Sti - Esra Helena - 2002112125
Sti - Esra Helena - 2002112125
Sti - Esra Helena - 2002112125
MANAGEMENT DEPARTMENT
THE FACULTY OF ECONOMICS AND BUSINESS
UNIVERSITY OF RIAU
YEAR OF 2021/2022
3. What are the unintentional disturbances in the information system and how to overcome
or improve the information system?
a. Technical errors:
- Hardware errors
- Syntax errors
- Logical errors
b. Environmental disturbances:
- Electric current error due to lightning
c. Human errors:
- Data entry error.
- Data deletion error.
- Operator error (wrong labeling of magnetic tape)
-
How to overcome :
Access control.
Access control can be achieved in three steps, namely user identification, user
authentication and user authorization.
Monitor for attacks on the system.
The monitoring system is used to detect any intruders who enter the system
(intruders) or an attack (attack) from hackers. This system is commonly called an
“intruder detection system” (IDS)
Use of Encryption.
One of the mechanisms to improve system security is by using data encryption
technology. The data sent is modified in such a way that it is not easily known by
other unauthorized persons.
4. Explain the difference between systems, information, and information technology system.
The system is a collection or set of elements, components, or variables that are organized,
interact with each other, depend on each other and are integrated.
Information is data that has been processed into a form that is meaningful to the recipient
and useful in current or future decision making.
While an information technology system is a combination of information technology and
the activities of people who use that technology to support operations and management.
5. What are the challenges that arise from the information systems strategy and how these
challenges should be resolved?
- Existing competitors
- The threat of new competitors
- Threat of substitute/substitute products
- Bargaining power of customers
- Bargaining power of suppliers
How to resolved: