Usability Maintainability Scalability Reliability Availabili

Usability, Maintainability, Scalability, Reliability, Availability, Performance, Security

Please select one of the seven attributes above and respond with an example of what this term means in terms of IT architecture and why it is so important to a solid architecture to support information systems. These terms can be applied to other aspects of IT and business in general, but the focus here is on IT architecture. Some additional research will provide specific examples including what companies have focused on in these areas. Simply typing \"IT Scalability\" (or whatever characteristic you select) into your web browser should provide good results, but be sure to evaluate the sources to make sure they are relevant to this discussion. Remember to distinguish between objective articles and vendor\'s marketing information.

Solution

IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, dataand code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

The field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi - and the growth of \"smart\" devices, including smartphones, televisions and tiny devices as part of the Internet of Things.

Financial systems:

Web sites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market. In-store payment systems and ATMs have also been tampered with in order to gather customer account data and PINs

Utilities and industrial equipment:

Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment controlled by computers not connected to the Internet can be vulnerable to physical damage caused by malicious commands sent to industrial equipment (in that case uranium enrichment centrifuges) which are infected via removable media. In 2014, the Computer Emergency Readiness Team, a division of the Department of Homeland Security, investigated 79 hacking incidents at energy companies. Vulnerabilities in smart meters (many of which use local radio or cellular communications) can cause problems with billing fraud.

Aviation[edit]

The aviation industry is very reliant on a series of complex system which could be attacked. A simple power outage at one airport can cause repercussions worldwide, much of the system relies on radio transmissions which could be disrupted, and controlling aircraft over oceans is especially dangerous because radar surveillance only extends 175 to 225 miles offshore. There is also potential for attack from within an aircraft.

Usability, Maintainability, Scalability, Reliability, Availability, Performance, Security Please select one of the seven attributes above and respond with an ex

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site