First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user.
Evolution of Users
Sends files over the network at the request of clients. Responds over LAN, within
one location/site. Support both application software and data files.
FILE SERVER
Turns a user-friendly domain name, like Google.com, into an Internet Protocol (IP)
address like ((( 70.42.251.42 ))) that computers use to identify each other on the
network.
Domain Name Server (DNS)
Uses TWO KEYS a public and private key for performing encryption and decryption
Public Key Encryption
PROVING you are who you say you are which can be done by: what you know, what
you have.
Authentication
TIER WHERE THE USER interface for the system is developed; SHIELDS THE
USER from the underlying logic of the systems as well as the underlying data
structures.
Presentation tier
SYSTEMS DEPLOYMENT Steps 1. System Conversion 2. Final Documentation 3.
End User Training
System Deployment
CONNECTS MULTIPLES networks together; can be used to directly connect
computers to a network; will relay messages to computers with APPROPRIATE IP
ADDRESS
Router
Requires that data is KEPT secure so that they are not accidentally provided or
obtained by unauthorized users
Confidentiality
Protecting EVERY LAYER that SURROUNDS ((( DATA )))
Defense in Depth
Can take on DIFFERENT FORMS depending on the complexity of the application; in
certain instances, it is AN ACTUAL OBJECT that is an ACTUAL IMPLEMENTATION
of the application
The model
Creates a subset of the data by reducing the data from multiple dimensions to one
dimension
Slicing data
The technology used in creating, maintaining, and making information accessible
Information Technology
In charge of all aspects of the COMPUTER NETWORKS
Network Administrator
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |