Wednesday 11 April 2012

Business Information Technology - Week Six Questions

What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information architecture identifies where and how important information, such as customer records, is maintained and secured. Information Infrastructure includes the hardware, software and telecommunications equipment that, when combined, provides the underlying foundation to support the organisations goals. They differ in the way that information architecture only deals with the information that it is presented with and is responsible for how it is maintained and secured where as; information infrastructure deals with equipment perspective side that provides the underlying foundation to support the organisational goals. Each relates to one another in the way that they are both important in regards to the information that an organisation has within the business and equipment used to ensure everything is supported towards its goals.
Describe how an organisation can implement a solid information architecture
The three primary areas of information architecture are:
1)      Backup and recovery; an organisation should choose a backup and recovery strategy that is in line with its business goals. If the organisation deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers.

2)      Disaster recovery; Considers the location of the backup information. Many organisations store backup information in an off-site facility, StorageTek, a worldwide technology company that delivers a broad range of data storage offerings, specialises in providing off-site information storage and disaster recovery solutions.

3)      Information security; Security professional are under increasing pressure to do the job correctly and cost effectively as networks extend beyond organisations to remote users, partners and customers, and to mobile phone, PDAs and other mobile devices.
List and describe the five requirement characteristics of infrastructure architecture.
1)      Flexibility – Systems must be flexible enough to meet all types of business changes. When the company starts growing and performing business in new countries, the system will already have the flexibility to handle multiple currencies and languages.

2)      Scalability – Refers to how well a system can adapt to increased demands.

3)      Reliability- Ensures all systems are functioning correctly and providing accurate information. Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics.

4)      Availability – Addresses when systems can be accessed by users.

5)      Performance- Measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics of both speed and throughput).
Describe the business value in deploying a service oriented architecture

Service oriented Architecture, with its loosely coupled nature, allows enterprises to plug in new services or upgrade existing services in a granular fashion. This enables businesses to address the new business requirements, provides the option to make the services consumable across different channels and exposes the existing enterprise and legacy applications as services, thereby safeguarding existing IT infrastructure investments.
What is an event?
Events are the eyes and ears of the business expressed in technology – they detect threats and opportunities and alert those who can act on the information.
What is a service?
Services are more like software products than they are coding projects. They must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity.

Business Information Technology - Week Five Questions


Explain the ethical issues surrounding information technology
Ethics is a system of moral principle that considers our actions from right and wrong. Ethical issues surrounding informational technology consist of the following

-Intellectual property: collection of rights that protect creative and intellectual effort.
-Copyright: Exclusive right to do certain acts with intangible property
-Fair use doctrine: In certain situations, it is legal to use copyrighted material
-Pirated software: unauthorized use, duplicate, distribution, or sale of copyrighted software.
-Counterfeit software: software that is manufactured to look like the real thing and sold as such
 Describe a situation involving technology that is ethical but illegal
A situation involving technology that is ethical but illegal may be; when one purchases a program for their computer and creates a backup copy in case of any damage or loss of the original. Even though it states that copies of the program are illegal and should not be made the backing up of a program for your own use is not cheating the procedures of customers. This situation is most definitely considered unethical if the copy is being made multiple times to sell over the internet or at a market then the issue becomes both unethical an illegal.

Describe and explain one of the computer use policies that a company might employ
A company may employ an ‘internet use policy’ to contain general principles to guide the proper use of the internet. This has some unique aspects that make it a good candidate for its own policy. Implementing this policy means that all employees are encouraged to use the internet responsibly. These policies include:
1. Describe available internet services
2. Define the purpose and restriction of Internet access
3. Complements the ethical computer use policy
4. Describes user responsibilities
5. States the ramification for violations

What are the 5 main technology security risks?
1)      Human Error: after complete recheck to find any mistakes

2)      Natural Disasters: regularly save data as back up and in alternative area

3)      Technical Failures: install a trustworthy spyware fighter and regularly save data in a separate

4)      Deliberate Acts: constantly monitor the employees actions when working in the firm

5)      Management Failure: Ensure proper training and procedures in the workplace to new employees

Outline one way to reduce risk
One way to reduce risk may include ‘The second line of defence technology.’ Organisations can deploy numerous technologies to prevent information security breaches. When determining which types of technologies to invest in, it helps to understand the three primary information security areas:
1 ) authentication and authorisation
2) Prevention and resistance
3) Detection and response

What is a disaster recovery plan, what strategies might a firm employ?
A disaster recovery plan examines those situations that prevent you from carrying on business. Disaster Recovery is a process of regaining access to computer systems and data after a disaster has taken place. Careful planning helps your business get back to normal operations as quickly as possible. A firm might employ the following strategies.

-        location of backup data: offsite data kept in order

-        Develop information security policies

-        Communicate the information security policies

-        Identify critical information assets and risks

-        Obtain stakeholder support