CCT225H5 Chapter Notes - Chapter B4: Fault Tolerance, Anti-Spam Techniques, Identity Theft
Document Summary
Information architecture: information architecture identifies where and how important information, like customer records, is maintained and secured, 3 primary areas: backup and recovery, disaster recovery, information security. Identity theft: hacking and other unauthorized access. Managing user access: password discipline, strong passwords, password management and provisioning. Up-to-date antivirus software and patches: prevent hackers, spammers, and other mal-contents from entering networks, enhance network-security-management, intrusion-detection, content-filtering, and antispam software, upgrade encryption software. Infrastructure architecture: infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization"s goals, 5 primary characteristics of a solid infrastructure architecture, flexibility, scalability, reliability, availability, performance. Scalability: scalability how well a system can adapt to increased demands, capacity planning determines the future it infrastructure requirements for new equipment and additional network capacity. Reliability: reliability ensures all systems are functioning correctly and providing accurate information, another term for accuracy.