0% found this document useful (0 votes)
23 views

1.1.4 HWSW Deployment Strategies Chart - Overlay

Uploaded by

casumittayal2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

1.1.4 HWSW Deployment Strategies Chart - Overlay

Uploaded by

casumittayal2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

4.1 Introduction 4.2 Different Deployment Strategies 4.3 IT Components in a CBS (Core Banking Solution) Data Centre 4.

(Core Banking Solution) Data Centre 4.4 Configuration Management of IS Components 4.5 Hardening of Systems 4.7 Auditing IS Infrastructure Audit all hardware and software to assess
4.6 Risks and Controls in Deployment of IS Infrastructure

4.2.1 Centralised Approach 4.3.1 Application Solutions Components 4.4.1 Configuration Identification
Benefits: 4.3.2 Hardware Components and OS 4.4.2 Configuration Control
Resource Sharing 4.4.3 Configuration Status Reporting
Avoidance of duplication Core Banking Servers
Better security 4.4.4 Configuration Audit
Achieving economies of scale.
All data is at central level so it can be fully replicated for
higher availability and disaster recovery purposes.
Policy enforcements can be done at central level.
Security like patch management anti-virus
management etc. can be done at central level.

Disadvantages:
Single Point of Failure
Inflexibility
Increased dependence and vulnerability
Database Servers
4.2.2 Decentralised Approach
Benefits: Web Servers, Email, Anti-virus servers
Greater fit between systems and local needs Application Servers
Higher usage of computerised systems Storage
Faster system development
4.3.3 Network and Security Components
No single point of Failure
Reduced CAPEX
Disadvantages:

Core Routers
Core Switches
ISDN Routers
Top of Rack Ethernet Switch
Encryption Devices
ACS Server
Firewalls
Internet Router
Intrusion Detection and Protection Systems
Two Factor Authentication
Security Solutions
End-Point Security solutions.
4.3.4 Enterprises Management System Components
4.3.5 Environmental Components

You might also like