Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA
|
|
- Melissa Thornton
- 8 years ago
- Views:
Transcription
1 Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1
2 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components of IT and their functions Operating system software Knowledge Statements 1.2 Fundamental concepts of different components of IT and their functions Operating System Software 2
3 Topics Covered Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management 3
4 What Is Systems Software? 4
5 Software Set of instructions Tells the computer what to do Accomplishes desired task when executed in a sequence Most critical function- directs the working of computer hardware and causes a computer to perform useful tasks 5
6 Software Architecture S Y S T E M S O F T W A R E Users interact with Application Packages System Software Operating System Data communication APPLICATION PACKAGES Data Base management software (DBMS) MS-OFFICE (Word, Excel, Access),Payroll, Sales etc System Access software control is a collection of computer programs Tape and used disk in design, management processing systems and Program control of library application management packagesystems DEVLOPMENT PACKAGES Network management software Visual Basic, Java, VC++, etc Program Development Tools UTILITIES etc Job scheduling Middleware Access Control Utility software programs Operating System Hardware - Firmware 6
7 Operating Systems Set of programs which acts as intermediary agent between the user and the computer hardware permits sharing and use of resources. It controls and manages the computer hardware resources among various processes. 7
8 Types of Operating Systems Single User OS Multi User OS Multi Processing OS Real time OS One user uses System at a timesingle or multi tasking Several users use System at a time OS operates on system with more than one processor Used in embedded systems with only small set of tasks 8
9 Need For Systems Software 9
10 OS Capabilities Multitasking allows computing systems to run two or more applications concurrently. Multiprocessing links more than one processor (CPU) Multithreading runs several processes or threads of a program simultaneously. 10
11 Core Tasks of OS Processor Management Memory Management Device Management File Management Secondary Storage Management Networking Application Programme Interface User Interfaces With System 11
12 Operating Systems Resource Manager Perform Hardware Function Providing user interfaces. Hardware independence through API Memory Management, Virtual Memory Networking-Permits users to share hardware and data. Time Sharing-Schedules resources among users. Manage resources and processing. 12
13 User Interface One of the most important functions of OS is to provide user interface Application software What is the price of RIL (RIL$) Operating System software Fetch RIL$ from hard disk,track1 sector 7 Application Program Interface 13
14 Memory and Processor Management 14
15 Core components of an OS OS holds a computer together- Glue binds H/w with S/w Kernel Layer Controls Access to Hardware Schedules System resources.. Memory, CPU,.. Enforces Security to System Resources Shell Layer Surrounds kernel Provides Interface for Applications 15
16 Programming Languages What to do & How to do What to do The instruction ADD 2 and 5 and assign the result to variable y written in different programming languages 16
17 Programming Software Assembler Assembly level code Machine code Language Compiler 3GL Code(As a single unit) Machine code Checks for errors in 3GL code Language Interpreter 3GL Code (Each program statement) Machine code Easier to debug Slow execution SQL Engine SQL Statement Machine code 17
18 Program Development Software Linker Process of combining various pieces of code and data together to form single executable unit that can be loaded in memory. Loader Loads code & data of executable code memory executes program Debugger Identify problem occurring during execution.help locate bugs Editors Allows user to create & Edit files w/out special characters Write source code 18
19 Some more System Software Access Control Software Data Communication Software Utility Programs Tape and Disk Management Software 19
20 Access Control Software Access Control Software is used for Secure access to data, files, system resources Assign ownership of all data for accountability Logging Access Activity 20
21 Data Communication Software Communications software is generally embedded in the computer operating system. Communications software assists Operating System in managing local and remote terminal access to host resources to manage security E.g. terminal emulators, file transfer programs 21
22 Utility Programs Functions To manage a computer's functioning To improve operational efficiency e.g. Defragmenters To understand application systems. To facilitate assessing or testing data quality. To test a program s ability to function correctly and maintain data integrity. To assist in fast program development. 22
23 Security & Controls Relating to Operating System 23
24 OS Security OS should be Robust Reliable, and free of Integrity flaws. Operating system's processes and kernel do the designated task as instructed. A malicious program could make these process do malicious tasks OS can be secured through proper user access and it has to be protected through anti-virus, firewalls, Anti spyware and patch management 24
25 Access Control in OS Access control is the process of authorizing users, groups and computers to access objects on the computer or network Operating system access controls First layer of access controls Rely on hardware features of processor or Associated memory management Basically control which memory addresses a process can access. 25
26 Access Control in OS - ACL ACLs are widely used in environments where users manage their own file security, such as the Unix File is the smallest object in OS Access control deals with files ACL is a matrix of access permissions, with columns for files and rows for users 26
27 Access Control List (ACL) Match User/Role with Object Specifying Capabilities File A File B Prog X Role A Read Write Write Role B Read Read Write Role C Execute 27
28 Access Control in OS ACLs are used in OS with Roles. Role= set of Users Administrator, Guest Assign permissions to roles Each user gets permission through Role 28
29 Access Controls in UNIX Each file(object) has owner and group Permissions set by owner Could be Read, write, execute to Owner, group, other Only owner, root can change permissions 29
30 Access Control in Windows - Steps User Creation Create Password Assign Roles User rights & privilege Permissions Security Auditing 30
31 Create User In Windows 7 Go to Control Panel > User Accounts > Manage accounts 31
32 Create Password In Windows 7 Go to Control Panel > User Accounts > Manage accounts 32
33 Assign Role In Windows 7 Go to Control Panel > User Accounts > Manage accounts Default Roles could Be Standard User or Administrator 33
34 User Rights & Permissions User Rights apply to user accounts, and Permissions attached to objects Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy 34
35 User Rights Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy Click on User Rights assignment 35
36 Permissions Permissions are attached to objects Right Click on Properties > Security Tab > Advanced or Edit 36
37 Auditing User Access Audit access to Object, Logon, System events Logging User Events Start> Control Panel>System and security> Administrative Tools>Local Security Policy>Local Policies> Audit Policy 37
38 Understanding Software Asset Management 38
39 Software Asset Management ITIL Definition Software Asset Management is all of the infrastructure and processes necessary for the effective management, control and protection of the software assets within an organization, throughout all stages of their lifecycle. 39
40 Software Asset Management Covers: Software from Purchasing Deploying Managing And tracking Purchase to Retirement of the software SAM is a key process for any organisation to meet its legal, financial and reputational responsibilities 40
41 SAM answers the following Questions What is installed in the environment? What is supposed to be installed? Who is using the Software? How much are they using it? Are they supposed to be using it? How are they using it? Can they prove they re allowed to use it? 41
42 Why SAM? Software is an Asset - needs Management Cost Savings Through Standardisation, Volume licensing Reducing Redundancy, Streamlined Operations Risk Management Streamlined Operations Good Governance Reduce business, reputational and legal risks Trouble free Software, peace of mind Better compliance, Good IT Governance Disaster Protection Updated inventory, offsite backups 42
43 Steps to SAM Take Inventory Get organised Policies & Standards Software acquisition Software storage Software Implementation, Use Software Retirement Maintenance 43
44 Inventorisation Make an inventory by viewing the Add/Remove Programs list PC serial number: Inventory date: Department/ Business Unit: PC used by: Employee ID number or position: Employee telephone extension: Software Installations: Publisher Software Title Version Number Number of Installations As suggested by Microsoft 44
45 System Software Acquisition Business, functional and technical needs and specifications Cost and benefit(s) Obsolescence Compatibility with existing systems Security Demands on existing staff Training and hiring requirements Future growth needs Impact on system and the network performance 45
46 System Software Implementation System Software Implementation System Software Change Control Procedures Software Licensing Issues 46
47 Maintain Proof of ownership The global piracy rate for PC software hovers at 42 percent. Proof of ownership When we acquire software, it's important to keep the following: Software License Terms -End User License Agreement (EULA) Certificate of Authenticity (COA) Original media and manuals Purchase invoice and/or receipt 47
48 Application Software Acquisition Considerations Compatibility Reliability Benchmarks Version Support 48
49 Application Software Development Requirement Definition Maintenance Post Implementation Review Changeover & Implementation Requirement Analysis Coding Design Testing 49
50 What is an Endpoint An endpoint device is an Internet-capable computer hardware device on a TCP/IP network. Where an information stream is generated or ends. Could be a: Computer Laptops smart phones Thin clients, POS terminals etc. 50
51 Endpoint Management In any distributed Environment endpoints need to be deployed, configured, patched, secured and supported. Endpoint Management Solutions encompass Patch Delivery Inventory Software distribution OS deployment Remote control capabilities Provide Visibility into the state of endpoints to support 51
52 Why End Point Management Analyse vulnerabilities (patched or insecure configurations) Easily and automatically remediate all the networked endpoints Establish and enforce configuration policies across the endpoints Distribute and update software packages View, modify, and audit properties of the endpoints 52
53 Benefits of End Point Management Cross platform support Understanding what we have and where it is Centralised management for greater control Standardised systems to drive consistency Simplify compliance Improve service levels Optimised client and server software assets Measured and improved IT performance Automated IT processes Enables end user self-service Simplified software license audits 53
54 What is Digital Rights Management (DRM) Technologies and systems that prevent users doing thing with content that the content provider does not want Removes usage control from the person in possession of digital content > Computer program 54
55 Why DRM To protect the property rights of an enterprise s assets To establish the awareness of Intellectual Property Rights (IPR) in society. 55
56 Digital Rights Management Digital Rights Management is the process of defining, tracking and enforcing permissions and conditions through electronic means and throughout the content lifecycle. DIGITAL CONTENT CREATION DISTRIBUTI ON STORAGE RETRIEVAL USE DISPOSAL 56
57 Where is DRM used? E-book server restricts copying of material Software on DVD restricts copying of content not more than twice 57
58 Auditing Software 58
59 Auditing System Software Acquisition Review system software selection procedures As per I S requirements and business plan. Same selection criteria applied to all acquisitions Review cost/benefit analysis Total Cost of Ownership considered while deciding. Impact on data security. Financial stability of the vendor s operations 59
60 Auditing System Software Review controls over the installation of changed system software Changes should be scheduled when they least impact routine working Fall-back or restoration procedures in place, on production failure. Review Configuration Management Review of the pre-defined/default user accounts Review of Services enabled as per business requirements Review of Resources which are accessible by default by all users Review of Procedures for controlling application of patches Whether Admin/Super User accounts accessed through a secured access control mechanism? At a PC level, whether a personal firewall enabled? 60
61 Auditing System Software Review system software maintenance activities Whether changes made to the system software documented. Vendor support for Current versions of the software Whether Vendor s maintenance activities are logged. Review systems documentation Parameter tables. Activity logs/reports. 61
62 Auditing System Software Review authorisation documentation to determine whether: Changes to access authorisation documented. Attempted violation reported and follow-up Review system software security to determine whether: Circumvention of logical security access control restricted. Vendor-supplied installation passwords changed during installation 62
63 We have learnt about Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management Digital Rights Management 63
64 References Ralph M. Stair, George W. Reynolds, Principles of Information Systems, Cengage Learning IT Asset Management. Net BSA.org 64
65 Systems Software Thank You 65
Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA
Introduction to Information System Layers and Hardware Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA 1 Information System Layers Learning Objectives Task Statements
More informationHardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA
Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationUSER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationRadia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
More informationChapter 12. Development Tools for Microcontroller Applications
Chapter 12 Development Tools for Microcontroller Applications Lesson 01 Software Development Process and Development Tools Step 1: Development Phases Analysis Design Implementation Phase 1 Phase 2 Phase
More informationCS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
More informationCourse: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
More informationAdobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationINTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation
ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationInformation Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
More informationCHAPTER 15: Operating Systems: An Overview
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
More informationPatch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationDevice Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
More informationxassets Hosted Services Microsoft SAM Assist Audits with xassets
xassets Hosted Services Microsoft SAM Assist Audits with xassets 2007-2010 xassets.com Limited Introduction... 2 Preparation... 2 Implementation... 3 Execution of Discovery... 3 Reporting Phase... 3 Information
More informationI.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000
Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company
More informationInformation Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
More informationSymantec Asset Management Suite 7.5 powered by Altiris technology
Symantec Asset Management Suite 7.5 powered by Altiris technology Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software
More informationPATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More informationStellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
More informationImplementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
More informationWindows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
More informationSystem Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
More informationSystem Center Configuration Manager Overview
System Center Configuration Manager Overview This document provides some background information on the Microsoft Systems Center Configuration Manager (SCCM) system, which has been selected for use as an
More informationwww.cadline.co.uk www.midastechnology.co.uk Page 1 of 5
Page 1 of 5 Support Are you confident that you have all eventualities covered and that your current IT support provider can handle all of your issues? Are you frustrated with your application supplier
More informationIT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationReducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
More informationDemystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
More informationSymantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
More informationLectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationInformation Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationTable of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
More informationGLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond
More informationApplication Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationFunctional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationNetwork operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
More informationSUMMIT ASSET MANAGEMENT DATASHEET
SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony SUMMIT,
More informationAre You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
More informationComputers: Tools for an Information Age
Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer
More informationOperating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are
Session 07 Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are connected to computer and provide good environment
More informationOperating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationChapter 5: Operating Systems Part 1
Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationClick to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
More informationPreparing a SQL Server for EmpowerID installation
Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search
More informationMulti-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
More informationClient Hardware and Infrastructure Suggested Best Practices
Client Hardware and Infrastructure Suggested Best Practices While it is the responsibility of our Clients to support their hardware and infrastructure, the Pretty Good Practices below are provided for
More informationSawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
More informationTransporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
More informationFunctions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and
More informationFirewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
More informationDisable Redundant Windows XP Services which are Hogging Your RAM
X P Services Optimisation X 36/1 Disable Redundant Windows XP Services which are Hogging Your RAM With the information in this article you can: Configure your Windows XP Services for top performance Identify
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationChapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
More informationGLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this document in connection with our Group and our business. The terms and their meanings may not correspond
More informationBSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationA Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
More informationVDI can reduce costs, simplify systems and provide a less frustrating experience for users.
1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationDistribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
More informationCOMLINK Cloud Technical Specification Guide CLOUD DESKTOP
COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationDesktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
More informationVirtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
More informationWhy you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
More informationSystem Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationStruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
More informationUsing WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
More informationWhite Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
More informationWhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationFUNCTIONAL OVERVIEW www.amdosoft.com
Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More information