IT Infrastructure Management Report - Analysis of IT Technologies

Verified

Added on  2023/04/25

|7
|1577
|102
Report
AI Summary
This report provides a comprehensive overview of IT Infrastructure Management, addressing key concepts, technologies, and their applications. It begins by defining and explaining various terminologies such as Machine to Machine (M2M) technology, Big Data analysis, Cloud Computing and Cybersecurity, Occupational Fraud, Botnets and Spear Phishing, and Social Engineering and BYOD. The report then delves into a comparative analysis of 3G, 4G, and 5G technologies, highlighting their features and advancements. Furthermore, it examines the U.S. Military's use of data mining through the Nexus 7 system, exploring its purpose, data sources, and benefits as described by DARPA. The report utilizes the provided textbook as a reference and aims to synthesize theoretical concepts with current and future trends in ICT services and infrastructure management. It also includes a detailed analysis of the Nexus 7 system.
Document Page
Running head: IT INFRUSTUCTURE MANAGEMENT
IT INFRUSTUCTURE MANAGEMENT
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT INFRUSTUCTURE MANAGEMENT 1
QUESTION 1:
Machine to machine technology (M2M):
Machine to Machine (M2M) can be referred to a network setup of both wired and
wireless network, which allows the devices having similar ability as well as similar type
to communicate independently (Verma et al.,2016). M2M can also be used for describing
any technology which ennobles the devices related to network to exchange data and
information and to take suitable actions without human assistance.
Big data analysis:
The big data analysis can be defined as, the strategy to analyse data of larger volume
or big data. The big data is gathered from widely various resources such as videos, social
networks, sensors, transaction records and digital images (Lazer et al., 2016). The
purpose of analysing this kind of data is for uncovering connections and patters which
might be invisible as well as it can also provides valuable insights about the original
creator.
Cloud computing and cyber security:
The cloud computing security can be defined as a set of processes, standard designs
and procedures for providing security information assurance within an environment of
cloud computing. The security of cloud computing addresses both the logical and
physical security concerns across each different software service models, infrastructure
and platform (Rittinghouse & Ransome, 2016). Also, it addresses private, public or
hybrid delivery models.
Document Page
2IT INFRUSTUCTURE MANAGEMENT
Occupational fraud:
The occupational fraud is kind of a fraud that is committed against the employers by
employees. In other words, occupation fraud can be defined as, by using someone’s
occupation, misapplication or misuse the assets of an organization deliberately for self-
enrichment. Procurement fraud, payment fraud and subsistence and travel fraud are
included in this.
Botnet and Spear phishing:
When a list of devices including servers, Pcs, IOT devices and mobile devices
become infected and being controlled by a common malware then t will be defined as
Botnet. Bot is an infected device of malware, after becoming a part a network, all the
devices of that network can be controlled by a single hacker (Gritzalis et al., 2013).
The Spear phishing is an attack of email spoofing which targets a particular
organization or an individual. The main purpose of Spear Phishing is to get access in
financial information, military information and organization secrets for financial gain.
Social engineering and BYOD:
The social engineering is actually cracking of the information security that is non
technical. A tactics that can be use are listed below:
By taking the advantage of someone’s kindness.
Obtaining passwords of a computer through converting methods.
BYOD means Bring Your Own Device, can be defined as, when the employees brings
own devices (such as laptops, smartphone and tablets) of them for working purpose
instead or in addition of supplied devices from the company (Song, 2014).
Document Page
3IT INFRUSTUCTURE MANAGEMENT
QUESTION 2:
Features of 3G:
The cost of data transmission became low compared to 2g.
Video conferencing or calls.
Mobile gaming.
Mobile TV.
High speed internet
By carrying 2g features, a better data capacity and voice quality has given by 3g.
Map navigation support.
4G: The successor of 3G:
Has more services and bandwidth than 3G.
The technology used: OFDM, UMTS, LTE, MIMO, SDR, WiMAX.
The LTE technology was introduced by 4G.
Data capacity of internet speed is ten times higher compared to 3G (up to 100
Mbps).
4G also provides greater voice quality in calls and better security in internet.
Better support in navigation maps (Chen et al., 2015).
5G: The Latest Gen Technology:
Very low power consumption.
The IOT service is included in this.
Up to 10 Gb per second internet speed with having a broader bandwidth.
A totally new radio bands frequencies is used.
Offers a huge number of devices for support.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT INFRUSTUCTURE MANAGEMENT
Though 5G is still in testing phase only a few people are enjoying this incredible
network (Mehta et al., 2014).
Fig: Speed test comparison between 3G, 4G and 5G. (Chen et al., 2015)
QUESTION 3:
Nexus 7:
Nexus 7 is one of the intelligence systems of Defence Advanced Research
Project Agency’s (DARPA’s). The system, Nexus 7 is used basically in Afghanistan
for understanding the society in Afghanistan as well as to look for signs of stability
and weakness. This system researches frequent amount of raw information or data and
also interprets that data. The used of data is for security and safety of the military
forces. The system is not different than the big businesses that used to gather
information for determining sales (Duffield, 2015)., . The agencies within United
states might use the data for determining threats to the national security as the national
security is the first priority for the government.
Help of data mining to I2O for achieving its missions:
The mission of I2O is to ensure the technological superiority of US in all the
areas, where a decisive advantage to the military can be provided by information. In
this regard, the US military used the Nexus 7 in Afghanistan for understanding the
local society as well as to look for signs of stability and weakness to come up for
Document Page
5IT INFRUSTUCTURE MANAGEMENT
achieving the specific mission with appropriate strategies (Duffield, 2015). The Nexus
7 is a tool for analysing data which helps I2O to go beyond traditional long range
research role into wartime missions that are more attractive
Data sources of Nexus 7:
Nexus 7 uses data by collecting information from various agencies pertaining
to the nation to produce cultural intelligence that is population centric. It searches the
spy of vast US apparatus for figuring out which communities are stabilizing and
which falling apart in that nation, and also those who are loyal as well as those who
are against to the government (Duffield, 2015).
According to DARPA, what benefits does Nexus 7 provide that could not
be realized without it?
In US at the headquarters the main unit handles the bulk of crunching of the
data. Such data, in the hands of some of the best computer scientists who are working
side by side with the operators for providing insights that are useful in ways that
might not have otherwise been realized.
Document Page
6IT INFRUSTUCTURE MANAGEMENT
References:
Chen, S., Sun, S., Wang, Y., Xiao, G., & Tamrakar, R. (2015). A comprehensive survey of
TDD-based mobile communication systems from TD-SCDMA 3G to TD-LTE (A) 4G
and 5G directions. China Communications, 12(2), 40-60.
Duffield, M. (2015). The digital development-security nexus: Linking cyber-humanitarianism
and drone warfare. Handbook of international security and development, 80-94.
Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., & Mentis, A. (2013,
July). The Sphinx enigma in critical VoIP infrastructures: Human or botnet?. In IISA
2013(pp. 1-6). IEEE.
Lazer, D., Kennedy, R., King, G., & Vespignani, A. (2014). The parable of Google Flu: traps
in big data analysis. Science, 343(6176), 1203-1205.
Mehta, H., Patel, D., Joshi, B., & Modi, H. (2014). 0G to 5G mobile technology: a survey. J.
of Basic and Applied Engineering Research, 1(6), 56-60.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Song, Y. (2014). “Bring Your Own Device (BYOD)” for seamless science inquiry in a
primary school. Computers & Education, 74, 50-60.
Verma, P. K., Verma, R., Prakash, A., Agrawal, A., Naik, K., Tripathi, R., ... & Abogharaf,
A. (2016). Machine-to-Machine (M2M) communications: A survey. Journal of
Network and Computer Applications, 66, 83-105.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]