In: Computer Science
Name the elements of an information system, Data Center, Servers, Content Filters, and Push Technologies on Networks (Novell ~ Zenworks Utility tool for pushing applications to Client Imaging Utilities). In 1,000 – 1,500 words, please outline your logic for information security.
a)Information System is used to arrange the information.Elements of Information System include:-
-Computer Hardware: All the external devices that the system carries or has to perform input/output. Information is either fed into these devices or it is recieved from these devices. Keyboard, mouse, printer, cables, desktop etc, all of these come under hardware of Computer.
-Computer Software: Anything which is present in the form of programs that perform specific or multiple operations is known as the Computer software. Operating system is a type of system software while specific purpose like MS Word, Paint come under Application software. There are many applications out there that help in achieving various tasks for the human They are programmed for human needs via human.
-Telecommunication: The networks that make connections between the devices of the system to the internet or the other devices. The devices can connect to other PCs or connect to internet via cables like ethernet etc. LAN, WAN,MAN and many such types of networks help in connecting the computers to different areas.
-Databases and warehouses: These are the storage areas containing all the data and information collected through multiple resources in the entirety of the system. Warehouses also analyses and stores the data in any specific form that the client requires.
-Human Resources: The last thing needed to complete the Information system are the people or the actors who will play the role of performing actions on the entire system, sending commands all over and rectifying errors wherever necessary.
b)Data Centers are extremely important in a data-run world. They are useful in storing data, selecting records and other such works.Components of Data Center include:-
-Routers- This comes under network infrastructure. Routers are mainly used for the primary purpose of routing the flow of packets of data between the networks of computer. This prevents the packets to go anywhere else but in one direction where the router is asking them to move.
-Switches- These are extremely important since they are used to connect multiple devices that want to form a network with each other.
-Firewalls- These are used to determine the security during the data traffic so as to check if there is no hidden malware that might disrupt the system. They follow a certain set of predefined rules which are extremely important before allowing any kind of data packet to enter the system. They create a divider between the trusted and untrusted data packets and hence provide safety.
-Storage Systems- Again, these are devices that are used to store data within them and also information. They are used to hold the data for a duration as long as the person storing it requires. CPU consists of RAM, ROM, Secondary storage devices and many such devices that are hugely important for retaining data.
-Servers- These are used to allow data to be transported in the systems and provide various functions to the data that is transferred to the clients requesting for it.
-Application Delivery Controllers- These are present within the data centers to remove the heaviness from the servers when the data traffic and request is high from the client side. This causes the web page to run smoothly without any disruptions of slowing down.
Components of Servers
-Motherboard- The mother of everything as the name suggests. It is used to attach every element of the server with itself. It performs all the input/output operations in the system.
-CPU- This is the brain of the server. It controls all the activities of the servers and allows other components to perform their functions by assigning them roles.
-RAM- This is used to store data within it. RAM also known as Random Access memory and is used to store data so that even after the system shut down the data remains intact and does not get lost.
-Hard Drive – To store external data that is not required at the present moment. They provide speed to the working of the entire system.
-Network/Port- To connect to various components, routers and other such external devices.
-Power Supply- It is used to initiate the entire server system. All the components of the servers are powered using the power supply. It is the most important component since without it, nothing will work.
Components of Content Filters
-Content Rating- These are basically a template of rules that are used to prevent any unnecessary data packet to enter within the data server or information system.
-Content Filtering It is used to filter the unnecessary content from specific accessible sites so that the user can not enter into a malware affected region.
Push Technologies on Networks
These are modern technologies that are used to push as the name suggests newly received information to all the clients that have subscribed to the channel which has generated a new content. So basically the client hasn’t requested for the information but the server still has generated the outcome and sent it to the clients. Hence it is known as push technology.
Some examples of Push Technology are:
SMTP, instant messages like chats and all.
Information Security - It is used to secure the data present within the server and hardware systems.A lot of components of Info Security include, User IDs, Authentication,Biometrics that are used to give proper security checks.
Authentication can be two step that involves the usage of password as well as OTP generation on the registered mail or phone number so as to provide double security for accessing the data.
Password Authentication involves the usage of unique passwords or codes to ensure safety of devices.
Data centers are not accessed by just anybody and token authentication and other such multi purpose authentication is required. This is the entire logic of Information Security. It is very essential and can help in preventing variou illegal activities like data theft, cyber attacks, DDos etc.