Analyzing Business And Technical Environments
After you've assembled a design team, the next design tools you need to assemble
are analyses of your organization's business and technical environments. An analysis of an organization's business environment defines how it organizes and manages its nontechnical resources, such as its products and customers, business structure, business processes, company strategies, and the information technology (IT) management organization. An analysis of an organization's technical environment defines how it organizes and manages its technical resources, such as its network architecture, hardware, software, technical standards, DNS environment (if applicable), and Windows NT environment (if applicable). Most often, your organization will have a business infrastructure or network already in place; it's up to you as an infrastructure designer to call on members of the design team to help you assemble documentation about these environments.
After you complete your infrastructure design, you should be prepared to test
70-291 Exam it in a test environment. A test environment is a simulation of your production environment that allows you to test parts of your Windows Server 2003 deployment, such as your Active Directory infrastructure design, without risk to your organization's network. To ensure the success of your organization's Windows Server 2003 deployment, your organization should establish a test environment.
By setting up your infrastructure design in a test environment, you can see how the design actually works and determine whether any changes are necessary for improvement. Setting up your design in a test environment is an invaluable tool in the development of an effective design.
Use of open designs. Security through obscurity generally doesn't work if it is the only security strategy. Security designs should use well-understood algorithms.
MCSE ExamWell-known algorithms have been examined by many security experts, and it is more likely that the flaws have been discovered and corrected. This does not mean that you should expose the security mechanisms in place for your organization, network, applications, and so on. It means that you should choose well-known algorithms and products that have been inspected by others and use generally accepted practices and principles. An example of this is to use IPSec for communication security or Kerberos for authentication, as opposed to using proprietary protocols.
by: endeavor03
The Benefits Of Using Promotional Products To Advertise Your Business Funding For Small Business Payday Loans Online - Instant Approval And Quick Cash Services Instant Cash Loans: Assists To Resolve Unpredictable Expenses Logo Graphic Designer: Sculpting The Future Of A Business Business Card Logo Design: Helps Spread The Word Organization Is The Key To Running A Real Estate Business Bmw Woodside Dealers Add Jamie Foxx To Their List Of Business Partners Postal Machines - What Are The Benefits And Drawbacks Of Leasing For Business Cheap Web Hosting - Options For Business Web Space Business Web Hosting - Expand Profits And Productivity Personal Loans: Reliable Cash Assistance To Support Various Needs Small Loans Without Credit Checks-get Cash For Short-term Purposes