Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Information And Technology Full NOTE CMP328

Rating
2.0
(1)
Sold
1
Pages
358
Grade
A+
Uploaded on
05-04-2025
Written in
2024/2025

It Is a exam based full note . It will help to prepare your exam and got excellent marks.

Institution
Course

Content preview

IT Architecture Notes
Fifth Semester



Full Note



By – Sampurna Ghimire

, Contents Page Number

Chapter -1 1-88
Introduction To IT Architecture


Chapter -2 89-143
Enterprise Architecture and Service
Oriented Architecture


Chapter-3 144-204
Business Architecture


Chapter-4 205-254
IT Infrastructure Architecture


Chapter-5 255-300
Security Architecture


Chapter -6 301-356
Cloud Architecture

, Chapter -1
Introduction To IT Architecture

Overview of IT System Security
IT System Security is the practice of protecting information technology
(IT) systems, networks, and data from cyber threats, unauthorized
access, damage, or theft. In today’s digital world, where businesses and
individuals rely heavily on technology, ensuring the security of IT
systems has become more important than ever. IT security involves
implementing measures to prevent cyberattacks, detect security
breaches, and respond effectively to minimize damage.

IT security is based on three fundamental principles, known as the CIA
Triad:

1. Confidentiality – Ensuring that sensitive information is accessible
only to authorized users.
2. Integrity – Protecting data from being modified, corrupted, or
destroyed by unauthorized parties.
3. Availability – Ensuring that IT resources and services are
available to authorized users whenever needed.

By maintaining these principles, IT security helps organizations
safeguard their critical assets, protect their reputation, and comply with
legal regulations.




1 | Page Prepared By – Sampurna Ghimire

, Importance of IT System Security

In the modern digital landscape, organizations face numerous
cybersecurity threats that can compromise sensitive data, disrupt business
operations, and lead to financial losses. Some key reasons why IT security
is important include:

1. Protection Against Cyber Threats – Cybercriminals constantly
develop new tactics to exploit vulnerabilities in IT systems. A strong
security framework helps prevent malware infections, hacking
attempts, and data breaches.
2. Safeguarding Sensitive Data – Businesses store confidential
information such as customer details, financial records, and
intellectual property. IT security ensures that this data remains
protected from unauthorized access or leaks.
3. Ensuring Business Continuity – Cyberattacks such as ransomware
can cripple an organization’s operations. Proper security measures
ensure that critical services remain operational, minimizing
downtime.
4. Building Trust with Customers – Consumers expect businesses to
protect their personal information. A security breach can damage a
company’s reputation and lead to loss of customer trust.
5. Regulatory Compliance – Governments and industry bodies have
introduced strict regulations to ensure data privacy and security.
Organizations must comply with laws like GDPR, HIPAA, and PCI
DSS to avoid legal penalties.
6. Financial Protection – Security incidents can result in huge
financial losses due to fines, lawsuits, and lost business
opportunities. Investing in IT security helps prevent costly data
breaches.




2 | Page Prepared By – Sampurna Ghimire

Written for

Institution
Course

Document information

Uploaded on
April 5, 2025
Number of pages
358
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$5.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
gammingnepalofficial
2.0
(1)

Reviews from verified buyers

Showing all reviews
7 months ago

The note is not full. I mean they are just ai generated answers to the topics. There are no practical examples, and implementations. All these answers are more generalized than the actual syllabus requirement,

2.0

1 reviews

5
0
4
0
3
0
2
1
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
gammingnepalofficial Nepal College Of Information And Technology
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
1
Last sold
7 months ago

2.0

1 reviews

5
0
4
0
3
0
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions