“Advances in computing technology and the rapid evolution of mobile technologies are changing the way today’s computing systems are being used to meet ever more demanding business needs. Existing models of managing computing resources are quickly evolving to cloud computing- and service oriented-based architectures. A variety of new opportunities and competitive pressures are driving the trend toward these technologies. Corporate restructuring—mergers, acquisitions, and consolidations—requires the integration of disparate systems. Applications are being downsized from expensive mainframes and dedicated data centers to both public and private cloud-based architectures that are much more cost effective, scalable, and manageable. The explosion of electronic and mobile commerce is today’s biggest driver for developing new types of systems. How systems are designed can significantly influence system performance, usability, and maintenance.” (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)
Objectives:
- Distinguish between file server and client/server environments, contrasting how each is used in a LAN.
- Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges.
- Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security.
Topics:
From Modern Systems Analysis and Design:
12. Designing Distributed and Internet Systems
12.1. Client/Server Architecture
12.2. Cloud Computing
12.3. Internet Systems
From CISA:
3.3.7. Infrastructure Development / Acquisition Practices
3.3.7.1. Phases of Infrastructure Design
3.3.7.1.1. Architecture Review
3.3.7.1.2. Analysis and Design
3.3.7.1.3. Draft Functional Requirements
3.3.7.1.4. Vendor and Product Selection
3.3.7.1.5. Refine Functional Requirements
3.3.7.1.6. Proof of Concept
3.3.7.2. Planning Implementation of Infrastructure
3.3.8. Hardware/Software Acquisition
3.3.8.1. IS Auditor’s role in Hardware Acquisition3.3.9. System Software Acquisition
3.3.9.1. Request for Proposal (RFP)
3.3.9.2. Integrated Resource Management Systems
3.3.9.3. IS Auditors Role in Software Acquisition
From Secure Software Design
1.3. Security and Architectures
1.3.1. Monolithic Systems
1.3.2. 2-Tier
1.3.3. 3-Tier
1.3.4. N-Tier
1.3.5. Distributed Systems
1.3.6. Cloud
In this unit, plan to:
- Participate in the class discussion thread
- Read the assigned topics in CISA
- Read the assigned topics in Secure Software Design
- Read chapter 12 in Modern Systems Analysis and Design