Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 2 (Related to System Security ) Scenario Most of the current organizati

ID: 3730313 • Letter: Q

Question

Question 2 (Related to System Security )

Scenario
Most of the current organizations are relying on IT services to process their daily
operational and business processes. However, on the other hand, some of these
organizations do not fully enjoy the benefit of these IT services as intended.

To a great extend, this is dependent on the availability of the services uninterrupted. The degree of
availability defer from company to company. The degree of availability is normally
higher and commonly found among MNC companies. Based on a particular MNC
company provide your answer for the followings:

Question
a) Availability of computer system to support their operations relevant to operating
system (OS) security components abstraction of memory, services and files.

[9 Marks]

Explanation / Answer

IT services provides various IT solutions to their client, this includes either :

A)Software as a service

B)Platform as a service

C)Infrastructure as a service.

MNC's relies on these IT solution providers in order to reduce the degree of the extra work load.

By making multiple computer systems available, the memory or the data present on the memory can be distributed in all the network of these computer systems. This achieves the extra layer of security, since all the data is scattered and evenly distributed among all those computers.

Abstraction of services: Consider a scenario in which a single computer system is used to complete a single task, this may take some time, lets say 'n' amount of time. Then if we use 4 more systems and made them work together, then the time required would be reduced to 'n/4', thus huge difference can be obtained.

Abstraction of Files: In order to proved some level of security, the confidential files can be evenly distributed among all the available computer systems, thus id someone gets an access to one computer system, he may have a few pieces of the file, but most of the files will still be unavailble to him.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote