Vous êtes sur la page 1sur 7

Question 1: Suppose you are responsible for the IT infrastructure of an organization, which has

about 15 desktop computers. You are advised that automation for uniformity is a good solution.
What does it mean by “automation for uniformity”? Why is it a good solution in principle? Will
you implement a fully automatic system in this case of yours? Why or why not.

The automation of uniformity includes three major fundamentals which are as follows:

1. Initial loading of the software and applications of the system used,


2. Regular updates of the system software and applications,
3. Configuration of the parameters to the particular network.
When these three tasks are performed on multiple computers at the same time
automatically, then it is called automation of uniformity. Performance of the above
three fundamental tasks all simultaneously to any system, then this is called the
automation of uniformity. The automation for uniformity is an important principle that
provides solutions to organizational structure. This is because it is capable of solving a
large number of varied problems in information technology. To begin with, it uses less
time as opposed to when we compare it to the manual processes, and it also works
eliminate other costs that are hidden. One of these hidden costs is that the manual
processes relate to human errors. For example, workstations may have a lot of potential
settings and it would never be easy to maintain the separately on different computers
and also, any misconfiguration can result into big failures. Other important hidden cost
is related to non-uniformity. An example is that the manual processes to load and
configure settings may not provide desirable outcomes because sometimes the
installers might fail to configure settings due to failure of one or more computers to
install applications. Therefore, it is important to note that automation for uniformity is
one of the best remedies to solving such problems. Precisely, I would consider
implementation of a fully automated system because of the advantages such as taking
less time to debug and the ability to minimise errors.

2. Please summarise the technologies used in server computers to


improve reliability, availability, and performance.

 Cloud computing – This a technological development that


ground breaks the influence of the users to begin reconsidering
their awareness on operating systems, browsers and client-
server architecture and ultimately increase their knowledge. It
also offers new service providers technical approaches to
providing solutions on reduced expenditures. It therefore
improves on the performance and reliability of the computers.
 Virtualisation
This is the act of virtually creating version of anything other than
the actual one. Hardware virtualisation enhances autonomic
computing (self-management of IT environments through utility
perception) as well as utility computing. This enhances
performance of computers.

 Datacentres
These are central locations that allows for the collection, storage,
processing and distribution of networking and computing devices.
They are often known as data servers and ensures physical security
and safety of the computing equipment.

3. Please summarise the “Scope of Coverage” of a Helpdesk


operation.

A helpdesk is any place where individuals or group of people can


present their problems that involves computers to be solved. People
can also report certain problems pertaining to computers or even
request for provision of new services. The goal of the helpdesk
operation works to meeting customers’ level of satisfaction through
effective solutions to their problems and giving attention to their
quests. The scope of coverage of helpdesk operations states which
problem needs support, who needs support and when. It also defines
the position of the clients and for how long the clients can remain in
such positions with regards to computing.
Reference
 Zissis, D., & Lekkas, D. (2012). Addressing cloud computing
security issues. Future Generation Computer Systems, 28(3),
583-592.doi:10.1016/j.future.2010.12.006.
 Iovan,S., & Iovan, A. A. (2016). Cloud computing security.
Fiabilitate Si Durabilitate, 1-suppl (1), 206-212.
 Watkins, D. (2016). Let’s get physical: Security for datacentres.
Computer Fraud and Security, 2016(10), 16-
18.doi:10.1016/S1361-3723 (16)30082-3.

Computer Network Design


 Rationale for the Network Diagram Commented [G1]: Deleted:n
 All computers are connected to the scanner and the printer. The printers are connected to Commented [G2]: Inserted: N
one of the computers in the network. The computer is also linked to the network through a
switch. The server will serve both as an email server and file server to the rest of the
network. The server computer has a firewall to configure data as it comes through the
network. Commented [G3]: Deleted:nect
Commented [G4]: Inserted: a
 Types of Firewall
Commented [G5]: Inserted: an
 Firewall is a system that can be implemented in a computer to prevent unauthorized access Commented [G6]: Inserted: k
to a network. The system can be in two forms; both software and hardware. Firewalls can
Commented [G7]: Deleted:co
also be the combination of the two. The main use of firewalls is to prevent the Internet users
Commented [G8]: Inserted: li
from interfering with a VPN.
 Firewalls are established to protect against unauthenticated smart logins from the exterior Commented [G9]: Deleted:f
world. This will keep programmers from putting your signature on into machines on one's Commented [G10]: Inserted: F
body. Newer firewalls piece movements from the exterior to within, however, allow clients Commented [G11]:
within to mention slightly more uninhibitedly with the exterior. Firewalls are necessary
Commented [G12]:
since they provide a solitary square point, where security and inspecting can have no choice
but. Firewalls provide an essential logging and examining capacity; frequently, they offer
rundowns to the director in what variety/volume of activity has been treated through it.
That is a critical gain: Providing this rectangular point can load an indistinguishable need on
one's body from a fitted protect accomplishes for your physical premises. Commented [G13]:
Commented [G14]: Inserted: r
Commented [G15]: Inserted: I
Commented [G16]: Deleted:pr
Commented [G17]: Deleted:Generally, f
Commented [G18]: Inserted: ,
Commented [G19]: Deleted:i




 Different types of firewall
 There are four types of firewalls
 • Packet filters
 • Proxy
 • Stateful inspection
 Firewall implementation
 The firewall is one of the essential elements in the network security and today's group. The
firewall remains a critical bit in for all intents and purposes any useful framework security
outline, and today's associations have a couple of sorts to discover. It's key that specialists
recognize the kind of firewall that best suits the affiliation's framework security needs.
When picked, one of the fundamental part worries that outlines a security strategy is "The
spot should the firewall be put?" You will find three essential firewall topologies: the bastion Commented [G20]: Deleted:ve
has, screened subnet and two times firewall models. Beginning security relies on in the wake Commented [G21]:
of picking the right firewall topology.
Commented [G22]: Deleted:component
Commented [G23]: Inserted: of
 Another decision to be delivered, doing a topology favored, is the situation to place
particular firewall structures in it. Presently, there are extensive sorts to consider, for
instance, Bastion has, screened subnet and multi-homed firewalls. Comprehend that firewall
procedures do change rapidly and, with the goal that it is difficult to keep the top of
customary firewall upkeep endeavors. Firewall action, like this, must be continually
dissected to keep deliberately the framework secure from ceaselessly evolving dangers. Commented [G24]: Deleted:ly
 Network level firewalls Commented [G25]: Deleted:u
 Arrange level firewalls choose their alternatives in light of the inspiration address, goal
Commented [G26]: Inserted: i
address, and jacks in specific IP bundles. An easy switch is the initial system layer firewall
Commented [G27]: Deleted:ve
since it isn't ready to choose especially muddled choices in only just what a bundle is totally
speaking with or where it certainly originated from. Commented [G28]:
 One essential acknowledgment numerous system part firewalls have is that they course Commented [G29]: Deleted:vid
movements specifically through them, which indicates with a particular end goal to work Commented [G30]: Inserted: s
with one, you either need an allocated IP square or a special Internet address part
Commented [G31]: Deleted:b
legitimately. Arrange part firewalls tend to stop sacrificing simple and time with the
customers almost. Commented [G32]: Inserted: B

 Program level firewalls Commented [G33]:


 Program covering firewalls are hosts that run intermediary machines, which allow no activity Commented [G34]:
between systems specifically, plus they perform expound exam and logging of activity going Commented [G35]: Inserted: ,
right through them also. Since intermediary applications are programming running on the
Commented [G36]:
firewall, this is an excellent vacation spot to do logging and move on to control often.
Application coating firewalls may be used as system address interpreters, since movement's
switches into one area and out the other after having experienced a debit card application
that adequately addresses the location to start of starting the connection. Commented [G37]: Deleted:good

 Be that as it might, average system firewalls can't legitimately protect applications. As Commented [G38]:
Michael Cobb clarifies, need level firewalls offer Level 7 security on a far more granular level, Commented [G39]: Inserted: like
and may help associations have significantly more out of existing system gizmos even. Commented [G40]: Inserted: the
 UTM
Commented [G41]: Deleted:n
 Another classification of system security items - called helped get risk information (UTM) -
warranties combination, warrant, and accommodation from every threat out there Commented [G42]: Deleted: the

necessarily; they are really important to large companies utilize particularly. As Mike Commented [G43]: Deleted:s
Rothman clarifies, the advantages of UTM vendor and progression offerings make these Commented [G44]: Inserted: ,
ordinary things a lot more important to initiatives. Security professional Karen Scarfone Commented [G45]: Deleted:busi
portrays UTM things as firewall mechanical assemblies that create contracts for intrusion
Commented [G46]:
and in addition, perform mix isolating, spam filtering, program control, Content isolating,
interference id and antivirus responsibilities; at best end of your state of mind, a UTM Commented [G47]: Deleted:generally

instrument joins works got appropriate care of by various structures usually. These Commented [G48]: Deleted:bi
thingamajigs are made to battle all known levels of vindictive movements on the Laptop or Commented [G49]: Inserted: e
computer arrange.
Commented [G50]: Deleted:,
 An efficient UTM create something security level involved packed with energy and
Commented [G51]: Deleted:al
completely coordinated security and systems assistance works alongside varying elements,
for example, security direction and provide with information with a gathering or customer. It Commented [G52]: Deleted:ent
is designed to ensure against industry leading application layer dangers, and you'll be Commented [G53]: Inserted: ar
offering a brought together administration by using a solitary support, all without impeding Commented [G54]: Deleted:e
the execution of these devices.
Commented [G55]: Inserted: the
 Advantages of using UTM
Commented [G56]: Deleted:conveys
Commented [G57]: Inserted: ,
 Accommodation and simple establishment would be both key things of bound jointly danger
advice security machines. There could also be significantly less man mediation necessary to
create and create them machines. Various things of UTM are noted beneath: Commented [G58]: Deleted:be
 Commented [G59]: Inserted: be
 - Reduced Difficulty: The included possessing little or little or nothing again one
technique streamlines item choice as well as item assistance, and recurrent support also.
 - The efficiency of Deployment: Since there could be considerably less man intercession
required, either retailers or the customers themselves can present and continue these basic
things. Commented [G60]: Deleted: absolutely
 - Joining Features: UTM mechanical assemblies will most likely be given at faraway ranges Commented [G61]: Deleted:E
without on area help of any security capable. In that illustration, an introduced and-play
Commented [G62]: Inserted: The e
gear can be discharged and managed remotely. This sort of direction is synergistic with
critical, brought coding all in all setup firewalls. Commented [G63]: Inserted: i
 - African American Field Personality: Users tend to play with things, and the revelation
method for UTM limits the harm customers can do and, in this way, diminishes help
workshop mobile phone and improves significance or phone calls security.
 - Troubleshooting proficiency: Whenever a case comes straightforward, it is less testing to
swap out than examine. This framework recuperates the center point online speedier, and a
non-particular individual can do it, also. This angle is essential for faraway work
environments without committed specific employees local especially. Hence, it uses the
Unified Threat strategy in working with online threat management. Commented [G64]: Deleted:is
 Commented [G65]: Inserted: s

 References

 Caudill, M. & Butler, C. (1992). Understanding neural networks. Cambridge, Mass.:


MIT Press.
 Peterson, L. & Davie, B. Computer networks.
 Simulation of computer networks. (1987). Washington, D.C.

 Inserted: ff
 Inserted: F
 Inserted: s
 Inserted: excellent
 Inserted: n
 Inserted: compa
 Inserted: lar
 Inserted: nec
 Inserted: ,
 Inserted: ,

Vous aimerez peut-être aussi