to maintain and operate. In the old days, data protection had to be loaded on to computers. We now have to install data protection for our computers. The data that was accessed in the old days processed longer than they do now. Data that is being processed is now done in real time. The current use of protecting information resources is that the current systems have to utilize and address data formatting changes. These changes are quite difficult at times. The problem with these systems are that they separate the applications which in needed for a better solution of how data protection is used. When beginning to store data of any kind, one must make certain that you look for a



References: Bidgoli, Hossein (2012) MIS 2 2nd Edition, Cengage Learning Global Data Vault (2012). http://www.globaldatavault.com/data-protection-whitepaper.htm Online Privacy Alliance (2011). http://www.privacyalliance.org/resources/rulesntools.shtml PSI (2012). The International Network of the Promotional Product Industry, http://www.psinetwork.org/data_protection_conditions_of_use_142.html#Dataprotection Salem, Enrique (2012). SC Magazine. Protecting information today for a secure future http://www.scmagazine.com/protecting-information-today-for-a-secure-future/article/229625/

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The different information systems include filing cabinets where hard copies are stores or electronically where saved changes can be made and they can be made safe with a password. The information in the filing cabinets is generally a paper based file, containing any original documents and copies of documents that have been used in a case. The paper based file can hold private and confidential information including personal…

    • 798 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Small, medium, and large facilities take many security measures to protect their business and clients. In an effort to keep patient records safe there are secure file rooms, password protected computers, doors that require access codes or key cards, among other things. If records were not secured, medical facilities would run the risk of confidential material getting into the wrong hands. There are differences and similarities in the way each size facility handles medical records. The handling of medical records includes security measures, tracking, and circulation.…

    • 843 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    Aii. Explain why it is important to have secure systems for recording and storing information in a…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Term Paper

    • 291 Words
    • 2 Pages

    Lincoln Electric was founded in 1895, and is the world leader in the design, development and manufacture of arc welding products, robotic welding systems, plasma and oxyfuel cutting equipment.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    Have you thought about installing a home security system, but put it off because you don't think you really need one? Well, before you put it off any longer, you may want to consider these facts: In 2010, there were more than two million home burglaries in the United States, over 70 percent of which took place in residential homes, reports the Federal Bureau of Investigation (FBI). Victims of these burglaries claimed an estimated $4.6 billion in lost property, and the average dollar loss per burglary was $2,119. With these startling statistics, investing in a home security system doesn't seem like such a bad idea. The number one reason to invest in a home security system is to protect your family and many other things. In this report we will show the steps as well as the design of home security system.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    It states how it must be stored e.g. securely and how it must be disposed of, this includes both paper and electronic files.…

    • 3715 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Not including alphabetic characters in a Social Security Number field is an example of _____.…

    • 2865 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Term Paper

    • 472 Words
    • 2 Pages

    In “The Processing Plant,” Pollan attempts to track down what happens to the corn that is not sent to the feedlot. Much of it ends up in processing plants. Pollan distinguishes between a traditional mill, which grinds corn into flour to produce tortillas, and wet mills, which rely on a great deal of water, energy derived from fossil fuels, and steel tanks. These wet mills are like an artificial digestive system that breaks corn down into its molecular parts so it can be used to produce, among many other things, high-fructose corn syrup. Pollan explains that once corn is broken down…

    • 472 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In my paper, I am going to explain technology threats that an organization might face with having medical records put on a database. I am also going to explain the information that will be protected in medical records on the database. I will also go over all the latest security measures available to help keep these databases threat free so the medical records will be safe on the computer. I will also explain what I would do to help keep my organizations medical records secure.…

    • 797 Words
    • 4 Pages
    Good Essays