Security in In-House Developed Information Systems: The Case of Tanzania

被引:0
|
作者
Mushi, Magreth [1 ]
Bakari, Jabiri [1 ]
机构
[1] Open Univ Tanzania OUT, Inst Educ Technol, Dar Es Salaam, Tanzania
关键词
In-house; information system; Security; Source code scanner;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this 21st century, the world is moving more and more into the information economy; and information held by organization's information systems is among the most valuable assets in the organization's care and is considered a critical resource, enabling the organizations to achieve their strategic objectives. In-house developed information systems meant to enable organizations to achieve their strategic objectives, are on the increase and security has become a major concern in recent years. Hackers are using new techniques to gain access to sensitive data, disable information systems and administer other malicious activities aimed at the infoimation systems. The need to secure an information system is imperative for use in today's world. Until recently, information systems security was an afterthought; developers were typically focused on functionality and features, waiting to implement security at the end of development. This approach to information systems security has proven to be disastrous because vulnerabilities have gone undetected allowing information systems to be attacked and damaged. A survey done in three (3) organizations in Tanzania has proved that most of the infolination systems developers have drawn their background from traditional systems development without the sense of implementing security in the early stage of information system development. This paper attempts to identify inhouse developed information system's security deficiencies and related risks to organizations, the paper also attempt to establish technique that can be used to detect those deficiencies. Lastly the paper provide guidance that can be used by organizations to mitigate the risks.
引用
收藏
页码:85 / 89
页数:5
相关论文
共 50 条
  • [1] IMPLEMENTABILITY OF IN-HOUSE DEVELOPED VS APPLICATION PACKAGE BASED INFORMATION-SYSTEMS
    IIVARI, J
    [J]. DATA BASE, 1990, 21 (01): : 1 - 10
  • [2] An Integrated Strategy for Information Security: Outsourcing and In-house
    Feng, Nan
    Chen, Bin
    [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT 2016: THEORY AND APPLICATION OF INDUSTRIAL ENGINEERING, 2017, : 305 - 309
  • [3] Develop security architecture for both in-house healthcare information systems and electronic patient record
    Zhang, JG
    Chen, XM
    Zhuang, J
    Jiang, JR
    Zhang, XY
    Wu, DQ
    Huang, HK
    [J]. MEDICAL IMAGING 2003: PACS AND INTEGRATED MEDICAL INFORMATION SYSTEMS: DESIGN AND EVALUATION, 2003, 5033 : 392 - 402
  • [4] Auditing Albaha University Network Security using in-house Developed Penetration Tool
    Alzahrani, M. E.
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [5] MECHANIZED IN-HOUSE INFORMATION-SYSTEMS - ROWLEY,JE
    BALACHANDRAN, S
    [J]. COLLEGE & RESEARCH LIBRARIES, 1980, 41 (01): : 84 - 86
  • [6] MECHANIZED IN-HOUSE INFORMATION-SYSTEMS - ROWLEY,JE
    EYRE, J
    [J]. PROGRAM-AUTOMATED LIBRARY AND INFORMATION SYSTEMS, 1980, 14 (03): : 144 - 145
  • [7] MECHANIZED IN-HOUSE INFORMATION-SYSTEMS - ROWLEY,JE
    VAGIANOS, L
    [J]. LIBRARY JOURNAL, 1980, 105 (01) : 79 - 80
  • [8] MECHANIZED IN-HOUSE INFORMATION-SYSTEMS - ROWLEY,JE
    HOWAT, B
    [J]. CANADIAN LIBRARY JOURNAL, 1980, 37 (03): : 198 - 199
  • [9] IN-HOUSE INFORMATION TECHNOLOGY
    VONKLEWITZ, O
    [J]. NACHRICHTEN FUR DOKUMENTATION, 1959, 10 (01): : 28 - 34
  • [10] An in-house developed Timescale for NavIC PTF
    Arora, Anu
    Dakkumalla, Suresh
    Bhardwajan, Aakanksha Avnish
    Sadasivan, Rajath
    Maharana, Shikha
    Ganesh, Subramanya T.
    Ramakrishna, B. N.
    [J]. 2019 EUROPEAN NAVIGATION CONFERENCE (ENC), 2019,