Friday, December 6, 2019

Fundamental Information Technology

Question: Discuss about the Fundamental Information Technology. Answer: Introduction: The study includes a detailed description of the Information Infrastructure of Swagger Distribution. The IT infrastructure refers to the combination of software, hardware and network resources and operations need for the existence management and operation of a business IT environment[1]. The study includes the benefits of the HCI benefits and a descriptive part regarding DDoS attack. Human Computer Instruction reflects the existing interfaces between the user and the computer[2]. The Network of the swagger distribution mainly focuses on the wired network for enhancing the security regarding the information. Through the combination of the various aspect of the IT infrastructure the Carnegie Cyber Academy Library development team can create an effective and secure IT environment within the organization. Human Computer Interaction: The term HCI mainly focuses on the existing interface between the computers and user[3]. In addition, it analyzes the utilization and design of the computer technology. Benefits: The advantage of the HCI is that it continually tries to improve the techniques and medium of interaction between the computer and user[4]. The benefits are depending on the various types of user interfaces. The below benefits are suitable regarding the Swagger Distribution Company. Command Line Interface: The options and switches are flexible. Quick at accessing commands makes it suitable for the experts. Utilizes the resources as little as possible[5]. Menu Driven Interface: Does not ask for having knowledge of complex commands[6]. Easier to learn and use. Graphical User Interface: Enhances the speed of learning. Easy to use[7]. Improve confidence of the novice users. Importance of HCI: HCI is an important aspect of business to make the products or services of the Swagger Distribution more sufficient, useful and safe. In the long run, it will bring more marketing advantages. Microsoft Visio Tutorial: The software offers the various diagramming ability for preparing different business, database, software, engineering, network diagram and architecture diagrams[8]. For understanding the applications easily tutorial is provided to the new owner and new employees. At First, all users have to download this application on their computers. Then, the users have to click on the home tab button, for inserting diagram aspects, text groups and links use buttons[9]. After that, through clicking upon the design tab, the user can change the setup of the page. Besides with that, users select the themes for background page creation. Review tab offers access to several functions such as reports, language and proofing. View tab is for displaying the Visio images in full-screen mode[10]. Shaping the window size assists in getting several shapes regarding the image. For the draw, shaping the images through displaying inches the application provide the drawing window. Figure 1: Visio Select Template (Source: "Drawing E-R Diagrams With CrowS Foot Notation Using Microsoft Visio Tutorial" 2013) Programming The functionality of the Key Code Components: System.out.Printing: For printing, the passing argument on an interface the Java uses this statement. It is a part of the stdout. The system refers to the category of final class that resides in the Java.Lang package. Out is an aspect of PrintStream, which is a static member field of system class[11]. The final part, println is a method. It is a part of the PrintStream class. Calendar Code: It is an abstract class. It processes the conversions between the calendar fields and the time. For developing a concrete calendar system, it offers methods and fields. Set, add and roll these are the methods that are used for setting the calendar field values[12]. Semicolon: The semicolon has the purpose of ending a statement with a program. It acts as a terminator. New Keyword: It is essential to create objects to use the methods defined in the classes. The new keyword is responsible for creating the objects of a specific class[13]. Networking: Summarization of the Wired Network: The organization holds two main locations where the enhancement of the network is very urgent. The office observes and watches over all the operations regarding business[14]. The warehouse is the center of the product distribution. This aspect of the study concentrates on the fresh components and facilities that have been integrated into the network of the Swagger Distribution. The workstation of the Swagger Distribution Company operates at the office as well as at the warehouse. The network is a wired for making the security regarding the organizational information better[15]. The VPN router connects the warehouse and the office. The router is connected to a switch that connects the main system with the different retail shops around the city. Using the LAN the administration will manage the whole network. In the central room, the main Ethernet cable will be connected to the firewall system, crosspatch panel, two servers and two routers. The warehouse will utilize a remote Ethernet switch for providing connection to all the systems. In the office, the network administrator will make use of Ethernet drop cable. Web Technology: Key Components: Home Page: The key to a successful website is the homepage of it. The target audience, at first, sees the home page of the website[16]. Integrity Regarding Content: The meaningful and original content will serve as a crucial feature of Swaggers website. Easy Navigation: Through integrating easy navigation techniques within the website, the organization can avoid annoying its audiences. Sidebar: Through sidebars, the website will gather email addresses for the organizations lists or promotion of Swagger Distribution. Analytics: Using the Google Analytics the organization can that does not work regarding the website. In addition with that, the authorities can measure the success of the website[17]. Core Value Statement: The organization will provide the useful information in the first place so that the visitors can be assured that they are in the right place[18]. Integrating Social Media: The use of the social media regarding promotion of the Swagger Distribution Company can attract the customers who are not interested in contacting the organization in the right way. Keeping the Website Simple: The simpler the website, the more it will be attracting the visitors and prevent them from annoying situations. Keeping the Website Consistent: For making the website interesting the organization will change the contents often but they need to focus on the main parts and should ensure that it does not get changed[19]. Adding a Search Feature: Having a search feature on the Swagger Distributions website will lead to the convenience of the customer[20]. Suggestion for the Swagger Distribution Company Website: A Logical Roadmap and Clear Navigation are the two fresh features regarding the web technology[21]. The development team will primarily focus on the working procedures of the website. Google considers the structure and the contents regarding its website while it ranks for search. Figure 2: Official Google Search Site (Source: [22]) Clear navigation facility throughout the website can provide the visitors ease of serving. Amazon uses this feature sincerely. Figure 3: The Official Amazon Site (Source: [23]) Information Security: Importance of Information Security: Providing the security of information is a part of business activity has covered a long distance in the past decade. Swagger Distribution Company has to focus on this aspect of the business as a failure in this part can be very costly to the organization[24]. The importance of the Information Security can be categorized in the following manner. Protecting Swagger Distributions Integrity will be an essential task of it. Maintaining and developing efficient measures regarding security will offer stability to the organization and gather more trust from the customer[25]. For enhancing efficiency information security plays an important role. Swagger Distribution can save a lot of time and capital by integrating security related tasks into the job description. To fulfill the regulatory needs, the Swagger Distribution will understand the importance of the Information Securit[26] Preventing threats is crucial for any organization. The organization has to consider the existence of a good security regarding its information to protect the organizational information. Information Security Practice: The Swagger Distribution will implement mainly two types of practices that are best suited to the organization for securing its valuable information. Implement DLP and auditing: It refers to the process of avoiding data loss and file auditing for alerting, blocking, monitoring and identifying regarding the flow of data out and into the network of Swagger Distribution. The Carnegie Cyber Academy Librarydevelopment team will make use of several strategies to implement this security aspect. The strategies include identifying business needs, defining security requirements, communications, reviewing architecture options, distributing responsibilities and deploying[27]. The various aspects of the business requirements regard performance, transparency, availability and compatibility. Securing websites against malware infections and MITM: The Carnegie Cyber Academy Librarydevelopment team will Always implement on SSL, setting the secure flag regarding all session cookies, scanning for malware on a daily basis and regular assessing the websites of the organization on a daily basis for developing a system capable of fighting against the malware and MITM[28]. Possible Security Threats and Its Prevention: The study consists of security threat that can cause huge damage to Swagger Distribution. The Carnegie Cyber Academy Librarydevelopment team will also implement the methods in the organizations system to prevent the threats. DDoS Attack - DDoS or distributed denial of service attack refers to a security threat which includes infected several systems for targeting a single system for causing Denial of Service attack. In 2008, Anonymous used the DDoS for attacking the Scientology.org for blocking the site for some moments[29]. From the three options, observing performance metrics, deployment methods and detection and assuring scalability, for preventing the DDoS attack the development team will choose the deployment methods and detection procedure. It will consist of various methods of monitoring the ongoing processes of a network. The router will create sample packets and will export datagram that will hold the information of the packets[30]. Summarization of Interrelationship: The IT infrastructure system of the Swagger Distribution Company consists of several components like network, database, web technologies, programming applications, security systems and computers. A network of the organization resides in the core of the retail chain. For driving the retail operations smoothly the network will include the features such as reliability, security and scalability[31]. Using the Local Area Network regarding the web technology block the personnel of the organization will communicate for pursuing effective business processes. The database will hold an enormous amount of data of the Swagger Distribution Company. The database will consist of the information regarding inventory details, products, clients, employees and different stakeholders. It will assist the organization to observe the movements of the products[32]. The Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP) are the two programming applications of the organization. The CRM will help Swagger Distribution to analyze the information of the customers. The ERP will make the business process of the organization automated[33]. The Security System prevents the system from threats and provides security for the valuable information. Conclusion: The study concludes that it is essential to provide adequate security in terms of organizational information to prevent Swagger Distribution from security thefts. The theft of information can be very costly. The websites must be secure, dynamic and simple. The development team has to maintain the simplicity of the website while continuously upgrading the site for integrating fresh and effective web technology features. The two locations, office and warehouse, will be connected to the wires. It will make the theft more difficult for the attackers. The applications like CRM and ERP will assist the organization to compute the business processes more swiftly and effectively. Through the analysis of the customer information through CRM, the organization can reveal new aspects of the business. It can attract more customers and can handle the existing customers more easily. Bibliography: "Amazon.Co.Uk: Low Prices In Electronics, Books, Sports Equipment More". 2016.Amazon.Co.Uk. https://www.amazon.co.uk/. "Google". 2016.Google.Co.In. https://www.google.co.in/?gfe_rd=crei=qGv3VsfACoLI8AeHoIOYDA. "Java Reserved Words". 2016.Jwrider.Com. https://www.jwrider.com/riderist/java/javaidrs.htm. "Twelve Key Components To Building A Successful Website - Ipwatchdog.Com | Patents Patent Law". 2011.Ipwatchdog.Com | Patents Patent Law. https://www.ipwatchdog.com/2011/02/03/twelve-components-building-a-successful-website/id=14952/. Banos, Vangelis, Yunhyong Kim, Seamus Ross, and Yannis Manolopoulos. "CLEAR: a credible method to evaluate website archivability." (2013). Bhuyan, Monowar H., D. K. Bhattacharyya, and Jugal K. Kalita. "An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection."Pattern Recognition Letters51 (2015): 1-7. Disterer, Georg. "ISO/IEC 27000, 27001 and 27002 for information security management." (2013). Drell, Lauren. 2012. "10 Essential Features Of Every Good Business Website".Mashable. https://mashable.com/2012/02/09/website-must-haves/#ISQK39q33iqG. Hollensen, Svend.Marketing management: A relationship approach. Pearson Education, 2015. Jacko, Julie A., ed.Human Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. CRC press, 2012. Leon, Alexis.Enterprise resource planning. McGraw-Hill Education, 2014. McMillan, Robert. 2016. "Hackers Hit Scientology With Online Attack".Pcworld. https://www.pcworld.com/article/141839/article.html. Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. Rautaray, Siddharth S., and Anupam Agrawal. "Vision based hand gesture recognition for human computer interaction: a survey."Artificial Intelligence Review43, no. 1 (2015): 1-54. Silowash, George J., and Christopher King.Insider threat control: Understanding data loss prevention (DLP) and detection by correlating events from multiple sources. No. CMU/SEI-2013-TN-002. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2013. Siponen, Mikko, and Anthony Vance. "Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations."European Journal of Information Systems23, no. 3 (2014): 289-305. Siponen, Mikko, M. Adam Mahmood, and Seppo Pahnila. "Employees adherence to information security policies: An exploratory field study."Information management51, no. 2 (2014): 217-224. Tantikul, Phitchayaphong, C. Albert Thompson, Rosalva E. Gallardo-Valencia, and Susan Elliott Sim. "Novel and Applied Algorithms in a Search Engine for Java Code Snippets." InFinding Source Code on the Web for Remix and Reuse, pp. 271-287. Springer New York, 2013. Website [1] Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. [2] Rautaray, Siddharth S., and Anupam Agrawal. "Vision based hand gesture recognition for human computer interaction: a survey."Artificial Intelligence Review43, no. 1 (2015): 1-54. [3] Jacko, Julie A., ed.Human Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. CRC press, 2012. [4] Rautaray, Siddharth S., and Anupam Agrawal. "Vision based hand gesture recognition for human computer interaction: a survey."Artificial Intelligence Review43, no. 1 (2015): 1-54. [5] Jacko, Julie A., ed.Human Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. CRC press, 2012. [6] Rautaray, Siddharth S., and Anupam Agrawal. "Vision based hand gesture recognition for human computer interaction: a survey."Artificial Intelligence Review43, no. 1 (2015): 1-54. [7] Jacko, Julie A., ed.Human Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. CRC press, 2012. [8] Chefetz, Gary, Margaret Wallace, and Rodney Walker.Microsoft Project Server 2013 Managing Projects and Portfolios. Chefetz LLC, 2013. [9] Helmers, Scott A.Microsoft Visio 2016 Step By Step. Microsoft Press, 2015. [10] Chefetz, Gary, Margaret Wallace, and Rodney Walker.Microsoft Project Server 2013 Managing Projects and Portfolios. Chefetz LLC, 2013. [11] "Java Reserved Words". 2016.Jwrider.Com. https://www.jwrider.com/riderist/java/javaidrs.htm. [12] Tantikul, Phitchayaphong, C. Albert Thompson, Rosalva E. Gallardo-Valencia, and Susan Elliott Sim. "Novel and Applied Algorithms in a Search Engine for Java Code Snippets." InFinding Source Code on the Web for Remix and Reuse, pp. 271-287. Springer New York, 2013. [13] "Java Reserved Words". 2016.Jwrider.Com. https://www.jwrider.com/riderist/java/javaidrs.htm. [14] Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. [15] Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. [16] Banos, Vangelis, Yunhyong Kim, Seamus Ross, and Yannis Manolopoulos. "CLEAR: a credible method to evaluate website archivability." (2013). [17] "Twelve Key Components To Building A Successful Website - Ipwatchdog.Com | Patents Patent Law". 2011.Ipwatchdog.Com | Patents Patent Law. https://www.ipwatchdog.com/2011/02/03/twelve-components-building-a-successful-website/id=14952/. [18] Banos, Vangelis, Yunhyong Kim, Seamus Ross, and Yannis Manolopoulos. "CLEAR: a credible method to evaluate website archivability." (2013). [19] "Twelve Key Components To Building A Successful Website - Ipwatchdog.Com | Patents Patent Law". 2011.Ipwatchdog.Com | Patents Patent Law. https://www.ipwatchdog.com/2011/02/03/twelve-components-building-a-successful-website/id=14952/. [20] Banos, Vangelis, Yunhyong Kim, Seamus Ross, and Yannis Manolopoulos. "CLEAR: a credible method to evaluate website archivability." (2013). [21] Drell, Lauren. 2012. "10 Essential Features Of Every Good Business Website".Mashable. https://mashable.com/2012/02/09/website-must-haves/#ISQK39q33iqG. [22] "Google". 2016.Google.Co.In. https://www.google.co.in/?gfe_rd=crei=qGv3VsfACoLI8AeHoIOYDA. [23] "Amazon.Co.Uk: Low Prices In Electronics, Books, Sports Equipment More". 2016.Amazon.Co.Uk. https://www.amazon.co.uk/. [24] Disterer, Georg. "ISO/IEC 27000, 27001 and 27002 for information security management." (2013). [25] Siponen, Mikko, and Anthony Vance. "Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations."European Journal of Information Systems23, no. 3 (2014): 289-305. [26] Disterer, Georg. "ISO/IEC 27000, 27001 and 27002 for information security management." (2013). [27] Silowash, George J., and Christopher King.Insider threat control: Understanding data loss prevention (DLP) and detection by correlating events from multiple sources. No. CMU/SEI-2013-TN-002. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2013. [28] Siponen, Mikko, M. Adam Mahmood, and Seppo Pahnila. "Employees adherence to information security policies: An exploratory field study."Information management51, no. 2 (2014): 217-224. [29] McMillan, Robert. 2016. "Hackers Hit Scientology With Online Attack".Pcworld. https://www.pcworld.com/article/141839/article.html. [30] Bhuyan, Monowar H., D. K. Bhattacharyya, and Jugal K. Kalita. "An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection."Pattern Recognition Letters51 (2015): 1-7. [31] Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. [32] Banos, Vangelis, Yunhyong Kim, Seamus Ross, and Yannis Manolopoulos. "CLEAR: a credible method to evaluate website archivability." (2013). [33] Leon, Alexis.Enterprise resource planning. McGraw-Hill Education, 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.