IT331_Unit_9_Project

IT331_Unit_9_Project - IT 331-02 Technology Infrastructure...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
IT 331-02 Technology Infrastructure – Unit 9 Project 1 1. Outline five different methods of physical security including the costs, advantages, disadvantages etc. Physical Security - Threats Physical damage Theft of assets Interruption of services Unauthorized disclosure of information Natural disasters Fires Vandalism Terrorism Environmental issues Five methods of physical security 1. Always turn computer off when not in use, especially if connected to broadband internet. When a computer connected to a broadband connection (like cable or DSL) is on, hackers can get in. Even if using firewall protection, the absolute best protection is no access to the PC at all.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IT 331-02 Technology Infrastructure – Unit 9 Project 2 2. To avoid hardware issues caused by excessive heat, blow dust off the inside of computer twice a year. Purchase a can of compressed air at any computer or office supply store. Remove the case cover and blow the dust out. Excessive dust buildup is common, especially if your PC is in a carpeted area. The dust acts as a blanket, trapping heat inside the computer. It can catch fire or cause your CPU to overheat and die. 3. Most computers are designed to sit on desktops. Put them in a factory, warehouse, chemical plant, food processing plant or any other harsh environment and you are asking for trouble. Breakdown, loss of data, the need to replace equipment…it can be an expensive business. 4. Rooms in which computers are used should be capable of being locked, and the computers installed in such a way as to make theft more difficult. Computers can, for example, be bolted to furniture or the floor from inside their cases, and the cases padlocked to make theft of the computer more time consuming and difficult. 5. Use surge protectors and battery backups. Outline the core elements (phases) of the System Development Life Cycle. Identify the series of steps and tasks that professionals, such as systems developers, can follow to build quality systems faster, with fewer risks, and at lower costs. Systems Development Life Cycle Every business has a number of goals
Background image of page 2
IT 331-02 Technology Infrastructure – Unit 9 Project 3 o System planners and management personnel within a company try to generate a set of questions, or problems, to help company achieve those goals To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well- defined plan o SDLC is a methodology, or plan, for a structured approach to the development of a business system SDLC involves several phases: o Planning o Analysis o Design o Implementation o Maintenance These phases are cyclical and usually never-ending Systems analyst is typically responsible for managing a project and following the SDLC phases Anyone, however, may be called upon to assist a systems analyst
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IT 331-02 Technology Infrastructure – Unit 9 Project 4 o Or anyone may have to assume some duties of the systems analyst
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/25/2010 for the course IT IT331-02 taught by Professor Weinraub during the Spring '10 term at Kaplan University.

Page1 / 16

IT331_Unit_9_Project - IT 331-02 Technology Infrastructure...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online