10

Click here to load reader

Systems architecture and design

Embed Size (px)

DESCRIPTION

Get your quality Coursework help now and stand out.Our professional writers are committed to excellence. We have trained the best scholars in different fields of study.Contact us now at http://courseworkshelp.com/ and place your order at affordable price done within set deadlines.We always have someone online ready to answer all your queries and take your requests.

Citation preview

Page 1: Systems architecture and design

Systems Architecture and Design

Presented by: http://homeworkwritinghelp.com/

Page 2: Systems architecture and design

Introduction

Security is paramount for any system that exists.Various factors have to be put under

consideration to guarantee information security. Security can be enhanced by appropriate systems

architecture and design.

http://homeworkwritinghelp.com/

Page 3: Systems architecture and design

Physical environment includes:Computing nodesInternet environmentStorage devicesMemoryCPUsOther network and hardware devices.

http://homeworkwritinghelp.com/

Page 4: Systems architecture and design

Architecture Characteristics that Achieve Secure System Network Management

Management station presents an interface for a human network manager.

Management agent is a software programNetwork management protocol specifies the rules

for communication.

http://homeworkwritinghelp.com/

Page 5: Systems architecture and design

Commonly used protocol is the Simple Network Management Protocol (SNMP).

Hierarchical approach is crucial.Ensures layering of network management. Layering enables Network Management Systems

communicate better.

http://homeworkwritinghelp.com/

Page 6: Systems architecture and design

Employee Monitoring Practices

Necessary to:Prevent Physical DamageLoss Of Control Over System Integrity Interruption Of System ServicesUnauthorized Disclosure Of InformationTheft.

http://homeworkwritinghelp.com/

Page 7: Systems architecture and design

Use of physical access controls restrict the entry and exit from certain areas.

User administration protects system integrity.

http://homeworkwritinghelp.com/

Page 8: Systems architecture and design

Interception of data poses a significant risk to a firm’s information.

Three forms of data interception are:Direct observation Interception of data transmissionElectromagnetic interception.

http://homeworkwritinghelp.com/

Page 9: Systems architecture and design

For more information on Systems Architecture and Design

visit http://homeworkwritinghelp.com/

Page 10: Systems architecture and design

For more information on Systems Architecture and Design

visit http://homeworkwritinghelp.com/