You are on page 1of 2

M1. Impact of IT infrastructure on the company and the stakeholders.

A traditional IT infrastructure is made up of the usual hardware and software components; facilities, data


centers, servers, networking hardware desktop computers and enterprise application software solutions.
To represent the complete IT infrastructure of the company, a table has been formed, which id below;

NAME HARDWARE SOFTWARE DATA AND


TELECOM
1. SERVER RAM, Hard Drives, Processor, Linux or Microsoft. LAN connection
video cards, motherboard,
Power supply unit.
2. ROUTER CPU, flash memory, RAM, Router Firmware. WLAN
Non-Volatile RAM, console, connection, WAN
Interface card, network. connection
3. PERSONAL Power Supply, CPU, Processor (intel core i5, 8th WLAN
COMPUTER Motherboard, RAM, HDD, generation), Zoom, connection.
SSD, video card, Optical Graphics card drive,
Drive, card reader, Graphics Windows® 10 OS,
card, NIC, Zip Drive. Firewall, Antivirus, Google
Chrome, Skype.
4. HANDHELD Processor, ROM, Android OS, Whatsapp, WiFi, Data
DEVICES Motherboard, TFT-LCD, Skype, Mail, Zoom, Last connection.
RAM, Touchscreen- Password Manager.
captive/Resistive, Extra Scanner, Google Assistant,
Memory, NFC, Bluetooth. Microsoft Apps.
5. CCTV DVR, NVR, monitor, cables CCTV Software CCTV
and connections. connectivity.
6. BIOMETRIC Processor: 1.5 Ghz or higher Windows® 2000™, Standard wiring
LOCK CPU, Memory: 256 MB mini, Windows® 2000
available USB port/Ethernet Professional™ with SP4,
connection, extra specker. Windows® XP Home
Edition™,
Windows® XP
Professional™,
Windows® 2003 Server™.
As the company is not so big, the required IT infrastructure are: personal computers for the employees
and the stakeholders. Server and router are used for the internet and inter-connectivity. As it is very
important to maintain the security and protection from various IT threats, the company can use biometric
locks and CCTV surveillance. The company can give mobile phone to all the employees for official use
only and the expenses will be given from the company. For the maintenance and operation of multiple
devices and systems, different types of software are used. The above summarizes Berimbolo security's
complete IT infrastructure; additional IT infrastructure can be added if necessary.

You might also like