Question

In: Computer Science

Security Software Architecture Performance Software Architecture Information Architecture Records Management


 Security Software Architecture

 Performance Software Architecture

 Information Architecture

 Records Management



Solutions

Expert Solution

Security software architecture

Computer is having software and hardware part. A security software architecture describes the fundamentals of hardware , operating system and software security component. There are 4 main categories.

  • Layering- we will define by layering . Which is having software and hardware . In this first we have hardware , followed by kernal , os , application.
  • Abstraction- it hides unnecessary details from user. When playing a song , the song gets played and what happens behind is not shown that is hided because that is not necessary.
  • Security domain- list of object allowed to access. Some will be automated and some will be user defined. What os should do it will do and we cannot intefere and viceversa.
  • Ring model- all hardware and software is understood as a concept. There is ring 0, ring 1 , ring 2, ring 3.

There is secure hardware architecture and secure software architecture.

Secure acrhitecture is one of the assumes bugs exists and seeks the limit exposure when a compromise happens . This really requires you to on code no matter how much testing it is undergone.

Performance software architecture

​​​​​​A software architecture is the structure of aoftware systems like blue prints in the building architecture. Suppose we want to construct some building , then we want the building architecture, before starting the work we need to show everything in the paper and that is called as the blue print . If we want to develop any software or app , we need blueprints and that blue print is called the software architecture. The software architecture is the structure of software systems . What software system we are using is represted in the form of software structure and that structure is called as the software architecture. It consists if some software components. If we want to build any software we need the software components . The details of algorithms ,data structures are hidden inside it. Also the relationship among the components and data flow ,control flow, dependencies if we know then we can develop a software. To draw a aoftware architecture is required if its more than 5000lines of code for most cases.we can go for class diagram if more than 500lines of codes. For larger codes we go for software architecture. While developing the software in eaely stages the assesment ia done. The scenarios are been implemented and we relate the performance . The relationship gives the information of how to go on with the development process to maintain the given performance .

Software architect have to interact with the project manager . He requires help of the software manager to collect the information given by the client and also ahould interact with the analyst and developer and to know which language he is using for the project . Also he should interact with the security expert , tester and software architectures . The elements used in the software architecture are components , connectors and configuration topologies and system model.

Information architecture

It is a term that which will refer to an organization and structure of the information within the product or a service. It is concerned with organising information in a way that helps out users meet their needs correctly. Information architecture allows us to create a muchbetter experience for our users by doing things like organizing the content in a findable and easily discovered way. It also allows the users to complete tasks in more efficient and effective way. It also reduces the load . Its like a container for a lot of different practices and deliveries .

It is the science of organizing and atructuring content in a logical , user friendly way. If you are designing a website or an app , the information architecture has a huge impact on how easy it is to navigate so if you want to freate a great user experience, you need to understand the principles of information architecture. Information architecture has roots in both library . When creating an app or website , think yourself as a librarian just as real livrarian organizes the books you are organizing the content and asking what information ahould go where and which element are most important and should give priority.good information architecture contributes to your positive user experience.

Record management

A record is any type of information created or recieved as a part of doing business . A record can be a voice mail , an email , a handwritten note.A record in a database is the electronic file or a formal document . We all have records some may contain private , personal information. A credit card , paycheque. We dont want the information to fall in wrong hands . Some records cannot be taken when we change the job ie., The work emails and job details. There are 3 key elements , creating records, records retentions and managing, destroying records securely. The decsion we take in day to day life need to be documented for example the decisions taken in a meeting must be recorded . Its easy for people to remember else they might forget on some points. Record creation is the evidence of decision making . We have tools to how long the records should be retained and kept safe.


Related Solutions

1. A "sniffer" is a software program that records information that passes through a computer or...
1. A "sniffer" is a software program that records information that passes through a computer or a connected router. If you owned an e-business with multiple employees would you use a sniffer? Why or why not?   2. If you were going to use a sniffer program, would you notify employees about it? Why or why not?
What is software architecture? Why do we need it? Distinguish between architecture and design.
What is software architecture? Why do we need it? Distinguish between architecture and design.
Information Management Systems: Benefits of Electronic Medical Records
Information Management Systems: Benefits of Electronic Medical Records
Differences between Classical and OO Architecture. in software engineering.
Differences between Classical and OO Architecture. in software engineering.
Required information [The following information applies to the questions displayed below.] Data Performance, a computer software...
Required information [The following information applies to the questions displayed below.] Data Performance, a computer software consulting company, has three major functional areas: computer programming, information systems consulting, and software training. Carol Bingham, a pricing analyst, has been asked to develop total costs for the functional areas. These costs will be used as a guide in pricing a new contract. In computing these costs, Carol is considering three different methods of the departmental allocation approach to allocate overhead costs: the...
Why is a defined information architecture necessary to be assured of accurate/reliable accounting and financial management...
Why is a defined information architecture necessary to be assured of accurate/reliable accounting and financial management information?
Write a paragraph or two about which of five software architecture patterns (Layered Architecture, Event Driven...
Write a paragraph or two about which of five software architecture patterns (Layered Architecture, Event Driven Architecture, Microkernel Architecture, Microservices Architecture Pattern, and Space-Based Architecture) would be best given each scenario. Indicate which pattern would be used to implement the system and why it is the best choice. Use descriptions of how the various architectural characteristics apply to this system and pattern to support your decision as needed. The first system in question is a set of software drivers and...
which software architecture will be best fit for online search engine?
which software architecture will be best fit for online search engine?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Regarding Risk Management Security is imperative in payroll systems. Payroll information security is about more than...
Regarding Risk Management Security is imperative in payroll systems. Payroll information security is about more than computer security. It covers a wide range of security measures like protecting the data or information from theft, misuse, natural disasters, social attacks, or hacking. How can we advance the security in payroll transactions? PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT