logo

Hardware and Networks for MATTAC

   

Added on  2023-04-19

8 Pages2064 Words248 Views
Fadi Alshaar

1
Task 1
Introduction
MATTAC is a multimedia company which deals with videos and pictures and it has
around 5 editing suites in London. For which they required the high-level hardware,
networks and communication technology to improve the security of their data and send
and receive the large media files from their offices. This task will describe the different
types of hardware to store the large amount of data and steps to reduce security related
issues.
Hardware required for MATTAC
There are many hardware and devices developed by information technology to meet
the requirement of MATTAC which are the following:
Computer system
Camera with lenses for data capture
Hard drive disk to store data
Video card for example, VGA, DVI, HDMI and Display port
With the help of all these devices the company can capture data and store their
personal data files and they can adopt the video card or graphics card to produce the
output image on a computer screen. There are few advanced video cards that offer
video capture, and the ability to interconnect multiple devices and monitor.
Security is one of the biggest issues faced by this company and there are many kinds
of error occur during the communication process, for example, hacking, data breaching,
distortion losses, and many more. Mainly, hackers attack the network devices of the
company after that they can easily enter into the personal system of employees. There
are many cyber-crimes also occur in this company, for example, ransom ware, denial of
service attack, phishing, wanna cry and many more. To avoid such kind of issues
MATTAC can adopt advanced security tools and can use the following steps and
techniques:
Keep update software on a regular basis
Use only authentic servers

2
Adopt encryption for communication purpose
Use a firewall and antivirus to detect the traffic signal and malware
Turn on security tools and prepare a weekly report
Employees should ensure that they use only company networks and authentic
networks for communication purpose
Conclusion
This task described the various kinds of hardware, steps of data capture, and storage
methods. Therefore, if MATTAC follows all these steps and techniques then they can
improve the efficiency of their system and networks. They can use the cryptography
technology to control and monitor the issues face d by the MATTAC during data
transmission and it also provide many features like detection of traffic and viruses,
protect private data, and improve efficiency of the system. It is more reliable because it
converts data into a form of code which cannot be accessed by hackers
Task 2
Introduction
The aim of this task is to identify the different types of hardware and technology which
will use to meet the requirements of the consumers. This task is divided into main two
parts for example, hardware needed for MATTAC and different types of cables and
network protocols.
Hardware and technology
To meet the requirements of client MATTAC can adopt advanced communication
networks like wireless LAN, WAN, data-link, network protocols like Wi-Fi, Zigbee,
internet of thing, For MATTAC the best appropriate network to use the fibre optic cable
because is much faster but a bit more expensive than the other cables . Wireless is an
advanced communication technology which can be used to send and receive data from
consumers and the main advantage of this network is that it does not require any kind
of connecting wires. There are many other cables, hardware devices and protocols can
be used to improve the efficiency of the communication systems which are described
below:
UTP cable

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193

Overview of Network Security
|8
|2332
|431

Foundation of Cyber Security
|6
|1679
|89

Challenges and Approaches to Overcome Session Hijacking and Intrusion Detection Systems
|4
|603
|263