Professional Documents
Culture Documents
Information Systems Hardware222
Information Systems Hardware222
This section will introduce hardware platforms that make up the enterprise
systems of today’s organizations. We look at the basic concepts of and history
behind different types of computers and the advances in information technology.
COMPUTER HARDWARE COMPUTERS AND ARCHITECTURE
The central processing unit is made up of the arithmetic logic unit a control
unit and internal memory
• Other key components of the computer include the motherboard
memory, read only memory
The I/O components pass instructions and informations to the compute, or
display record output generated by the computer
COMMON ENTERPRISE BACKEND DIVICES
PRINTERS
FILE SERVERS
APPLICATION SERVERS
WEB SERVERS
PROXY SERVERS
DATABASE SERVERS
SPECIALIZED DEVICES
FIREWALL
INTRUSION DETECTION SYSTEMS
INTRUSION PREVENTION SYSTEMS
SWITCHES
ROUTERS
VIRTUAL PRIVATE NETWORKS (VPN)
LOAD BALANCERS
RISKS
MALWARE
DATA THEFT
DATA AND MEDIA LOSS
COMPUTAION OF DATA
LOSS OF CONFIDENTIALITY
SECURITY CONTROL
ENCRRYPTION
FRANULAR CONTROL SUCH AS ACTIVE DIRECTORY
EDUCATION SECURITY PERSONNEL
ENFORCE THE “LOCK DESKTOP” POLICY
UPDATING AV
USE ONLY SECURE DEVICES
RFID APPLICATION
ASSET MANAGEMENT
TRACKING
MATCHING
PROCESS CONTROL
ACCESS CONTROL
SUPPLY CHAIN MANAGEMENT
RFID RISK
Business process risk is a direct attack on the RFID system components
Business intelligence risk may come from a competitor or adversary that
gains authorized access to RFID
Privacy risk can occur when the RFID system uses personally identifiable
information for purposes other than intended.
Externally risk occurs when RFID technology becomes a threat to a non
RFID network or an non RFID system