Three Fundamental Elements Information Systems

Three Fundamental Elements Information Systems

Uncover what are the three fundamental elements information systems.

What Are The Three Fundamental Elements Information Systems?

There are three fundamental elements Information Systems.

Namely:

  • Identification
  • Authentication
  • Authorization

What are these?

Identification

Identification is when you enter your username upon log-ins. However, this does not include the providing of passwords.

Authentication

Authentication is the process of proving that you are truly the one logging in. 

Authorization

On the other hand, authorization determines the allowed steps and things you can do with the system. Besides, authorization takes the last. Because this only takes place upon completing the first two steps.

These three, identification, authentication, and authorization– surely boosts an entity’s IS. thus, answering the question, what are the three fundamental elements of an effective security program for information systems.

Information Security: Best Practices

On the other hand, there are more information security practices that employees should know. Being knowledgeable enough shall help employees be compliant with their company’s security.

For example:

Protect Information & All Sorts of Data

Your company might have implemented the best information security policies. But all of these can be put to waste when employees do not cooperate.

So if you are an employee, what can you do?

By all means, you want to protect yourself. May it be from any sort of harm. And this surely includes identity theft and such.

In like manner, you should be wary of how you handle your work data.

How?

Well, consider the following, for instance.

  • Be careful not to post anything (picture or video) on social media with small details. It could be a computer screen, whiteboard, or company note in the background. This small innocent act can serve as loopholes.
  • Respect third party’s data. In case you have the chance to handle such, be extra careful with what you are entrusted with.
  • Discard data that is no longer in need. Perhaps you can follow the company’s internal policies about this.
  • Report any suspicious emails or ransomware you encounter. 

Install Firewall For Work & Home Devices

A firewall defense may sound basic. But this is often misplaced too. 

Firewall protection should be your first line of defense against any attack. For instance, a firewall blocks any malicious attempts and viruses.

Besides, if you are assigned to work from home, have a personal firewall also. You can consult with your IT team about this, for instance. This is most importantly crucial in this time of the pandemic. Where remote access to corporate data is now made more of a widespread practice.

Be Wary Of What You Connect

Connecting to networks may not pose a problem unless you are out of the company premises. For example, in this time of the pandemic. Workers are now more sent home for remote access. Perhaps you like working outside, like in a coffee shop.

What should you do then?

Even if the coffee shop has a public wi-fi network, avoid connecting. Instead, have your own connection. Or you may use VPN. VPNs are safer to use especially when using public wi-fi. 

Click to rate this post!
[Total: 0 Average: 0]

Leave a Comment

Your email address will not be published. Required fields are marked *