3 – 3 Final Project Milestone Two: Hardware Components IT – 201 Computer Platform Technologies November 19 2017 Hardware requirements for Milleniads organization Milleniads hardware requirements for the smooth operation needed scanners webcams and microphones. The category forms the basis for media input devices required for both brochure production and communication. Also for backup of softcopy data from the computer's devices such as solid-state drives hard drives flash drives and optical drives that can be used to store information. For output devices printers can be used to produce the brochures already designed. The networking hardware to be used in the within Milleniads facility include devices such as routers networking cables switches and radio signal receptors. Besides the listed hardware additional hardware include desktop computers and laptops for specialized use. A few tablets may be acquired for outdoor demonstrations (Stalling 2000). Security considerations for the hardware The security of information portal. In conclusion safety of the organizations’ data and the overall safety of the institutions systems are essential to reduce cases of loss due to the annexation of delicate information by malicious agents. Security of the organizations' data comes through a series of mechanisms that may include protection of both the organizations' hardware and software specifications. Backing up of the data is necessary to prevent loss in cases of deletion. Reference Stallings W. (2000). Computer organization and architecture: designing for performance. Pearson Education India.C.S.V. Murthy. (2010). Computer Business Applications. Himalaya Pub. House.Krutz R. L. & Vines R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.Aceto G. Botta A. De Donato W. & Pescapè A. (2013). Cloud monitoring: A survey. Computer Networks 57(9) 2093-2115.Blakley B. McDermott E. & Geer D. (2001 September). Information security is information risk management. In Proceedings of the 2001 workshop on New security paradigms (pp. 97-104). ACM. [...]
In this module, you will submit your final project. Be sure to incorporate feedback from your instructor before submitting your final draft. Also, combine all of the previous milestones into one document and create critical elements V (Information Security) and VI (Future Considerations). To complete this assignment, review the Final Project Guidelines and Rubric document. Please Follow Rubics!!