Question

In: Computer Science

What are the characteristics of a solid IS infrastructure. You are expected to design an IS...

What are the characteristics of a solid IS infrastructure. You are expected to design an IS infrastructure that can effectively address the challenges arising during various crises such as (i) Pandemic like COVID-19 (ii) Natural Calamities (iii) Global Warming.

Solutions

Expert Solution

Connectivity
The terribly broad, nearly fast and seamless property and reach across the assorted domestic and international data domains of the NII/GII/DII networks could be a characteristic that additionally contributes considerably to infrastructure purposeful potency. Users of those infrastructures have adjusted business or alternative practices consequently. period communications ar currently vital in several areas of business and government. The domestic and international marketplace, which has securities market and mastercard transactions, ar such examples.[9] This period dependence additionally applies to several emergency services and particularly to Defence functions across the total C4ISREW spectrum, as well as sensing element to weapon configurations, throughout combat operations. Disruption to property, even for comparatively temporary periods of your time, might have a significant impact on outcomes.

Bandwidth
Bandwidth across all 3 infrastructures is continually increasing, significantly over knowledge networks, in parallel with technology enhancements. shopper demand has not solely unbroken pace with information measure availableness, however has outstripped it. Broad information measure permits access to immense quantities of knowledge {in a|during a|in an exceedingly|in a terribly} very short area of your time. in a very Defence context specially, it's a vital feature of period delivery of police investigation and intelligence operation imaging, and also the immediate ‘pull-down’ accessibility of deployed combat forces to their headquarters’ intelligence databases. it's additionally vital in emergency services situations, as an example in period or close to period watching of bushfires or alternative natural disasters wherever lives ar in danger and also the timely delivery of humanitarian aid is vital.

Functional reciprocality
Functional reciprocality between data and its supporting systems, and between the supporting systems themselves, could be a major issue associated with the purposeful potency and security of any data infrastructure. and also the a lot of advanced the system or network, the larger that reciprocality. Failure, in whole or by a district of associate degreey part of an dependent system, will impact on the practicality of another half or, doubtless, on the total system. betting on the sort of system affected (for example, its size or complexity) and also the scale of the failure, the cascade impact will have important implications for specific or general services and capabilities, and ultimately have an effect on however individuals live and behave. In military terms particularly, this cascade of ‘knock-on’ effects fits the classic mould of targeting outcomes in ‘effects-based’ operations.[10]

The principle of connected ‘effects-based’ issues additionally applies to any compromise of the 5 key criteria of knowledge Assurance (IA), that is mentioned in additional detail later during this chapter.

Ownership and management
Ownership of the networks that conjure the NII, DII (and therefore GII) varies between the govt and personal sector, betting on the country, and what a part of the network among that country, is concerned. In most countries nowadays, the key telecommunications service suppliers ar in camera in hand. And within the world of globalization, those services could also be in hand, or half in hand by foreign personal firms, the exceptions being wherever the key telecommunications service suppliers ar state-owned enterprises, like, as an example, in D.P.R.K..

In addition, the bulk of software system systems, particularly industrial off-the-rack (COTS) operational systems, ar sourced from foreign firms, as ar several specialist hardware elements used among those systems.[11]

Furthermore, the those that develop and maintain and administer specific systems among networks, or the networks themselves, can sometimes be from the personal sector, and so could also be foreigners.

The up-side of the higher than is that globalization or selective international promoting permits access, doubtless, to the simplest hardware, software system and folks services that ar obtainable to deliver and maintain key elements of a country’s NII and DII.

The down-side is that a rustic (i.e. its individuals and government as each shareholders and stakeholders) might not own or, in reality, totally management or manage these important national services. doubtless a minimum of, systems and networks can be vulnerable (in the assembly, operational and body phases) to a hostile person (local or foreign), performing on behalf of others or alone, World Health Organization accesses, manipulates (or establishes the suggests that to access and manipulate) the practicality of the systems and networks at a future date. There ar some ways however this may be done, among and while not the target country, however might embody covertly inserting trap-doors and ‘Trojan horses’ in its operational software system, inflicting the malfunction of key hardware and software system elements at a vital time, or facultative alternative hostiles to access exploitable elements of the system. In traditional circumstances this example may not create a big risk, however it might become a national security issue in a very time of crisis or war.

The percentage of the DII that's created from and smitten by the NII, and GII, varies from country to country, however it's typically assessed in most technically advanced countries as regarding ninety per cent or a lot of. Thus, solely ten per cent or less of the DII in these countries falls into the class of being in hand, controlled, managed or administered by their Defence organisation. And, generally, the infrastructure that they are doing own, management and manage exists primarily at the military science level solely. Few countries will afford to possess their own totally freelance strategic and/or operational broadband communications systems. The u. s. is one such country, however that resource is withal restricted relative to the whole size and operational commitments of the United States militia. This limitation necessitates the bulk of communications being transmitted over hired or alternative non-Defence in hand networks.

One vital conclusion is, therefore, that a big proportion of any Defence organisation’s C4ISREW capability, its Network centrical Warfare (NCW) ‘information superiority’ capability, and any potential information-based uneven Warfare capability, is outside its total management, and should preferably be foreign in hand and underneath actual or factual foreign management.

It additionally means maintaining and protective a purposeful and economical NII (inclusive of DII components) and its GII property could be a vital Defence-specific security demand, the maximum amount as a broader national security demand.


Related Solutions

Consider the Characteristics of Design Thinkers. Which of these characteristics describe you? Give an example of...
Consider the Characteristics of Design Thinkers. Which of these characteristics describe you? Give an example of how you used those skills in the past.
1. What is IT infrastructure? 2. What are the stages of IT infrastructure evolution?   3.  What are...
1. What is IT infrastructure? 2. What are the stages of IT infrastructure evolution?   3.  What are the drivers of IT infrastructure evolution?   4. What are the seven major IT infrastructure components? What are the major vendors in each component? 5. Describe and assess one of the current trends in computer hardware platforms. 6. Describe and assess one of the current trends in computer software platforms. 7. What are the challenges of managing IT infrastructure and management solutions?
What are the economic benefits of infrastructure spending? What are the economic costs of infrastructure spending?...
What are the economic benefits of infrastructure spending? What are the economic costs of infrastructure spending? Explain the economic circumstances in which you think the benefits of increased infrastructure spending would outweigh the costs?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
What is compatibility, with respect to infrastructure? Give an example of compatible civil infrastructure and an...
What is compatibility, with respect to infrastructure? Give an example of compatible civil infrastructure and an example of non-compatible civil infrastructure with justification.
The government is considering building a major infrastructure project at a cost of €200m. The expected...
The government is considering building a major infrastructure project at a cost of €200m. The expected benefits of the project are €500m. (i) Based on the Kaldor-Hicks criteria should the government implement this project? Justify your answer. (ii) A project that satisfies the Kaldor-Hicks criteria is always guaranteed to increase aggregate welfare. True or false? Explain your answer using a numerical example. In your example use the cost and benefits of the project outlined above ( approx 160 words total)
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT