The abbreviation IT stands for information technology. As such, it includes mechanisms of data processing and the hardware and software necessary for it.
Classification of the term IT
IT stands between classical electrical engineering and modern computer science. It includes technical mechanisms for handling data, such as the acquisition, forwarding, storage and output of information. In today's world, IT is inextricably linked to electronic data processing, security, administration and technology.
We support you in setting up a company abroad and reduce your tax burden 100% legally.
- 100% legal
- Experts at your side
- Advice on tax optimization with holding company, foundation or asset managing limited liability company
The following sub-areas can be distinguished:
- Business IT: information processing in retail, insurance, banking and the stock exchange.
- Industrial IT: This IT area includes the linking of machines and the organization of production steps. Increasingly, this also involves crossing company boundaries (supply chain). Recently, IT has been seamlessly integrated into business processes. In this way, interfaces between machines and resource planning management develop.
- Communication IT : This refers to the use of telecommunications equipment in information technology.
- Entertainment IT : The use of IT in the context of video games and multimedia.
The IT architecture
The term IT architecture includes all infrastructures (for infrastructure definition), management instances and interfaces that are used to organize IT. These include, among others:
- Infrastructure: hardware, software, network connectivity, data, locations
- Management: load balancing, capacity allocation, data security, availability, protection against failures
- Interfaces: Integration of IT into organizational structures
An IT structure usually consists of two levels. On the one hand, it determines the basic structures on the basis of which information is processed. On the other hand, it defines rules that organize the dynamic interaction of data.
An IT architecture can be thought of as being similar to a development plan for a city. As a central guideline, this ensures the development and maintenance of urban infrastructure. It also ensures that operations run in an orderly fashion without consuming too many resources. Similarly, the IT architecture serves as a guideline for the design of IT systems and IT infrastructures.
IT infrastructure
An IT infrastructure comprises the entire hardware, software and network environment that is a prerequisite for the use of application software. It is subordinate to this (infra= under). The upper level cannot directly influence the functioning of the infrastructure. All planning remains at the infrastructure level.
Examples of IT infrastructures
- For the developer of an operating system, the computer is his IT -infrastructure. It can be used, but not directly influenced.
- For a software developer, the operating system is part of the infrastructure.
- For the end user, all applications installed on the computer are also part of the infrastructure.
Hardware as part of the infrastructure
At the hardware level, the IT infrastructure includes the computer at the workstation (memory, hard disk, network card, etc.).), the server and the network environment. It is the prerequisite for being able to use digital media inside and outside the company. This happens e.g. via a connection to the Internet.
The software as part of the infrastructure
Furthermore, all software belongs to the IT infrastructure, which is available to the employees on their workstation computers. This can be browsers, database management systems, billing software and the like. In addition, the IT software structure includes network services and servers, such as the Internet.B. File server, intranet, print server, mail server. The services are available not only to internal users, but also to external employees (VPN) and other external users.
It is in the interest of every IT manager to standardize the IT infrastructure. In this context, one speaks of consolidation . To achieve this, all parts of the infrastructure are interconnected. Merging servers, desktop workstations, databases, software and implementation strategies. This can make the existing infrastructure more efficient and flexible. Many companies are currently replacing local physical systems with virtual ones. These cloud systems are more cost-effective, more flexible and more secure than conventional IT infrastructures.
IT security
IT security encompasses the properties of information-processing systems that protect data against unauthorized access from the outside. The main basis of IT security management is the ISO/IEC 27000 series. In Germany, this is essentially in line with the IT Grundschtz (basic principles).
Dimensions of the security concept
In IT, data and information are considered worthy of protection. Access should only be possible for a few people. With reference to these authorized persons, one defines so-called protection goals. These are:
- Confidentiality: the data should be available only to the authorized users. This applies to access to stored data as well as to access to transmissions.
- Integrity: all changes to data must be documented.
- Availability: Data access must be possible within a defined time frame.
- Authenticity: the authenticity of objects must be verifiable.
- Bindingness: This is achieved by e.g. through signatures.
- Accountability: Individual actions must be attributable to specific users.
Operational measures for IT security
The measures for protecting IT infrastructures are manifold. Essentially, they include data backups, encryption, access controls and restricted user accounts.
Restricted user accounts:
The system administrator is authorized to make profound changes to the software. He has the necessary knowledge to optimize software architectures and ensure the smooth running of the system. For security reasons, all other users have only limited user rights.
Software updates:
Software is regularly updated to eliminate vulnerabilities. This is particularly important for programs that are connected to the Internet. Outdated programs can be more easily infiltrated by malware, which is why it is important to regularly download the latest updates. It is recommended to automate system updates. Outdated software that no longer receives support from the manufacturer should be uninstalled as a matter of principle. It becomes increasingly susceptible to attack over time.
Regular creation of backup copies:
It is very important to make regular backups. At least one copy of each important file must be available on a separate storage. Special backup software is used here, which regularly makes copies. Options being used include cloud solutions, additional computer centers and RAID systems.
Basically, the importance of the data is crucial for the saving frequency.
Antivirus software
When users download data from the Internet or from data carriers, they run the risk of downloading harmful data. Therefore, to prevent malware from entering the system, you should only open file attachments from senders you know. What's more, antivirus software helps detect pests before they pose a threat. It is important to update antivirus software regularly.