You are on page 1of 3

INFORMATION SYSTEMS HARDWARE

This section will introduce hardware platforms that make up the enterprise
systems of today’s organizations. We look at the basic concepts of and history
behind different types of computers and the advances in information technology.
COMPUTER HARDWARE COMPUTERS AND ARCHITECTURE
 The central processing unit is made up of the arithmetic logic unit a control
unit and internal memory
• Other key components of the computer include the motherboard
memory, read only memory
 The I/O components pass instructions and informations to the compute, or
display record output generated by the computer
COMMON ENTERPRISE BACKEND DIVICES
 PRINTERS
 FILE SERVERS
 APPLICATION SERVERS
 WEB SERVERS
 PROXY SERVERS
 DATABASE SERVERS

SPECIALIZED DEVICES
 FIREWALL
 INTRUSION DETECTION SYSTEMS
 INTRUSION PREVENTION SYSTEMS
 SWITCHES
 ROUTERS
 VIRTUAL PRIVATE NETWORKS (VPN)
 LOAD BALANCERS
RISKS
 MALWARE
 DATA THEFT
 DATA AND MEDIA LOSS
 COMPUTAION OF DATA
 LOSS OF CONFIDENTIALITY
SECURITY CONTROL
 ENCRRYPTION
 FRANULAR CONTROL SUCH AS ACTIVE DIRECTORY
 EDUCATION SECURITY PERSONNEL
 ENFORCE THE “LOCK DESKTOP” POLICY
 UPDATING AV
 USE ONLY SECURE DEVICES

RADIO FREQUENCY INDENTIFICATION


 RFID uses radio waves to identify tagged objects within a limited range
 A tag consist of microchip antenna
 The tag can be passive, drawing power from the incident radiation arriving
for the reader
 An active tag has battery supplid power

RFID APPLICATION
 ASSET MANAGEMENT
 TRACKING
 MATCHING
 PROCESS CONTROL
 ACCESS CONTROL
 SUPPLY CHAIN MANAGEMENT
RFID RISK
 Business process risk is a direct attack on the RFID system components
 Business intelligence risk may come from a competitor or adversary that
gains authorized access to RFID
 Privacy risk can occur when the RFID system uses personally identifiable
information for purposes other than intended.
 Externally risk occurs when RFID technology becomes a threat to a non
RFID network or an non RFID system

RFID SECURITY CONTROL


 Management control involves oversight of the security of the RFID system
 An operational control involves the actions performed on a daily basis by
the systems administrator and users
 A technical control users technology to monitor or restrict the actions that
can be performed within the systems. RFID systems might use technical
controls to protect data on tags, causing a tag to self destruct, or to protect
wireless communications

HARDWARE MAINTENANCE PROGRAM


 For proper operation, hardware should be regularly cleaned and serviced.
The maintenance requirements will depend on complexity and
performance workloads
HARDWARE MONITORING PROCEDURES
 Availability reports indicate the time periods during which computer is in
operation and available for use. A key concern of this report is downtime
 Hardware error

You might also like