Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Term

...

System

...

Definitions

...

system Anything we choose to regard (a) as a whole and (b) as comprising a set of related components. More formally a system S = (C, R), where C is the set of its components and R is the set of relationships (or interfaces) that combine them into a coherent whole. In computing the word is freely used to refer to all kinds of combinations of hardware, software, data and other information, procedures, and human activities. An airline reservation system, for instance, comprises all those things, distributed and connected worldwide. At the other end of the spectrum, an *operating system just comprises software components.

(Butterfield et al., 2016, System entry)

...

See Also

...

Application (Dictionary Entry)

...

Application Package (Dictionary Entry)

...

System

dictionary-term

Table of Contents
minLevel2
typeflat

Alternative Forms

  • Sys abbreviation

Definitions

Definition 1 Computer Science

A system is any set of related and discrete IT components (computer hardware, software, data, and data operations) with the capability to collect, store, transform, and/or transmit information, that is regarded as a coherent whole.

A system as a set may be extended to comprise non-IT components (entities, procedures, processes, and activities) that play a role in the system.

A system is defined by the system boundaries, that is the delimitation of the discrete components that are inside in contrast with the discrete components that are outside the set. Defining system boundaries with accuracy may be difficult, especially in complex and dynamic environments of densely interconnected and sometimes overlapping components. Desirable characteristics of system boundaries comprise:

  • Coherence of ownership and managerial control,

  • Coherence of functional requirements or goal,

  • Coherence of non-functional requirements, including security,

  • Coherence of operational constraints.

A system is protected from the external environment by boundary controls. The effectiveness of the boundary controls determines the extent to which the security of the system is dependent on the security of the systems it is interconnected with.

The term system may designate a system design (e.g. a software blueprint), a system package (e.g. a software product), or a system instance (e.g. an installed software). The terms system design, system package, or system instance may be used when the context is not sufficiently clear.

Disambiguation

The following terms are near synonymous but may be used with nuances:

  • An Application Program is a system that derives its coherence from its capability to fulfill some functional requirements.

  • An Information Security Domain is a system that comprises authorities, entities, identities, and authorizations that constitute a community of interest.

  • The term Information Systemused with a definite article (e.g.: as in the information system) is used to designate the overall system of an organization, i.e. the super system that encompasses all the IT systems owned or managed by that organization.

  • The term Information Systemused with an indefinite article (e.g.: as in an information system) focuses on how information flows throughout the system makes it a consistent whole.

  • IT System focuses on the IT components of the system, i.e. hardware, software, data, and data processing.

  • The term System is the most generic form. It should be preferred when referring to both IT (hardware, software, data, data processing) and non-IT (information, procedures, human activities) components

Sample Sentences

Bob developed system X by progressively adding new features. He did not follow architectural best practices and had no overall vision of the system. As time passed by, system X became more and more complex and hard to maintain. One day, Eve had no choice but to take the decision to decommission system X. In effect, system X was too obsolete and became an operational risk for the organization.

Conceptual Diagram

Image Added

Related Terms

Quotes

Expand
titleButterfield et al., 2016, System entry
Include Page
QUOT:Butterfield et al., 2016, System entry
QUOT:Butterfield et al., 2016, System entry
Expand
titleNIST SP 800-26, 2001, p. 4-5
Include Page
QUOT:NIST SP 800-26, 2001, p. 4-5
QUOT:NIST SP 800-26, 2001, p. 4-5
Expand
titleOMB A-130, 1996, §6
Include Page
QUOT:OMB A-130, 1996, §6
QUOT:OMB A-130, 1996, §6
Expand
titleESD-TR-73-278, Vol. 1, 1973, p. 1
Include Page
QUOT:ESD-TR-73-278, Vol. 1, 1973, p. 1
QUOT:ESD-TR-73-278, Vol. 1, 1973, p. 1

Bibliography

Anchor
butterfield-et-al-2016
butterfield-et-al-2016
Butterfield et al., 2016

Anchor
esd-tr-73-278-vol-1-1973
esd-tr-73-278-vol-1-1973
ESD-TR-73-278, Vol. 1, 1973

Anchor
nist-sp-800-26-2001
nist-sp-800-26-2001
NIST SP 800-26, 2001

Anchor
omb-a-130-1996
omb-a-130-1996
OMB A-130, 1996

See Also

Filter by label (Content by label)
showLabelsfalse
max100
sorttitle
cqllabel = "system"