In: Computer Science
Security Software Architecture
Performance Software Architecture
Information Architecture
Records Management
Security software architecture
Computer is having software and hardware part. A security software architecture describes the fundamentals of hardware , operating system and software security component. There are 4 main categories.
There is secure hardware architecture and secure software architecture.
Secure acrhitecture is one of the assumes bugs exists and seeks the limit exposure when a compromise happens . This really requires you to on code no matter how much testing it is undergone.
Performance software architecture
A software architecture is the structure of aoftware systems like blue prints in the building architecture. Suppose we want to construct some building , then we want the building architecture, before starting the work we need to show everything in the paper and that is called as the blue print . If we want to develop any software or app , we need blueprints and that blue print is called the software architecture. The software architecture is the structure of software systems . What software system we are using is represted in the form of software structure and that structure is called as the software architecture. It consists if some software components. If we want to build any software we need the software components . The details of algorithms ,data structures are hidden inside it. Also the relationship among the components and data flow ,control flow, dependencies if we know then we can develop a software. To draw a aoftware architecture is required if its more than 5000lines of code for most cases.we can go for class diagram if more than 500lines of codes. For larger codes we go for software architecture. While developing the software in eaely stages the assesment ia done. The scenarios are been implemented and we relate the performance . The relationship gives the information of how to go on with the development process to maintain the given performance .
Software architect have to interact with the project manager . He requires help of the software manager to collect the information given by the client and also ahould interact with the analyst and developer and to know which language he is using for the project . Also he should interact with the security expert , tester and software architectures . The elements used in the software architecture are components , connectors and configuration topologies and system model.
Information architecture
It is a term that which will refer to an organization and structure of the information within the product or a service. It is concerned with organising information in a way that helps out users meet their needs correctly. Information architecture allows us to create a muchbetter experience for our users by doing things like organizing the content in a findable and easily discovered way. It also allows the users to complete tasks in more efficient and effective way. It also reduces the load . Its like a container for a lot of different practices and deliveries .
It is the science of organizing and atructuring content in a logical , user friendly way. If you are designing a website or an app , the information architecture has a huge impact on how easy it is to navigate so if you want to freate a great user experience, you need to understand the principles of information architecture. Information architecture has roots in both library . When creating an app or website , think yourself as a librarian just as real livrarian organizes the books you are organizing the content and asking what information ahould go where and which element are most important and should give priority.good information architecture contributes to your positive user experience.
Record management
A record is any type of information created or recieved as a part of doing business . A record can be a voice mail , an email , a handwritten note.A record in a database is the electronic file or a formal document . We all have records some may contain private , personal information. A credit card , paycheque. We dont want the information to fall in wrong hands . Some records cannot be taken when we change the job ie., The work emails and job details. There are 3 key elements , creating records, records retentions and managing, destroying records securely. The decsion we take in day to day life need to be documented for example the decisions taken in a meeting must be recorded . Its easy for people to remember else they might forget on some points. Record creation is the evidence of decision making . We have tools to how long the records should be retained and kept safe.