Free Essay SamplesAbout UsContact Us Order Now

Unity 9 & 10 – Systems Platforms and Wordlwide Networks

0 / 5. 0

Words: 275

Pages: 1

93

Unity 9 & 10 Systems Platforms and Worldwide Networks
Student’s Name
Institution’s Name
Different Systems Platforms
Two system platforms exist; they are the mainframe and distributed platforms. Mainframe Networks are large computers such as the ones that use zSeries hardware. Mainframes are widely scalable as they quickly meet user requirements even after a software or hardware is changed in size or volume. Distributed systems comprise of midrange computers that communicate together such that they appear as a single local machine to the end user (Henderson, 2016).
Determination of most secure system
Several factors are considered when determining if a system if secure. Among the most common looked at factors are, how well the system protects other things other than data. Secondly, can the system be audited? A secure system should allow being controlled through the Sarbanes-Oxley and other auditing techniques. A computer that runs for long without requiring a restart is considered to be secure. Secure systems have a higher rate of encryption and decryption. Lastly, the speed at which a system connects to other platforms and the internet as weighed against the security threats posed is used to determine the safety of a system (Hampson & Beaubien, 2005).
Please explain Internet Infrastructure and how to secure it
The internet infrastructure is composed of several networks that connect to each other from computers, phones, and other items that make up the internet of things (IoT).

Wait! Unity 9 & 10 – Systems Platforms and Wordlwide Networks paper is just an example!

Many items are continuously being redeveloped to access the internet or get connected to a network. DNS systems are the most used in accessing the internet, attacks aimed at DNS have been on the rise hence getting multiple DNS providers to host the DNS records is a sure way to stay safe (Kolkman, 2016).
As an Information System Security Officer (ISSO) how you handle Internet Privacy Issues
Information security entails the protecting of information from unauthorized access. The information security officer (ISSO) has the duty of ensuring that there exists a firewall to protect data manipulation by outside sources (Whitman, 2016). An ISSO should come up with a security program that aims at securing an organization through the framing of security policies, guidelines, and procedure.

References
Hampson, B. & Beaubien, A. (2005). Compare z/OS and distributed terminology. Ibm.com. Retrieved 16 November 2016, from http://www.ibm.com/developerworks/systems/library/es-zosdisterm.htmlHenderson, S. (2016). The Mainframe vs. Distributed Platforms: 10 Key Security Questions to Help Determine the Most Secure Platform – Page 2. Enterprisesystemsmedia.com. Retrieved 16 November 2016, from http://enterprisesystemsmedia.com/article/10-key-security-questions-to-help-determine-the-most-secure-platform/2#sr=d&m=n&cp=d&ct=-tmc&ts=1479227609Kolkman, O. (2016). Trust isn’t easy: Drawing an agenda from Friday’s DDoS Attack and the Internet of Things | Internet Society. Internetsociety.org. Retrieved 16 November 2016, from http://www.internetsociety.org/blog/tech-matters/2016/10/trust-isnt-easy-drawing-agenda-fridays-ddos-attack-and-internet-thingsWhitman E., M. (2016). Fundamentals of Information Systems Security/Information Security and Risk Management – Wikibooks, open books for an open world. En.wikibooks.org. Retrieved 16 November 2016, from https://en.wikibooks.org/wiki/Fundamentals_of_Information_Systems_Security/Information_Security_and_Risk_Management

Get quality help now

Henry Butler

5.0 (427 reviews)

Recent reviews about this Writer

If you still have any doubts about StudyZoomer.com, just forget about them. I’m the best in my class now because I’ve ordered their editing services one day. The whole team is just awesome.

View profile

Related Essays

Cyberattack Brief

Pages: 1

(275 words)

Expansion

Pages: 1

(275 words)

BlackfishReading Response

Pages: 1

(275 words)

Rhetorical Analysis

Pages: 1

(275 words)

Might Have Been an Inside Job

Pages: 1

(275 words)

Breach Operation Aurora

Pages: 1

(275 words)

transactional crime(s)

Pages: 1

(275 words)

Patriot Act

Pages: 1

(275 words)