UML, or Unified Modeling Language, is a the

vishalbhattcs 0 views 10 slides Oct 24, 2025
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

UML, or Unified Modeling Language, is a standardized visual language used to create diagrams for specifying, visualizing, constructing, and documenting software systems.


Slide Content

An Information System is a structured, socio-
technical and organizational framework designed t
o gather, process , store and exchange information
.  
The information systems are composed of three
elements from a socio-
technical perspective: mission, individuals, structur
e (or roles) and technology.

Example: Enterprise Resource Planning (ERP), (Supply
Chain Management (SCM), Customer Relationship
Management (CRM)[1]

Information security is “the practice of preventing
unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction
of information”. Information can take many forms,
such as electronic and physical [3]

Roles of Information Security
Protects the
organization's
ability to
function
Safeguards
the
technology
the
organization
uses
Enables the
safe operation
of applications
implemented
on the
organization's
IT systems
Protects the
data the
organization
collects and
uses

In an increasingly interconnected environment,
information is exposed to a growing number and
wider variety of risks. Threats such as malicious code,
computer hacking and denial-of-service attacks have
become more common, ambitious and sophisticated,
making implementing, maintaining and updating
information security in an organization more of a
challenge.

Be scalable to address evolving and increasing
threats;
Be repeatable for frequent risks assessments;
Reduce variability by helping you make consistent
decisions based on fact rather than human
interpretation;
Be maintainable for multiple stakeholders across
your organization; and
Have everything you need in one place for
governance, risk and compliance, making it a quick
and cost-effective route to compliance.

[1] Nina Godbole, Information Systems
Security, Wiley India, New Delhi, 2008
[2] Cathal Doyle, “Common Types of
Information Systems”, 2013
https://eternalsunshineoftheismind.wordpr
ess.com/2013/02/19/common-types-of-
information-systems
[3] Cyrus Piekari, Anton Chuvakin, “Security
Warrior”, 2nd ed., Oreilly Publishers, 2005.

Thanks
Tags