Chapter 14 (SDB) - Updated Lecturer Slides
Chapter 14 (SDB) - Updated Lecturer Slides
INTEGRATION
Week 11 (25 ─ 29 Sep)
Pakiso J. Khomokhoana (PhD)
26 Sep, 2023
Potential issues:
Tendency to stifle innovation and produce solutions
that are suboptimal for some users.
Problems for users who need services at or near
the leading edge of technology.
May fail to meet the needs of some users, because
of reduced cost and simplified services.
Incompatibility issues.
COMPETITIVE ADVANTAGE
Technology provides a competitive advantage if it
does one or more of the following:
Provides services that competitors are unable to
provide.
Provides services of unusually high quality.
Provides services at unusually low prices.
Generates services at unusually low cost.
General Outline:
Identification of requestor
Describes the organization requesting proposals, e.g., the name of a
person to whom questions can be addressed as well as postal and e-
mail addresses, phone numbers, etc.
Format, content, and timing requirements for responses
The RFP should state procedural requirements for submitting a valid
proposal and when possible, include an outline of a valid proposal
describing each section’s required content. It should also clearly state
deadlines for questions, proposal delivery, and other important events.
Requirements
Requirements should be categorized by type and listed completely.
Evaluation criteria
A point system or weighting scheme is often used to evaluate optional or
desirable requirements. Weight might also be given to factors that are
not stated as part of the hardware or software requirements, such as a
vendor’s financial stability and good or bad previous experiences with a
vendor.
EVALUATING PROPOSALS
Determine the acceptability of each proposal
Each proposal is evaluated to determine whether it
meets the basic criteria, including essential
requirements, financial requirements, and deadlines.
Proposals that fail to satisfy minimal criteria in any
category are eliminated.
Rank acceptable proposals
The remaining proposals are ranked by evaluating the
extent to which they exceed minimal requirements.
Validate high-ranking proposals
A small subset of highly ranked proposals is then
chosen for validation. To validate a proposal, the
evaluator determines the correctness of vendor claims
and the vendor’s ability to meet commitments in the
proposal.
DETERMINING REQUIREMENTS AND
EVALUATING PERFORMANCE
Read through this section on pages 524-529.
SECURITY
Describes all measures for protecting the value of these investments,
including physical protection against equipment loss or damage and
and economic protection against loss of information’s value through
unauthorized disclosure.
A well-integrated approach:
Protect physical resources against accidental loss or damage.
Protect data and software resources against accidental loss or
damage.
Protect all resources against malicious tampering.
Protect sensitive software and data resources against
unauthorized access and accidental disclosure.
SECURITY (CONT. [1])
Commonly used security measures:
Physical security
Access controls
Password controls and security
Auditing
Virus protection
Software updates
Firewalls
PHYSICAL SECURITY
Access to computers and related equipment should be
restricted to prevent theft, tampering, and
unauthorized access.
A user enters a name or other identifier and a password to prove his or her identity.
The OS verifies the username and password by searching a local security database or
interacting with a security server.
Although password-based authentication is most common, other methods are often used
as supplements or alternatives for improved security.
ID cards with bar codes or embedded ROM chips can supplement passwords.
Biometric authentication methods are sometimes used instead of password-based
authentication.
These methods identify a person by using physical characteristics, such as
fingerprints, facial features, or retinas.
PASSWORD CONTROLS AND SECURITY
Because password-based authentication is so common, OSs
and security services use methods such as the following to
enhance it:
Restrictions on the length and composition of valid
passwords.
Requirements that passwords be changed periodically.
Analysis of password content to identify passwords that can
be guessed easily.
Encryption of passwords in files and during transmission
over a network.
With most OSs, the system administrator can create and
enforce password policies on a per-user, per-group or per-
system basis.
Locking out accounts after a specified number of failed log-on
attempts prevents unauthorized users from repeatedly
attempting to guess correct passwords for valid user accounts.
AUDITING
Creating and managing records of user activity or
resource access.
These records provide data to determine whether
the security policy has been implemented correctly
or whether resources or the system itself have
been compromised.
When auditing is enabled, the OS or security
service writes an entry to a log file each time an
audited action is performed.
This log entry includes information such as [1]
which ticket (user identification) was presented to
gain access; [2] access date and time.
AUDITING (CONT. [1])
Limitations:
Log files can grow quickly when auditing is enabled
for a large number of users, resources, actions, or
access types.
Variants:
Boot virus - attaches itself to code that runs when the system boots, such as a
BIOS or OS start-up routine.
Macro virus - Embedded in a macro stored in a desktop application file, such as
a spreadsheet or word-processing document.
Worm - stored in a stand-alone executable program and usually sent as an e-
mail attachment; runs automatically when the attachment is opened.
Viruses are commonplace and can perform many malicious acts, including damaging
or destroying important files, opening backdoors for potential hackers, and sending
sensitive information to others.
Types of fluctuations:
Momentary power surges or spikes (protect against power
surges with a surge protector).
Momentary power sags.
Long-term voltage sags.
Total loss of power (auxiliary power source, such as UPS).
HEAT DISSIPATION
Excessive heat can cause intermittent or total
failure of electrical circuits, so all computer
equipment needs some means of heat
dissipation.
Means of heat dissipation
Vents or fans on the computer itself
Cooling the room
Auxiliary cooling of cabinet
MOISTURE
Excessive moisture: danger of short circuits.
Low humidity: Buildup of static electricity.
Protective Measures:
Well-designed cabinets protect against spills
and leaks.
Mount hardware above floor level.
Control humidity with optional components of
heating, ventilation, and air conditioning
systems.
CABLE ROUTING
Provide protection and ease of access with:
Raised floors
The main purpose is to have an accessible location for
cables connecting different devices.
The flooring panels can be installed or removed from the
grid easily.
Cables are routed under walkway areas.