Question

In: Computer Science

Name the elements of an information system, Data Center, Servers, Content Filters, and Push Technologies on...

Name the elements of an information system, Data Center, Servers, Content Filters, and Push Technologies on Networks (Novell ~ Zenworks Utility tool for pushing applications to Client Imaging Utilities). In 1,000 – 1,500 words, please outline your logic for information security.

Solutions

Expert Solution

a)Information System is used to arrange the information.Elements of Information System include:-

-Computer Hardware: All the external devices that the system carries or has to perform input/output. Information is either fed into these devices or it is recieved from these devices. Keyboard, mouse, printer, cables, desktop etc, all of these come under hardware of Computer.

-Computer Software: Anything which is present in the form of programs that perform specific or multiple operations is known as the Computer software. Operating system is a type of system software while specific purpose like MS Word, Paint come under Application software. There are many applications out there that help in achieving various tasks for the human They are programmed for human needs via human.

-Telecommunication: The networks that make connections between the devices of the system to the internet or the other devices. The devices can connect to other PCs or connect to internet via cables like ethernet etc. LAN, WAN,MAN and many such types of networks help in connecting the computers to different areas.

-Databases and warehouses: These are the storage areas containing all the data and information collected through multiple resources in the entirety of the system. Warehouses also analyses and stores the data in any specific form that the client requires.

-Human Resources: The last thing needed to complete the Information system are the people or the actors who will play the role of performing actions on the entire system, sending commands all over and rectifying errors wherever necessary.

b)Data Centers are extremely important in a data-run world. They are useful in storing data, selecting records and other such works.Components of Data Center include:-

-Routers- This comes under network infrastructure. Routers are mainly used for the primary purpose of routing the flow of packets of data between the networks of computer. This prevents the packets to go anywhere else but in one direction where the router is asking them to move.

-Switches- These are extremely important since they are used to connect multiple devices that want to form a network with each other.

-Firewalls- These are used to determine the security during the data traffic so as to check if there is no hidden malware that might disrupt the system. They follow a certain set of predefined rules which are extremely important before allowing any kind of data packet to enter the system. They create a divider between the trusted and untrusted data packets and hence provide safety.

-Storage Systems- Again, these are devices that are used to store data within them and also information. They are used to hold the data for a duration as long as the person storing it requires. CPU consists of RAM, ROM, Secondary storage devices and many such devices that are hugely important for retaining data.

-Servers- These are used to allow data to be transported in the systems and provide various functions to the data that is transferred to the clients requesting for it.

-Application Delivery Controllers- These are present within the data centers to remove the heaviness from the servers when the data traffic and request is high from the client side. This causes the web page to run smoothly without any disruptions of slowing down.

Components of Servers

-Motherboard- The mother of everything as the name suggests. It is used to attach every element of the server with itself. It performs all the input/output operations in the system.

-CPU- This is the brain of the server. It controls all the activities of the servers and allows other components to perform their functions by assigning them roles.

-RAM- This is used to store data within it. RAM also known as Random Access memory and is used to store data so that even after the system shut down the data remains intact and does not get lost.

-Hard Drive – To store external data that is not required at the present moment. They provide speed to the working of the entire system.

-Network/Port- To connect to various components, routers and other such external devices.

-Power Supply- It is used to initiate the entire server system. All the components of the servers are powered using the power supply. It is the most important component since without it, nothing will work.

Components of Content Filters

-Content Rating- These are basically a template of rules that are used to prevent any unnecessary data packet to enter within the data server or information system.

-Content Filtering It is used to filter the unnecessary content from specific accessible sites so that the user can not enter into a malware affected region.

Push Technologies on Networks

These are modern technologies that are used to push as the name suggests newly received information to all the clients that have subscribed to the channel which has generated a new content. So basically the client hasn’t requested for the information but the server still has generated the outcome and sent it to the clients. Hence it is known as push technology.

Some examples of Push Technology are:

SMTP, instant messages like chats and all.

Information Security - It is used to secure the data present within the server and hardware systems.A lot of components of Info Security include, User IDs, Authentication,Biometrics that are used to give proper security checks.

Authentication can be two step that involves the usage of password as well as OTP generation on the registered mail or phone number so as to provide double security for accessing the data.

Password Authentication involves the usage of unique passwords or codes to ensure safety of devices.

Data centers are not accessed by just anybody and token authentication and other such multi purpose authentication is required. This is the entire logic of Information Security. It is very essential and can help in preventing variou illegal activities like data theft, cyber attacks, DDos etc.


Related Solutions

Report on hiding information and watermarks in Data security technologies?.
Report on hiding information and watermarks in Data security technologies?.
An older naming system uses Latin names of the elements. For example, the Latin name of...
An older naming system uses Latin names of the elements. For example, the Latin name of iron is ferrum (which gives iron its symbol of Fe). For metals that can have more than one charge, the Latin name takes a –ous ending for the smaller charge and an –ic ending for the larger charge. Based on these rules, what is the Latin name of Fe22​O33​? A Ferrous oxide B Ferric oxide C Ferrum oxide D Iron oxide
Design data flow diagram (DFD) of the system: include major processes, data files, data elements, and...
Design data flow diagram (DFD) of the system: include major processes, data files, data elements, and external entities. Background: Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library...
What is the relationship between data, information and an information system?
What is the relationship between data, information and an information system?
Discuss how the elements of efficiency, effectiveness, and flexibility are crucial to the design of an information system.
Discuss how the elements of efficiency, effectiveness, and flexibility are crucial to the design of an information system.  
Write an essay Topic : The Impact of Technology on Accounting Information System Paper format/content guideline...
Write an essay Topic : The Impact of Technology on Accounting Information System Paper format/content guideline • Title • Introduction and scope • Background and any key definitions • Literature review • Discussion, recent developments, future developments, past debate in relation to the topic and question. • Implications for the future • Summary and conclusion • References • Appendix • Glossary Bibliography Reference all sources of information you consulted in preparing your assignment. Use the APA referencing style. Format You...
Please answer the questions in detail regarding the Digestive System: 1) Caloric content is useful information...
Please answer the questions in detail regarding the Digestive System: 1) Caloric content is useful information but there are many other variables that are important in choosing a healthy diet. One of them (for carbohydrates) is glycemic index. What is the glycemic index of a food and how can the data you collect be misleading without considering it? 2) When carbohydrates (or any food) molecules are absorbed rapidly what happens to them?
Discuss four main Technologies that an organisation invest in their Information System/Technology to attain their Business Status
Discuss four main Technologies that an organisation invest in their Information System/Technology to attain their Business Status
McDonald's Nutrition Data We have information on nutritional content of sandwiches and similar items at McDonald’s:...
McDonald's Nutrition Data We have information on nutritional content of sandwiches and similar items at McDonald’s: Calories, grams of carbohydrates, milligrams of salt, and meat or non-meat item. a. Create a dummy variable, Meat, for meat items. b. Run a regression of Calories on Carbs, Salt and Meat. Write down the estimated regression. c. Carry out a t-test for the coefficient on Meat. Interpret the results in the context of the problem. d. Interpret the coefficient on Meat in the...
Using IT for Decision Making First, read Week 2 Content on Data and How Information Supports...
Using IT for Decision Making First, read Week 2 Content on Data and How Information Supports Decision Making, paying particular attention to the Levels of Decision Making. For purposes of this discussion, we will use a retail business as an example. This retail business is comprised of the corporate headquarters, regions (oversees several stores in a geographic area) and individual stores. Each of these aligns to one of the three levels of decision makers in an organization.   Main Postings: Select...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT