• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

12 – Architecture

“Advances in computing technology and the rapid evolution of mobile technologies are changing the way today’s computing systems are being used to meet ever more demanding business needs. Existing models of managing computing resources are quickly evolving to cloud computing- and service oriented-based architectures. A variety of new opportunities and competitive pressures are driving the trend toward these technologies. Corporate restructuring—mergers, acquisitions, and consolidations—requires the integration of disparate systems. Applications are being downsized from expensive mainframes and dedicated data centers to both public and private cloud-based architectures that are much more cost effective, scalable, and manageable. The explosion of electronic and mobile commerce is today’s biggest driver for developing new types of systems. How systems are designed can significantly influence system performance, usability, and maintenance.”  (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)

Objectives:

  • Distinguish between file server and client/server environments, contrasting how each is used in a LAN.
  • Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges.
  • Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security.

Topics:

From Modern Systems Analysis and Design:

12. Designing Distributed and Internet Systems
12.1. Client/Server Architecture
12.2. Cloud Computing
12.3. Internet Systems

From CISA:

3.3.7. Infrastructure Development / Acquisition Practices
3.3.7.1. Phases of Infrastructure Design
3.3.7.1.1. Architecture Review
3.3.7.1.2. Analysis and Design
3.3.7.1.3. Draft Functional Requirements
3.3.7.1.4. Vendor and Product Selection
3.3.7.1.5. Refine Functional Requirements
3.3.7.1.6. Proof of Concept
3.3.7.2. Planning Implementation of Infrastructure
3.3.8. Hardware/Software Acquisition
3.3.8.1. IS Auditor’s role in Hardware Acquisition3.3.9. System Software Acquisition
3.3.9.1. Request for Proposal (RFP)
3.3.9.2. Integrated Resource Management Systems
3.3.9.3. IS Auditors Role in Software Acquisition

From Secure Software Design

1.3. Security and Architectures
1.3.1. Monolithic Systems
1.3.2. 2-Tier
1.3.3. 3-Tier
1.3.4. N-Tier
1.3.5. Distributed Systems
1.3.6. Cloud

In this unit, plan to:

  • Participate in the class discussion thread
  • Read the assigned topics in CISA
  • Read the assigned topics in Secure Software Design
  • Read chapter 12 in Modern Systems Analysis and Design

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University