Enterprise Computing

Solve your problems or get new ideas with basic brainstorming

Get Started. It's Free
or sign up with your email address
Enterprise Computing by Mind Map: Enterprise Computing

1. What is Enterprise Computing?

1.1. Involves the use of computers in networks

1.2. Such as WANs and LANs

1.3. A series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures

2. Virtualization

2.1. Server virtualization

2.1.1. Divide a physical server logically into many virtual servers

2.2. Storage virtualization

2.2.1. Create a single logical storage device from many physical storage devices

3. High Availability, Scalability, and Interoperability

3.1. High-availability system: runs and performs tasks for at least 99 percent of the time

3.1.1. May include hot-swapping  and redundant components

3.2. Scalability: A measure of how well computer hardware, software, or an information system can grow

3.2.1. Increasing performance demands

3.3. Interoperability : The ability for an information system to share information with other information systems within an enterprise

4. Backup Procedures

4.1. Disaster recovery plan: A written plan describing the steps a company would take to restore computer operations in the event of a disaster

4.1.1. Emergency plan

4.1.2. Backup plan

4.1.3. Recovery plan

4.1.4. Test plan

5. Enterprise Storage

5.1. A strategy that focuses on the availability, protection, organization, and backup of storage in a company

6. Internet and Network Attacks

6.1. A firewall is hardware and/or software that protects a network’s resources from intrusion

6.2. - Operating system runs much slower than usual  - Available memory is less than expected - Files become corrupted - Screen displays unusual message or image - Music or unusual sound plays randomly - Existing programs and files disappear - Programs or files do not work properly - Unknown programs or files mysteriously appear - System properties change - Operating system does not start up - Operating system shuts down unexpectedly

6.3. - Computer Virus   - Worm - Trojan Horse - Rootkit

7. Types of Attacks

7.1. - Loss of confidentiality   - Loss of availability  - Loss of integrity

8. Enterprise Hardware

8.1. Allows large organizations to manage and store information and data using devices geared for: - Heavy use - Maximum availability - Maximum efficiency

8.2. RAID duplicates data and  implements duplication  in different ways

9. Steps of an Attack

9.1. 1. Probe for information 2. Penetrate any defenses 3. Modify security settings 4. Circulate to other systems 5. Paralyze networks and devices