Technology Essay Paper on Information Technology Systems

Information Technology Systems

Infrastructure attacks

An IT infrastructure attack is an attack that is capable of compromising an IT system over a long period of time by targeting its user’s system hardware, software and recovery components.  IT infrastructure is what allows an organization to communicate with others as well as deliver its services if it is a software firm. An infrastructure attack therefore disables all of these components which take long periods of time to reset (McCumber 58).

Malware attacks

Malware are a set of instructions developed with the intention of preventing proper operation of a computer and there are several categories of malware used to perform the attacks. A Trojan horse is the most popular type of malware used in debilitating software as it can be accidentally uploaded onto a computer by the user by claiming to be a beneficial application. Malware can be used to disable operations of a computer or to compromise its security so that the computer can be accessed easily (Skoudis 3).

Multiple Servers

Having multiple servers is the practice of using two or more servers at the same time. Having more than one server is important for retrieval of data if one of them is damaged. Having multiple servers should therefore be considered when developing a network disaster recovery plan (Held, 252).

Server Clustering

A server cluster is a group of two or more independent servers that are used together in operation to improve reliability as one server can perform if the others experience problems and share the load when both are active (Held, 252). A server cluster will therefore assist in network recovery first by reducing chances of the entire network being offline if a disaster occurs. The server cluster will also increase possibility of data being recovered as duplicates are stored on several computers.   

Raid Implementation

RAID is an acronym for Reduced Array of Independent Disks and is used when multiple drives require configuring with all being available simultaneously. RAID is implemented by the use of subsystems in the array to be dependent on processors on the controller to handle the various RAID tasks (Cook, 2003). A network disaster recovery plan must consider the convenience with which RAID can be implemented for faster reconnection of infrastructure and reduced downtime.

Disaster Recovery

The duty of disaster recovery personnel is to retrieve data and network infrastructure when a disaster occurs to be used in future programs and repairs. A recovery plan must consider the availability of personnel to respond to network errors and the number of emergency personnel available if quick response is necessary.

Task 2

Terminal Service

Terminal service allows for multiple client sessions to be hosted simultaneously on windows servers reducing the cost of hosting them. Terminal service makes it possible for an application on single server to be used by multiple users reducing the number of applications an organization has to purchase for use.

When performing remote installation of terminal service it is important to consider the number of users for bandwidth to be estimated. The function of applications must also be considered so that the system does not have a lower ram capacity than is necessary for them to run. System requirements should be analyzed before the network is set up to ensure that processors have the necessary power to handle the demand of the network especially for peak hours (Rouse, 2011).

References

Cook, R. How Will You Implement RAID? Virtual Desktop. November 2003. Retrieved, 20 September 2014 from < http://searchstorage.techtarget.com/tip/How-will-you-implement-RAID>

Held, G.  A Practical Guide to Content Delivery Networks, Second Edition. Florida: CRC Press, 2011.

McCumber, J. Assessing and Managing Security Risk in IT Systems: A Structured Methodology. Florida: CRC Press, 2005.

Rouse, M. Remote Desktop Services (RDS).Virtual Desktop. January 2011. Retrieved, 19 September 2014 from <http://searchvirtualdesktop.techtarget.com/definition/Remote-Desktop-Services-RDS>

Skoudis, E. Malware: Fighting malicious code. New Jersey:Pearson, 2004.