logo

IT Infrastructure Management - Desklib

   

Added on  2023-04-25

7 Pages1577 Words102 Views
Running head: IT INFRUSTUCTURE MANAGEMENT
IT INFRUSTUCTURE MANAGEMENT
Name of the Student
Name of the University
Author Note

1IT INFRUSTUCTURE MANAGEMENT
QUESTION 1:
Machine to machine technology (M2M):
Machine to Machine (M2M) can be referred to a network setup of both wired and
wireless network, which allows the devices having similar ability as well as similar type
to communicate independently (Verma et al.,2016). M2M can also be used for describing
any technology which ennobles the devices related to network to exchange data and
information and to take suitable actions without human assistance.
Big data analysis:
The big data analysis can be defined as, the strategy to analyse data of larger volume
or big data. The big data is gathered from widely various resources such as videos, social
networks, sensors, transaction records and digital images (Lazer et al., 2016). The
purpose of analysing this kind of data is for uncovering connections and patters which
might be invisible as well as it can also provides valuable insights about the original
creator.
Cloud computing and cyber security:
The cloud computing security can be defined as a set of processes, standard designs
and procedures for providing security information assurance within an environment of
cloud computing. The security of cloud computing addresses both the logical and
physical security concerns across each different software service models, infrastructure
and platform (Rittinghouse & Ransome, 2016). Also, it addresses private, public or
hybrid delivery models.

2IT INFRUSTUCTURE MANAGEMENT
Occupational fraud:
The occupational fraud is kind of a fraud that is committed against the employers by
employees. In other words, occupation fraud can be defined as, by using someone’s
occupation, misapplication or misuse the assets of an organization deliberately for self-
enrichment. Procurement fraud, payment fraud and subsistence and travel fraud are
included in this.
Botnet and Spear phishing:
When a list of devices including servers, Pcs, IOT devices and mobile devices
become infected and being controlled by a common malware then t will be defined as
Botnet. Bot is an infected device of malware, after becoming a part a network, all the
devices of that network can be controlled by a single hacker (Gritzalis et al., 2013).
The Spear phishing is an attack of email spoofing which targets a particular
organization or an individual. The main purpose of Spear Phishing is to get access in
financial information, military information and organization secrets for financial gain.
Social engineering and BYOD:
The social engineering is actually cracking of the information security that is non
technical. A tactics that can be use are listed below:
By taking the advantage of someone’s kindness.
Obtaining passwords of a computer through converting methods.
BYOD means Bring Your Own Device, can be defined as, when the employees brings
own devices (such as laptops, smartphone and tablets) of them for working purpose
instead or in addition of supplied devices from the company (Song, 2014).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Infrastructure Management PG
|7
|1190
|161

Data Governance and Data Management
|7
|1323
|109

The Assignment on Information Security
|12
|832
|36

Security threats Assignment PDF
|17
|5254
|133

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Identifying and Combating Emerging Threats in Information Systems
|9
|1758
|300