M1. Impact of IT infrastructure on the company and the stakeholders.
A traditional IT infrastructure is made up of the usual hardware and software components; facilities, data
centers, servers, networking hardware desktop computers and enterprise application software solutions. To represent the complete IT infrastructure of the company, a table has been formed, which id below;
NAME HARDWARE SOFTWARE DATA AND
TELECOM 1. SERVER RAM, Hard Drives, Processor, Linux or Microsoft. LAN connection video cards, motherboard, Power supply unit. 2. ROUTER CPU, flash memory, RAM, Router Firmware. WLAN Non-Volatile RAM, console, connection, WAN Interface card, network. connection 3. PERSONAL Power Supply, CPU, Processor (intel core i5, 8th WLAN COMPUTER Motherboard, RAM, HDD, generation), Zoom, connection. SSD, video card, Optical Graphics card drive, Drive, card reader, Graphics Windows® 10 OS, card, NIC, Zip Drive. Firewall, Antivirus, Google Chrome, Skype. 4. HANDHELD Processor, ROM, Android OS, Whatsapp, WiFi, Data DEVICES Motherboard, TFT-LCD, Skype, Mail, Zoom, Last connection. RAM, Touchscreen- Password Manager. captive/Resistive, Extra Scanner, Google Assistant, Memory, NFC, Bluetooth. Microsoft Apps. 5. CCTV DVR, NVR, monitor, cables CCTV Software CCTV and connections. connectivity. 6. BIOMETRIC Processor: 1.5 Ghz or higher Windows® 2000™, Standard wiring LOCK CPU, Memory: 256 MB mini, Windows® 2000 available USB port/Ethernet Professional™ with SP4, connection, extra specker. Windows® XP Home Edition™, Windows® XP Professional™, Windows® 2003 Server™. As the company is not so big, the required IT infrastructure are: personal computers for the employees and the stakeholders. Server and router are used for the internet and inter-connectivity. As it is very important to maintain the security and protection from various IT threats, the company can use biometric locks and CCTV surveillance. The company can give mobile phone to all the employees for official use only and the expenses will be given from the company. For the maintenance and operation of multiple devices and systems, different types of software are used. The above summarizes Berimbolo security's complete IT infrastructure; additional IT infrastructure can be added if necessary.