In MIS, information is a critical asset. If information is stolen, changed, or becomes unavailable, business operations and decisions suffer. Therefore, organizations focus on information security (protecting data and systems) and follow cyber laws (legal rules related to digital transactions and misuse). Along with law, privacy and ethics ensure responsible and fair use of data and technology.
This topic is typically asked as:
Information security means protecting information and information systems from:
Goal: ensure information is secure, accurate and available for authorized users.
The CIA triad is the foundation of information security:
A cyber threat is any potential danger that can exploit a vulnerability and cause harm to data/systems.
Threats can be classified as:
Malware is malicious software designed to damage, disrupt or steal.
Basic impact:
Phishing is a fraudulent attempt to steal sensitive information through fake emails/SMS/websites.
Example:
Manipulating people to reveal information or perform actions (sharing password/OTP).
Using someone’s personal data to impersonate them (fraudulent transactions/loans).
Accessing systems without permission to steal/modify data.
Unauthorized exposure of sensitive information (customer data, passwords).
Access the complete note and unlock all topic-wise content
It's free and takes just 5 seconds
From this topic
The CIA triad is the foundation of information security:
Thus, CIA ensures data is private, correct and accessible.
Virus vs Worm vs Trojan vs Ransomware:
Hence, worms spread automatically, trojans hide inside apps, and ransomware extorts money by locking data.
A management information system (MIS) is a computer system consisting of hardware and software that serves as the backbone of an organization's operations. An MIS gathers data from multiple online systems, analyzes the information, and reports data to aid in management decision-making.
Download this note as PDF at no cost
If any AD appears on download click please wait for 30sec till it gets completed and then close it, you will be redirected to pdf/ppt notes page.
In MIS, information is a critical asset. If information is stolen, changed, or becomes unavailable, business operations and decisions suffer. Therefore, organizations focus on information security (protecting data and systems) and follow cyber laws (legal rules related to digital transactions and misuse). Along with law, privacy and ethics ensure responsible and fair use of data and technology.
This topic is typically asked as:
Information security means protecting information and information systems from:
Goal: ensure information is secure, accurate and available for authorized users.
The CIA triad is the foundation of information security:
A cyber threat is any potential danger that can exploit a vulnerability and cause harm to data/systems.
Threats can be classified as:
Malware is malicious software designed to damage, disrupt or steal.
Basic impact:
Phishing is a fraudulent attempt to steal sensitive information through fake emails/SMS/websites.
Example:
Manipulating people to reveal information or perform actions (sharing password/OTP).
Using someone’s personal data to impersonate them (fraudulent transactions/loans).
Accessing systems without permission to steal/modify data.
Unauthorized exposure of sensitive information (customer data, passwords).
These three are core security concepts:
Example:
Encryption converts readable data into coded form so that only authorized parties can read it.
Where it is used:
Benefit:
Basic steps:
Privacy is the right of individuals to control how their personal information is collected, used, shared and stored.
Good privacy practices:
Ethics refers to moral principles guiding correct behavior in using IT.
Common ethical issues:
Ethical use builds trust and protects reputation.
Cyber laws are legal rules dealing with:
Objectives:
Examples of cyber crimes:
Note: Specific acts/sections differ by country; in exams, focus on meaning, objectives, and examples.
Detect → Contain → Investigate → Eradicate → Recover → Review/Improve
Get instant access to notes, practice questions, and more benefits with our mobile app.
An incident response plan helps an organization handle attacks quickly and reduce damage.
Detect → Contain → Investigate → Eradicate → Recover → Review/Improve
Exam-style points:
Thus, incident response ensures quicker recovery and improves future security posture.