
Fill This Form To Receive Instant Help
Words: 2081
Published: Jun 01, 2024
Abstract
This paper explores the roles of core technologies in an effective IT system and the responsibility of those who manage it. The articles, define the roles of technology by explaining its involvement in IT system. The introduction, research and results are intended to educate the writer on the core of IT Technologies.
There was a time when in order to make a phone call we had to go to a near payphone and insert a couple of coins. Another time, we had to go to the library and wait for a computer to be available in order to do assignments or work. Now, it all has changed, technology has advanced and evolved through the years. With the Wi-Fi revolution and how a simple visit to the local coffee shop can give you access to free Wi-Fi, it’s a great excuse to take technology everywhere you go. In order to understand technology in the IT system we have to examine the core foundations; Computer Programming, Computer Systems Administration, Information Security Analytics and Web Developing.
Computer Programming. For a computer to run a program effectively a series of commands or codes have to be executed. According to Encyclopedia N. (2017), when computer programming started, the use of a IBM punch cards was used to run codes. Then years later, programming languages where implemented such as C ++ and Java. Programming assists developers in building applications and programs that can help prevent computer breaches and detect and combat malware. For example, a fraud analyst has received raw data from a bank with a list of names, addresses, time and date and card numbers of debit cards. In order to organize it and find an easier method to compare it and match it to another list retrieved from a dump of stolen cards the analyst needs an efficient software tool. This is where programming comes in handy and a developer makes a programming language like Python, Ruby or Tableau that can easily help organize and match data.
Computer Systems Administration. A system administrator is responsible for the maintenance and operation of the computer systems in the work place (Sokanu). Any technical problem that occurs in a system the computer administrator will use their operations knowledge to fix it. For example, if an employee sends an email, but is not encrypted, the system administrator will notice that issue and place an encryption on that specific email. Another way the system administrator maintains the system is by updating and upgrading software.
Furthermore, system administrators deal with networks such as Wi-Fi and internet. The Wi-Fi connects to local area networks and the internet connects many local networks together. If either or is down, the system administrator must perform maintenance to support network availability (ONet O. 2018). These maintenances are very important due to network protocol requirement and constraints of accomplishing communication between computer servers, routers and other network devises (Techopedia).
Database Administrator. When an organization is dependent on one or more databases it’s important to have a database administrator (Techopedia). For organizations a database administrator is crucial because access to data has to be given to authorize personnel. As data consumption and usage rises the database administrator must be able to implement necessary changes to accommodate growth (Smullins, 2017). For example, a business analyst needs access to the bank data that holds information of all the customers that have applied to credit card for the past five years. This information will serve him as a lead list for prospect clients that may also want to apply for home mortgage loans. The analyst can’t just enter the database and get the information. The analyst must ask permission and once it’s granted the administrator will be able to transfer the authorize data to the analyst for use.
Information Security Analyst. Integrity, availability, authentication, confidentiality and nonrepudiation are the five terms associated with information assurance (Techopedia). An Information Security Analyst is in charge of protecting a company’s network systems. For example, a hacker wants to gain access to a company’s data and steal confidential customer information. In order to have access, that hacker needs to bypass firewalls and decode encrypted data. But because the Information Security Analyst has implemented a great firewall protection and a strong defense plan the hacker had no chance (Sokanu). Imagine if the company didn’t have a Security Analyst, how much data could’ve been stolen from the company? Even worst, how much money the company would’ve lost due to legal fees and investigations costs. Another important aspect of the Security Analyst is the fight against malware and viruses that penetrate the system. Security data breaches are increasing and hackers are using it to hold data ransom and demanding large sums of money. Security analyst work close with data base administrators and system administrator to protect the data and prevent hackers from stealing information.
Web Developer. Social media is not only to communicate with an old high school classmate or to find love. It’s also a way to promote a business, a personal skill and exposure. A Web Developer will program a code that tells a website how to function, (Sokanu). The developer makes it easy for the user to navigate the page and use various options like a shopping cart, contact information and blogs. Developing a website is not as simple as it sounds. The developer must lay out the vision of the customer, execute the mechanics of the website and run the site efficiently (Sokanu). For example, a customer may have a design in mind for the web page and gives specific instructions on the lay out. The customer wants a blog, a video tab where it shows the last three recent videos from his YouTube channel and forum to discuss relevant topics. The developer has to have all this details in mind in order to make the most efficient and reliable site possible. Most of this developer use programming languages such as HTML, JavaScript, SQL and C++ (Computer Science). Developers can work in different computing platforms such as PC, Mac, mobile, and SQL databases. There are different types of web developers; Front-End, Back-End, Full Stack and JavaScript developers (Sokanu). Each performing different tasks that will make a web development project complete.
Conclusion
In conclusion, Computer Programming, Computer Systems Administration, Information Security Analytics and Web Developing all come hand in hand. All require efficient methods of security, programming and development. In order to understand how the IT system works the core foundations must be understood in its entirety. The present and future is filled with technology advancement and it’s the role of the Cybersecurity expert to understand it and figure out ways to detect and prevent fraud and breaches.
References
Keep in mind: This sample was shared by another student.