Thursday, April 22, 2010

Chapter Five Questions

What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?
  • IT architecture: How the business or organisations uses IT
  • IT infrastructure: Is the implementation of the IT system, that will ensure it works efficiently and effectively. Consists of hardware, software, people and their skills.


Image From: http://www.utp.edu.my/index.php?option=com_content&view=article&id=122&Itemid=1863

Describe how an organisation can implement a solid information architecture


  • Backup and recovery
  • Disaster recovery
  • Security
Image from: http://easytechsource.com/security/index.html

List and describe the five requirement characteristics of infrastructure architecture.

1. Reliability: Accuracy of the system

2. Scalability: the ability of the system to meet the growth requirements of the organisation.

3. Flexibility: The systems capability of meeting the changing demands of the business

4. Availability: 99.999% of uptime, and ensures business continuity

5. Performance: how quickly a system performs a specific task


Describe the business value in deploying a service oriented architecture

An SOA is an IT architecture that supports integrating a business as linked repeatable tasks or services. An SOA ensures that an IT system can adapt quickly, easily to ensure the rapidly changing needs of the business are met.


Image From: http://www.casewise.com/Solutions/SOA/howshouldwelookatsoa/


What is an event?

When something has happened, or threats and opportunities have been identified, an electronic message is sent to alert people that can act on the information that is sent to them.

What is a service?

A software like product that contains a set of commands that can be re-used over and over again.


What emerging technologies can companies can use to increase performance and utilise their infrastructure more effectively?

  • Virtualisation: Increases the physical resources and maximises the investment of hardware by dividing a computer into multiple execution environments. E.g, Apple running windows.
Image from:

http://www.slashgear.com/parallels-desktop-gets-3d-acceleration-10850/

  • Grid Computing: Uses the processing software of computers that aren’t being used at certain times, so that large companies can use your computer when you are not.





Thursday, April 1, 2010

Chapter Four Questions

1. Explain the ethical issues surrounding information technology.
  • Intellectual property: Rights surrounding the use of someone else's creative and intellectual property.
  • Copyright: Includes songs, videos, software and documents all which are protected by copyright.
  • Fair use doctrine: Involves cases where you can use someone else's material without concern to copyright.
  • Pirated software: The use, duplication, distribution or sale of copyrighted software without authorisation.
  • Counterfeit software: When fake software that is manufactured is sold.

Image from: http://www.contrib.andrew.cmu.edu/~elsaw/



2.
Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

  • Email privacy policy: How an email system can be used by employees which also outlines to what extent an organisation can read their employees emails.
  • Internet use policy: Guidelines that outline the use of the Internet with a certain organisation. E.g. not looking at inappropriate sites.

3. Summarise the five steps to creating an information security plan

  1. Develop information security policies: Includes things such as never sharing passwords, and changing passwords every 60 days.
  2. Communicate information security policies: Train employees and outline employee expectation.
  3. Identify critical information assets and risks: Ensure the use of user ID's, passwords, antivirus software and firewalls.
  4. Test and re-evaluate risks: Audit and review security plans periodically.
  5. Obtain stakeholder support: Endure top level management and stakeholders are aware of security policies and support them.

4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

  • Authentication: Used to confirm the identity of users. E.g. User ID, passwords or fingerprints.
  • Authorisation: When someone is given consent do perform or have something.

Image from:

http://www.sflp.co.uk/xhtml-css/index.html


5. What the Five main types of Security Risks, suggest one method to prevent the severity of risk?