IT Infrastructure Management PG
VerifiedAdded on 2023/04/11
|7
|1190
|161
AI Summary
This document covers various topics related to IT Infrastructure Management PG course such as machine to machine technology, big data analytics, cloud computing and cloud security, occupational fraud, botnets and spear phishing, and social engineering and BYOD. It also includes information about the differences among 3G, 4G, and 5G technologies and the Nexus 7 data mining system.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT Infrastructure Management PG
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT INFRASTRUCTURE MANAGEMENT PG
1
Contents
Question 1.............................................................................................................................................2
Machine to machine technology.......................................................................................................2
Big data analytics...............................................................................................................................2
Cloud computing and cloud security.................................................................................................2
Occupational fraud............................................................................................................................2
Botnets and spear phishing...............................................................................................................3
Social engineering and BYOD.............................................................................................................3
Question 2.............................................................................................................................................3
Differences among 3G, 4G, and 5G....................................................................................................3
Question 3.............................................................................................................................................4
What is the Nexus 7?.........................................................................................................................4
How does data mining help I2O achieve its mission?........................................................................4
What are Nexus 7’s data sources?.....................................................................................................4
Benefits of nexus 7............................................................................................................................5
References.............................................................................................................................................6
1
Contents
Question 1.............................................................................................................................................2
Machine to machine technology.......................................................................................................2
Big data analytics...............................................................................................................................2
Cloud computing and cloud security.................................................................................................2
Occupational fraud............................................................................................................................2
Botnets and spear phishing...............................................................................................................3
Social engineering and BYOD.............................................................................................................3
Question 2.............................................................................................................................................3
Differences among 3G, 4G, and 5G....................................................................................................3
Question 3.............................................................................................................................................4
What is the Nexus 7?.........................................................................................................................4
How does data mining help I2O achieve its mission?........................................................................4
What are Nexus 7’s data sources?.....................................................................................................4
Benefits of nexus 7............................................................................................................................5
References.............................................................................................................................................6
IT INFRASTRUCTURE MANAGEMENT PG
2
Question 1
Machine to machine technology
The machine to machine is defined as the technology which can be utilized for
describing any technology that allows network devices to send and receive information
from one location to another (Techopedia, 2018). Such kind of technology has the
potential to perfume actions without the manual assistance of individuals and provide
direct interaction between two or more devices with the help of communication
channels like wired and wireless networks. It can be used for the communication
purpose that means users can exchange information from one device to another.
Big data analytics
It is defined as a process which is used to examine the large and varied data sets
which can help companies to make informed business decisions. It refers to the
technique of analysing a large amount of data which is used by many companies in
order to control and manage the huge amount of data sets (Tech Target, 2018). It
provides a platform to evaluate huge data sets and other data sources which cannot be
tackled by business industries.
Cloud computing and cloud security
The term cloud computing refers to the technology that involves numbers of
services like software, servers, software development process and so on. There are
major three services included in cloud computing such as software as a service,
platform as a service, and infrastructure as a service (Force point, 2018). The name
cloud computing was inspired by the cloud symbol which is used to represent the
internet in diagrams and flowcharts
The cloud security is defined as the protection of information and data obtained
from theft, deletion and leakage (Force point, 2018). Mainly, it is used by the companies
for securing the cloud based services and protect data of users from criminals. It
involves various kinds of processes to protect data such as firewalls, VPN, obfuscation,
penetration testing and so on.
2
Question 1
Machine to machine technology
The machine to machine is defined as the technology which can be utilized for
describing any technology that allows network devices to send and receive information
from one location to another (Techopedia, 2018). Such kind of technology has the
potential to perfume actions without the manual assistance of individuals and provide
direct interaction between two or more devices with the help of communication
channels like wired and wireless networks. It can be used for the communication
purpose that means users can exchange information from one device to another.
Big data analytics
It is defined as a process which is used to examine the large and varied data sets
which can help companies to make informed business decisions. It refers to the
technique of analysing a large amount of data which is used by many companies in
order to control and manage the huge amount of data sets (Tech Target, 2018). It
provides a platform to evaluate huge data sets and other data sources which cannot be
tackled by business industries.
Cloud computing and cloud security
The term cloud computing refers to the technology that involves numbers of
services like software, servers, software development process and so on. There are
major three services included in cloud computing such as software as a service,
platform as a service, and infrastructure as a service (Force point, 2018). The name
cloud computing was inspired by the cloud symbol which is used to represent the
internet in diagrams and flowcharts
The cloud security is defined as the protection of information and data obtained
from theft, deletion and leakage (Force point, 2018). Mainly, it is used by the companies
for securing the cloud based services and protect data of users from criminals. It
involves various kinds of processes to protect data such as firewalls, VPN, obfuscation,
penetration testing and so on.
IT INFRASTRUCTURE MANAGEMENT PG
3
Occupational fraud
Occupational fraud is defined as the utilization of one’s occupation for private
enrichment by using deliberate misuse. Such kind of process may involve payment
fraud, travel and procurement fraud, and receipt fraud. It is a part of the fraud case
which is committed by the individuals against employers due to which employees can
suffer from financial issues (HR daily advisor, 2018). Mainly, such kind of problem
occurs in an organization and business industry where employees are committed with
the fraud case.
Botnets and spear phishing
The term botnet is defined as the group of computers which are interconnected
in a coordinated fashion for malicious purpose. In which each computer system is called
a bot that develops a computer network in order to block the servers of user’s
computers (Kaspersky, 2019). It is observed that the botnet is also known as the zombie
army.
The spear phishing is a kind of process which is used by the hackers to collect the
personal data and information of users. In which hackers generate unwanted links or
emails and transfer to the user’s accounts for accessing their computer networks and
devices (Kaspersky, 2019).
Social engineering and BYOD
The term social engineering refers to a technique which is used for the broad
range of malware activities which are accomplished by using individual
communications. Mainly, such kind of process uses the psychological manipulation
process in order to collect and access the networks of users and collecting their
personal information (In Gramm Micro, 2018).
BYOD is defined as the bring your own device that refers to the individuals who
bring and implement their own computer devices like mobiles, tablets, laptops and so
on. The BYOD may occur in the presence of radar and a corporation society agrees the
personal mobile devices which are used by consumers and employees.
3
Occupational fraud
Occupational fraud is defined as the utilization of one’s occupation for private
enrichment by using deliberate misuse. Such kind of process may involve payment
fraud, travel and procurement fraud, and receipt fraud. It is a part of the fraud case
which is committed by the individuals against employers due to which employees can
suffer from financial issues (HR daily advisor, 2018). Mainly, such kind of problem
occurs in an organization and business industry where employees are committed with
the fraud case.
Botnets and spear phishing
The term botnet is defined as the group of computers which are interconnected
in a coordinated fashion for malicious purpose. In which each computer system is called
a bot that develops a computer network in order to block the servers of user’s
computers (Kaspersky, 2019). It is observed that the botnet is also known as the zombie
army.
The spear phishing is a kind of process which is used by the hackers to collect the
personal data and information of users. In which hackers generate unwanted links or
emails and transfer to the user’s accounts for accessing their computer networks and
devices (Kaspersky, 2019).
Social engineering and BYOD
The term social engineering refers to a technique which is used for the broad
range of malware activities which are accomplished by using individual
communications. Mainly, such kind of process uses the psychological manipulation
process in order to collect and access the networks of users and collecting their
personal information (In Gramm Micro, 2018).
BYOD is defined as the bring your own device that refers to the individuals who
bring and implement their own computer devices like mobiles, tablets, laptops and so
on. The BYOD may occur in the presence of radar and a corporation society agrees the
personal mobile devices which are used by consumers and employees.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT INFRASTRUCTURE MANAGEMENT PG
4
Question 2
Differences among 3G, 4G, and 5G
Technology 3G 4G 5G
Deployment 1990/2002 2000/2010 2014/2015
Bandwidth 2mbps 200mbps More than 1gbps
Technology CDMA/broad
bandwidth
LAN/WAN/WLAN/PAN 4G+WWWW
Service High quality audio,
video and data
Variable devices and
dynamic data access
Variable devices
with AI, dynamic
information access
Switching Packet except for
air interface
All packets All packets
Core network Packet network Internet Internet and
wireless
Standards WCDMA and
CDMA
Single unified standard Single unified
standard
(Fagbohun, 2014).
Question 3
What is the Nexus 7?
The nexus 7 is one of defence advanced research project agency’s intelligence
system. It is defined as the data mining system which has been put into the system for
utilizing at the time of recent wars (Turban, 2008).
How does data mining help I2O achieve its mission?
I2O's mission used to ensure US technological superiority in all fields where
relevant data and information can provide a decisive military advantage. However, the
Nexus 7 was utilized by the United State Military in order to evaluate the local society
which helps them to archive their missions more effectively (Turban, 2008). It is
observed that the nexus 7 is a type of data analysis process which supports I2O in order
to go beyond the traditional long range study about wartime missions.
4
Question 2
Differences among 3G, 4G, and 5G
Technology 3G 4G 5G
Deployment 1990/2002 2000/2010 2014/2015
Bandwidth 2mbps 200mbps More than 1gbps
Technology CDMA/broad
bandwidth
LAN/WAN/WLAN/PAN 4G+WWWW
Service High quality audio,
video and data
Variable devices and
dynamic data access
Variable devices
with AI, dynamic
information access
Switching Packet except for
air interface
All packets All packets
Core network Packet network Internet Internet and
wireless
Standards WCDMA and
CDMA
Single unified standard Single unified
standard
(Fagbohun, 2014).
Question 3
What is the Nexus 7?
The nexus 7 is one of defence advanced research project agency’s intelligence
system. It is defined as the data mining system which has been put into the system for
utilizing at the time of recent wars (Turban, 2008).
How does data mining help I2O achieve its mission?
I2O's mission used to ensure US technological superiority in all fields where
relevant data and information can provide a decisive military advantage. However, the
Nexus 7 was utilized by the United State Military in order to evaluate the local society
which helps them to archive their missions more effectively (Turban, 2008). It is
observed that the nexus 7 is a type of data analysis process which supports I2O in order
to go beyond the traditional long range study about wartime missions.
IT INFRASTRUCTURE MANAGEMENT PG
5
What are Nexus 7’s data sources?
It is observed that the nexus 7 uses information and data from various kinds of
agencies which are pertaining to the nation for developing population centric cultural
intelligence. Mainly, it identifies the vest US spy components in order to evaluate which
companies are falling apart and which are stabilizing (Turban, 2008).
Benefits of nexus 7
According to the DARPA, the nexus is a data mining approach that has the
potential to identify the signs of weakness of the US military in Afghanistan. The major
advantage of nexus 7 is that it allows the US military for identifying the social condition
of Afghanistan and helps them for developing an appropriate strategy (Turban, 2008).
Moreover, such kind of system plays a major role in the data analysis techniques and it
is a far-reaching and revolutionary system which collects data from various agencies in
order to develop population-centric. The other advantage of nexus 7 is that it control
and manage a large amount of data crunching in Afghanistan.
5
What are Nexus 7’s data sources?
It is observed that the nexus 7 uses information and data from various kinds of
agencies which are pertaining to the nation for developing population centric cultural
intelligence. Mainly, it identifies the vest US spy components in order to evaluate which
companies are falling apart and which are stabilizing (Turban, 2008).
Benefits of nexus 7
According to the DARPA, the nexus is a data mining approach that has the
potential to identify the signs of weakness of the US military in Afghanistan. The major
advantage of nexus 7 is that it allows the US military for identifying the social condition
of Afghanistan and helps them for developing an appropriate strategy (Turban, 2008).
Moreover, such kind of system plays a major role in the data analysis techniques and it
is a far-reaching and revolutionary system which collects data from various agencies in
order to develop population-centric. The other advantage of nexus 7 is that it control
and manage a large amount of data crunching in Afghanistan.
IT INFRASTRUCTURE MANAGEMENT PG
6
References
Fagbohun, O. (2014). Comparative studies on 3G, 4G and 5G wireless technology. IOSR
Journal of Electronics and Communication Engineering, 9(3), 88-94.
Force point (2018). What is Cloud Security? Retrieved from:
https://www.forcepoint.com/cyber-edu/cloud-security
HR daily advisor (2018). What is Occupational Fraud? Retrieved from:
https://hrdailyadvisor.blr.com/2018/09/28/what-is-occupational-fraud/
In Gramm Micro (2018). Overcome the Challenges of Social Media and BYOD Security.
Retrieved from: https://imaginenext.ingrammicro.com/trends/september-
2017/overcome-the-challenges-of-social-media-and-byod-security
Kaspersky (2019). What is Spear Phishing? Retrieved from:
https://www.kaspersky.co.in/resource-center/definitions/spear-phishing
Tech Target (2018). big data analytics. Retrieved from:
https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics
Techopedia (2018). Machine to machine technology (M2M). Retrieved from:
https://www.techopedia.com/definition/14962/machine-to-machine-m2m
Turban, E. (2008). Information technology for management. John Wiley & Sons, Inc.
6
References
Fagbohun, O. (2014). Comparative studies on 3G, 4G and 5G wireless technology. IOSR
Journal of Electronics and Communication Engineering, 9(3), 88-94.
Force point (2018). What is Cloud Security? Retrieved from:
https://www.forcepoint.com/cyber-edu/cloud-security
HR daily advisor (2018). What is Occupational Fraud? Retrieved from:
https://hrdailyadvisor.blr.com/2018/09/28/what-is-occupational-fraud/
In Gramm Micro (2018). Overcome the Challenges of Social Media and BYOD Security.
Retrieved from: https://imaginenext.ingrammicro.com/trends/september-
2017/overcome-the-challenges-of-social-media-and-byod-security
Kaspersky (2019). What is Spear Phishing? Retrieved from:
https://www.kaspersky.co.in/resource-center/definitions/spear-phishing
Tech Target (2018). big data analytics. Retrieved from:
https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics
Techopedia (2018). Machine to machine technology (M2M). Retrieved from:
https://www.techopedia.com/definition/14962/machine-to-machine-m2m
Turban, E. (2008). Information technology for management. John Wiley & Sons, Inc.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.