CCT225H5 Chapter Notes - Chapter B4: Fault Tolerance, Anti-Spam Techniques, Identity Theft

75 views5 pages

Document Summary

Information architecture: information architecture identifies where and how important information, like customer records, is maintained and secured, 3 primary areas: backup and recovery, disaster recovery, information security. Identity theft: hacking and other unauthorized access. Managing user access: password discipline, strong passwords, password management and provisioning. Up-to-date antivirus software and patches: prevent hackers, spammers, and other mal-contents from entering networks, enhance network-security-management, intrusion-detection, content-filtering, and antispam software, upgrade encryption software. Infrastructure architecture: infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization"s goals, 5 primary characteristics of a solid infrastructure architecture, flexibility, scalability, reliability, availability, performance. Scalability: scalability how well a system can adapt to increased demands, capacity planning determines the future it infrastructure requirements for new equipment and additional network capacity. Reliability: reliability ensures all systems are functioning correctly and providing accurate information, another term for accuracy.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents