SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
TECHNICAL INFORMATION ABOUT THE
UMS-X1
EDUCATIONAL SOLUTION
Automation for the Enterprise
OUTLINE
I. ITI TECHNICAL OVERVIEW
II. HOW IS THE UMS-X1 STRUCTURED
1. SOLUTION ARCHITECTURE
2. INFRASTRUCTURE
3. SECURITY
4. USAGE
III. WHAT UMS-X1 ENSURES
IV. Q&A
Presented By Internet Traders International S.A.R.L
ITI TECHNICAL OVERVIEW
ITI employs highly skilled NOC engineers with the
aim of deploying Systems on high performance
machines hosting client applications. These
applications run our client operations online;
therefore uptime, security, scalability and reliability
are critical in ensuring proper delivery of services.
Our 24/7 technical support and quality awareness
enables us to maintain our online business
reputation that is reflected by our clients, providing
them with highly sophisticated platforms to expand
their business and operations.
Solution
Architecture
Infrastructure
Security Usage
HOW IS THE UMS-X1 STRUCTURED?
The UMS-X1 Solution is hosted on Linux Operating
System( Red Hat Enterprise). The UMS-X1 is a Web
Application utilizing PHP(Server-side scripting) and
JavaScript (Client-side scripting) for code
development and HTML for design. As a browser-
based System, the UMS-X1 uses HTTP Requests to
transmit data, making it accessible to users on a
variety of client platforms, such as Linux, Macintosh,
and Windows.
1. SOLUTION ARCHITECTURE
….
Internet
Database Server
Scripting
Engine Scripts
Web Server
Database
Management
System
Client Tier
Middle Tier
Database Tier
Web Surfer
HTTP Request
The UMS-X1 is a database driven application built
around a three-tier architecture model:
Client Tier, usually web browser software that interacts
with the application.
Middle Tier, built on top of the database tier is the
complex middle tier which contains most of the
application logic and communicates data between the
other tiers.
Database Tier, consisting of the database management
system that manages the database containing the data
users create, delete, modify, and query.
2. INFRASTRUCTURE
The UMS-X1 Infrastructure is based on six essential Layers:
Load Balancer
Firewall
Application Servers
Clustering of Databases
Reporting Server
MySQL Server
LOAD BALANCER
The Load Balancer allows you to balance the load of requests across multiple
servers.
The servers will appear as one to the end user. This enables you to manage the
clustered network very easily and allow the clients the most efficient and quickest
way to access the data. To ensure the data on the servers is synchronized, the File
Synchronization feature will replicate the data on all servers automatically. Should
any of the servers or processes fail, the Failover feature will direct all the traffic to
the available servers. The Load Balancer will ensure your site and services are
always available to handle incoming connections.
50%
50%
Primary
Secondary
FIREWALL
• The Application Layer is protected by firewall designed to
secure applications from network and application-layer
attacks through an easy-to-manage and integrated
approach. The application firewall is a critical element in
delivering a complete application access and security
solution.
Application
Server
Web
Server
HTTP
Client Browser
APPLICATION SERVERS
• An application server is a software engine that delivers applications to client
computers or devices. Moreover, an application server handles most, if not all, of
the business logic and data access of the application (a.k.a. centralization). The
main benefit of an application server is the ease of application development, since
applications need not be programmed; instead, they are assembled from building
blocks provided by the application server.
• Application servers typically bundle middle tiers to enable applications to
intercommunicate with dependent applications, like Web servers, database
management systems, and chart/Reporting programs.
Desktop Machine
Laptop
User Interface Presentation Layer
Application Logic
Data Manager and MySQL
engine
Database Server
MYSQL SERVER
The MySQL® database has become the world's most popular open source database
because of its consistent fast performance, high reliability and ease of use.
The figure below illustrates what MySQL Server can provide us with:
CLUSTERING OF DATABASES
MySQL Cluster’s unique parallel fault tolerant architecture provides the
following benefits:
– 99.999%Availability provided by a fault tolerant architecture
– Cost Effective requiring less hardware, lower maintenance costs, and affordable licensing
compared to proprietary databases.
– High Performance which only an in-memory database can provide.
– Linear Scalability to incrementally scale your system without a high initial hardware
investment.
– Easy to administer reducing
your need to hire additional
database administrators.
– No Single Point of Failure
using a distributed node-based
architecture with fast
failover Hot Backups to back
up to system without
interruption.
– Automatic Fast Failover enabling
systems to automatically fail
over in less than a second.
Cluster
REPORTING SERVER
The reporting server hosts the Reporting Engine.
Since reporting bears heavy load on the system, it
is deployed on a separate server where the
queries will run and not affect the other servers.
Report Processing
Reporting Server
Data Processing
Security
MySQL Server
Database
Browser
INFRASTRUCTURE DIAGRAM
Application Server 1 Application Server 2 Application Server 3
Load Balancer
Firewall
Clustering
Management
Node
Database
Part 1
Database
Part 2
Database
Part 1
Database
Part 2
Replicated
Reporting
Server
www.ums-x1.com
No Public Access
Local Network
1
2
3
5
MySQL
Server
4
6
Clustering
Management
Node
Clustering of
Databases
3. SECURITY
Security of your mission critical Internet operations is of paramount
importance. ITI employs multiple levels of security to ensure that client data is
very secure and can be easily recovered from backups.
Security includes:
1. Data Security
2. Materiel Security
3. Network Security
ITI Lebanon staff handle security and audit reports and submit any
observations to relative personnel. Security and audit monitoring is a great
tool to spot errors and trace attackers. On one hand, it will guide the
employees to correct their mistakes. On the other hand, it will spot any
changes done due to any security breaches that might occur and take
corrective actions accordingly.
Authentication Vulnerability Assessment LogsNetwork Encryption
Security of your mission-critical Internet operations is of paramount importance. Multiple
levels of security are employed to ensure that only Data Center Operations Engineers are
physically allowed near your routers, switches, and servers. Security procedures are as
follows:
No Public Access: Public access to the data center is strictly forbidden.
Video Surveillance: Live video surveillance of the entire data center building is
monitored 24/7.
Onsite Security Personnel: Onsite security personnel monitor the data center building
24/7. Security personnel provide the first layer of security for entering the data center.
Military-Grade Pass Cards: Access to the data center is restricted to those who hold a
pass card. These pass cards control elevator access to restricted floors within the building.
Power: The data center gets power from commercial utility underground conduits with a
30-minute battery backup in the event of failure.
UPS Systems : The power systems are designed to run uninterrupted even in the
unlikely event of a total power outage.
Diesel Generator Systems - Our onsite diesel generator will automatically start in
the event of a power surge or power system failure.
MATERIEL SECURITY
The security policy is applied on all users who access the System/Network including
administrators, accountants, instructors and students.
The security policy provides maximum security by all types of vulnerabilities on any level
(interruption, interception or fabrication) on any broad category (hardware, software or
data)and assures the terms of confidentiality, integrity and availability.
A user policy documentation is handed to administrators and users to know their privileges.
Users are classified into groups related to their departments, their responsibilities and
status.
DATA SECURITY
No access is allowed to the
servers
Connecting directly to the
database, is not through the
application, but by
reconfiguring the firewall to
allow database access from
designated IP
Access is only granted on the
local network (private IP) to
the application servers
Network security threats – from Internet-born worms and
viruses to DDoS attacks, internal data losses, natural disasters
and terror-related risks – pose a multi-billion pound threat to
corporations. From secure server builds and security-tested OS
installations to a physically secure data centre and monitored
network, we take a multi-layered approach to keeping your
hosting operations reliable and secure.
1. 100% Availability
2. Connectivity: fully resilient and redundant network
infrastructure
3. Routing: Each packet is evaluated and sent over the best
route possible
4. Guaranteed Packet Delivery: To ensure network integrity
NETWORK SECURITY
MORE SECURITY…
• Path Security
The path to internal files in the web system is confidential. The address bar will be
hidden when the user is authenticated into the web system to avoid others memorizing
the path.
• Password Protected Directory
A user has to supply a username and password to pass through protected directories
where certain web system files exist. The usernames and passwords will be configured
into groups. Groups can be: administration, registrar, accounting, student affairs,
etc…Each staff member will have the username and password of his own group.
• Web System Authentication
A staff member will need to supply his own unique username and password to the web
system to authenticate him according to his privileges.
• Secure Transfer of data
When a user is sending his credentials through the internet, the transfer of information
will be secured using Secure Hypertext Transfer Protocol (HTTPS). This will disable any
hacker from stealing the credentials on the internet.
4. USAGE
Permission and security: UMS-X1 has a reliable permission system. The main
edge of this permission system is flexibility. The administration can easily
specify the restricted areas on the system. The administrators have access
according to the assigned role.
Administrator Management: The administration can manage the usage of the
system. Such as registration parameterization (setting criteria for registration: per
major, school, number of credits, etc…)
Accounts Management
Faculty Accounts Management
Adding / Editing / Enabling / Disabling
Resetting Grading System
Resetting Account Password
Students Accounts Management
Blocking / Unblocking
Staff Accounts Management
Adding / Editing / Enabling / Disabling
System Administrator:
Semester Management
Current Semester Administration
Pre-registration Period
Registration Start/End
Add/Drop Start/End
Withdrawal Start/End
Classes Start/End
Semester Start/End
Refund Percentage
Setting holidays
New Semester Creation
Semester Creation
Setting of Payment Dates
Course Offerings
Adding course offerings
Deleting course offerings
Setting type of offering
System Configurations
Schools
Majors
Contract Sheets
Courses
Course Prerequisites
Grades
Lists
Official Documents
Entrance Exams
Rooms
Registrar:
Applications Management
Data Verification
Entrance Exams
Official Documents
Major Selection
Curriculum Editing
ID issuance
Setting of Financial Aid
Forced Course Registration
Students Affairs
View Absence
View Grades
Incomplete Grades Management
Honor Lists
Official/Unofficial Transcripts
Contract Sheets (Curriculum)
Academic Withdrawal
Accounting Department
All tasks related to Payment Vouchers
All tasks related to Transactions
Special Permissions to debit or credit students’
accounts
Faculty Payroll
File Management: The files accessed are grouped into categories where the administrator
can set privileges. For example, a user might view data but cannot delete/modify. The
categories are divided into subcategories where handling of permissions will be limited to
page level.
WHAT UMS-X1 ENSURES
• UMS-X1 Maintenance
UMS-X1 Maintenance is the process of enhancing and optimizing, as well
as remedying defects that may be encountered in the UMS-X1. UMS-X1
maintenance involves changes to the software in order to correct defects
and deficiencies found during field usage as well as maintaining the
integrity of the database, file transfer client, and backups.
• UMS-X1 Scalability
Scalability ensures that the system can adapt to growing demands such as
being able to handle more users or a larger number of enquiries and
transactions, and to have the capability to meet peak demand periods
without introducing unacceptable delays for processing queries.
• UMS-X1 Availability
High availability is a primary and critical requirement. It means that the
system must be up and running 24/7 with no downtime. The system must
be able to recover immediately from any failure situation, from software
bugs to hardware crashes. This means that there must also be fast failover,
so that other operating nodes will continue to process requests seamlessly.
Presented By Internet Traders International S.A.R.L
Presented By Internet Traders International S.A.R.L

Contenu connexe

Tendances

SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platformabelsonp
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical OverviewAmit Gatenyo
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...David Wallom
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 

Tendances (20)

SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
Enea Element Datasheet
Enea Element DatasheetEnea Element Datasheet
Enea Element Datasheet
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical Overview
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 

En vedette

LeadGen - Multipurpose Marketing Landing Page Pack with Page Builder
LeadGen - Multipurpose Marketing Landing Page Pack with Page BuilderLeadGen - Multipurpose Marketing Landing Page Pack with Page Builder
LeadGen - Multipurpose Marketing Landing Page Pack with Page BuilderLinkSture Technologies Pvt. Ltd.
 
Opportunity presentation
Opportunity presentationOpportunity presentation
Opportunity presentationFelix Noreiga
 
The Zebra Digital Story
The Zebra Digital StoryThe Zebra Digital Story
The Zebra Digital StorySumukh Vishve
 
The Satoshie Nakamoto Circus Sideshow
The Satoshie Nakamoto Circus SideshowThe Satoshie Nakamoto Circus Sideshow
The Satoshie Nakamoto Circus SideshowJudd Bagley
 
Flan de almendras en microondas
Flan de almendras en microondasFlan de almendras en microondas
Flan de almendras en microondasCrisitina Medina
 
The Zebra Digital Story
The Zebra Digital StoryThe Zebra Digital Story
The Zebra Digital StorySibu Sahu
 
The employment Interview as the only method of assessment
The employment Interview as the only method of assessmentThe employment Interview as the only method of assessment
The employment Interview as the only method of assessmentRodrigo Lizardo
 
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda OrígenesOlmeda Orígenes
 
Analiza industriei de IT din Romania
Analiza industriei de IT din RomaniaAnaliza industriei de IT din Romania
Analiza industriei de IT din RomaniaConstantin Magdalina
 
PRWeek Student of the Year Entry Kit
PRWeek Student of the Year Entry KitPRWeek Student of the Year Entry Kit
PRWeek Student of the Year Entry Kitacohenhnk
 
9789740332732
97897403327329789740332732
9789740332732CUPress
 

En vedette (14)

LeadGen - Multipurpose Marketing Landing Page Pack with Page Builder
LeadGen - Multipurpose Marketing Landing Page Pack with Page BuilderLeadGen - Multipurpose Marketing Landing Page Pack with Page Builder
LeadGen - Multipurpose Marketing Landing Page Pack with Page Builder
 
Opportunity presentation
Opportunity presentationOpportunity presentation
Opportunity presentation
 
Blog Funnels
Blog FunnelsBlog Funnels
Blog Funnels
 
The Zebra Digital Story
The Zebra Digital StoryThe Zebra Digital Story
The Zebra Digital Story
 
The Satoshie Nakamoto Circus Sideshow
The Satoshie Nakamoto Circus SideshowThe Satoshie Nakamoto Circus Sideshow
The Satoshie Nakamoto Circus Sideshow
 
Flan de almendras en microondas
Flan de almendras en microondasFlan de almendras en microondas
Flan de almendras en microondas
 
The Zebra Digital Story
The Zebra Digital StoryThe Zebra Digital Story
The Zebra Digital Story
 
Common mistakes in UI/UX
Common mistakes in UI/UXCommon mistakes in UI/UX
Common mistakes in UI/UX
 
The employment Interview as the only method of assessment
The employment Interview as the only method of assessmentThe employment Interview as the only method of assessment
The employment Interview as the only method of assessment
 
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes
#Olmedatelier: Scrambled eggs with Chistorra and potatoes chips Olmeda Orígenes
 
Analiza industriei de IT din Romania
Analiza industriei de IT din RomaniaAnaliza industriei de IT din Romania
Analiza industriei de IT din Romania
 
PRWeek Student of the Year Entry Kit
PRWeek Student of the Year Entry KitPRWeek Student of the Year Entry Kit
PRWeek Student of the Year Entry Kit
 
Alexander ponce peña
Alexander ponce peñaAlexander ponce peña
Alexander ponce peña
 
9789740332732
97897403327329789740332732
9789740332732
 

Similaire à University Management System - UMS-X1 Technical Data

Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network SecurityMithilDoshi1
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wstawill4468
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wstawill4468
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATIONwill4468
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 

Similaire à University Management System - UMS-X1 Technical Data (20)

Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wsta
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wsta
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATION
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 

Dernier

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

University Management System - UMS-X1 Technical Data

  • 1. TECHNICAL INFORMATION ABOUT THE UMS-X1 EDUCATIONAL SOLUTION Automation for the Enterprise
  • 2. OUTLINE I. ITI TECHNICAL OVERVIEW II. HOW IS THE UMS-X1 STRUCTURED 1. SOLUTION ARCHITECTURE 2. INFRASTRUCTURE 3. SECURITY 4. USAGE III. WHAT UMS-X1 ENSURES IV. Q&A Presented By Internet Traders International S.A.R.L
  • 3. ITI TECHNICAL OVERVIEW ITI employs highly skilled NOC engineers with the aim of deploying Systems on high performance machines hosting client applications. These applications run our client operations online; therefore uptime, security, scalability and reliability are critical in ensuring proper delivery of services. Our 24/7 technical support and quality awareness enables us to maintain our online business reputation that is reflected by our clients, providing them with highly sophisticated platforms to expand their business and operations.
  • 5. The UMS-X1 Solution is hosted on Linux Operating System( Red Hat Enterprise). The UMS-X1 is a Web Application utilizing PHP(Server-side scripting) and JavaScript (Client-side scripting) for code development and HTML for design. As a browser- based System, the UMS-X1 uses HTTP Requests to transmit data, making it accessible to users on a variety of client platforms, such as Linux, Macintosh, and Windows. 1. SOLUTION ARCHITECTURE …. Internet Database Server Scripting Engine Scripts Web Server Database Management System Client Tier Middle Tier Database Tier Web Surfer HTTP Request The UMS-X1 is a database driven application built around a three-tier architecture model: Client Tier, usually web browser software that interacts with the application. Middle Tier, built on top of the database tier is the complex middle tier which contains most of the application logic and communicates data between the other tiers. Database Tier, consisting of the database management system that manages the database containing the data users create, delete, modify, and query.
  • 6. 2. INFRASTRUCTURE The UMS-X1 Infrastructure is based on six essential Layers: Load Balancer Firewall Application Servers Clustering of Databases Reporting Server MySQL Server
  • 7. LOAD BALANCER The Load Balancer allows you to balance the load of requests across multiple servers. The servers will appear as one to the end user. This enables you to manage the clustered network very easily and allow the clients the most efficient and quickest way to access the data. To ensure the data on the servers is synchronized, the File Synchronization feature will replicate the data on all servers automatically. Should any of the servers or processes fail, the Failover feature will direct all the traffic to the available servers. The Load Balancer will ensure your site and services are always available to handle incoming connections. 50% 50% Primary Secondary
  • 8. FIREWALL • The Application Layer is protected by firewall designed to secure applications from network and application-layer attacks through an easy-to-manage and integrated approach. The application firewall is a critical element in delivering a complete application access and security solution. Application Server Web Server HTTP Client Browser
  • 9. APPLICATION SERVERS • An application server is a software engine that delivers applications to client computers or devices. Moreover, an application server handles most, if not all, of the business logic and data access of the application (a.k.a. centralization). The main benefit of an application server is the ease of application development, since applications need not be programmed; instead, they are assembled from building blocks provided by the application server. • Application servers typically bundle middle tiers to enable applications to intercommunicate with dependent applications, like Web servers, database management systems, and chart/Reporting programs. Desktop Machine Laptop User Interface Presentation Layer Application Logic Data Manager and MySQL engine Database Server
  • 10. MYSQL SERVER The MySQL® database has become the world's most popular open source database because of its consistent fast performance, high reliability and ease of use. The figure below illustrates what MySQL Server can provide us with:
  • 11. CLUSTERING OF DATABASES MySQL Cluster’s unique parallel fault tolerant architecture provides the following benefits: – 99.999%Availability provided by a fault tolerant architecture – Cost Effective requiring less hardware, lower maintenance costs, and affordable licensing compared to proprietary databases. – High Performance which only an in-memory database can provide. – Linear Scalability to incrementally scale your system without a high initial hardware investment. – Easy to administer reducing your need to hire additional database administrators. – No Single Point of Failure using a distributed node-based architecture with fast failover Hot Backups to back up to system without interruption. – Automatic Fast Failover enabling systems to automatically fail over in less than a second. Cluster
  • 12. REPORTING SERVER The reporting server hosts the Reporting Engine. Since reporting bears heavy load on the system, it is deployed on a separate server where the queries will run and not affect the other servers. Report Processing Reporting Server Data Processing Security MySQL Server Database Browser
  • 13. INFRASTRUCTURE DIAGRAM Application Server 1 Application Server 2 Application Server 3 Load Balancer Firewall Clustering Management Node Database Part 1 Database Part 2 Database Part 1 Database Part 2 Replicated Reporting Server www.ums-x1.com No Public Access Local Network 1 2 3 5 MySQL Server 4 6 Clustering Management Node Clustering of Databases
  • 14. 3. SECURITY Security of your mission critical Internet operations is of paramount importance. ITI employs multiple levels of security to ensure that client data is very secure and can be easily recovered from backups. Security includes: 1. Data Security 2. Materiel Security 3. Network Security ITI Lebanon staff handle security and audit reports and submit any observations to relative personnel. Security and audit monitoring is a great tool to spot errors and trace attackers. On one hand, it will guide the employees to correct their mistakes. On the other hand, it will spot any changes done due to any security breaches that might occur and take corrective actions accordingly. Authentication Vulnerability Assessment LogsNetwork Encryption
  • 15. Security of your mission-critical Internet operations is of paramount importance. Multiple levels of security are employed to ensure that only Data Center Operations Engineers are physically allowed near your routers, switches, and servers. Security procedures are as follows: No Public Access: Public access to the data center is strictly forbidden. Video Surveillance: Live video surveillance of the entire data center building is monitored 24/7. Onsite Security Personnel: Onsite security personnel monitor the data center building 24/7. Security personnel provide the first layer of security for entering the data center. Military-Grade Pass Cards: Access to the data center is restricted to those who hold a pass card. These pass cards control elevator access to restricted floors within the building. Power: The data center gets power from commercial utility underground conduits with a 30-minute battery backup in the event of failure. UPS Systems : The power systems are designed to run uninterrupted even in the unlikely event of a total power outage. Diesel Generator Systems - Our onsite diesel generator will automatically start in the event of a power surge or power system failure. MATERIEL SECURITY
  • 16. The security policy is applied on all users who access the System/Network including administrators, accountants, instructors and students. The security policy provides maximum security by all types of vulnerabilities on any level (interruption, interception or fabrication) on any broad category (hardware, software or data)and assures the terms of confidentiality, integrity and availability. A user policy documentation is handed to administrators and users to know their privileges. Users are classified into groups related to their departments, their responsibilities and status. DATA SECURITY No access is allowed to the servers Connecting directly to the database, is not through the application, but by reconfiguring the firewall to allow database access from designated IP Access is only granted on the local network (private IP) to the application servers
  • 17. Network security threats – from Internet-born worms and viruses to DDoS attacks, internal data losses, natural disasters and terror-related risks – pose a multi-billion pound threat to corporations. From secure server builds and security-tested OS installations to a physically secure data centre and monitored network, we take a multi-layered approach to keeping your hosting operations reliable and secure. 1. 100% Availability 2. Connectivity: fully resilient and redundant network infrastructure 3. Routing: Each packet is evaluated and sent over the best route possible 4. Guaranteed Packet Delivery: To ensure network integrity NETWORK SECURITY
  • 18. MORE SECURITY… • Path Security The path to internal files in the web system is confidential. The address bar will be hidden when the user is authenticated into the web system to avoid others memorizing the path. • Password Protected Directory A user has to supply a username and password to pass through protected directories where certain web system files exist. The usernames and passwords will be configured into groups. Groups can be: administration, registrar, accounting, student affairs, etc…Each staff member will have the username and password of his own group. • Web System Authentication A staff member will need to supply his own unique username and password to the web system to authenticate him according to his privileges. • Secure Transfer of data When a user is sending his credentials through the internet, the transfer of information will be secured using Secure Hypertext Transfer Protocol (HTTPS). This will disable any hacker from stealing the credentials on the internet.
  • 19. 4. USAGE Permission and security: UMS-X1 has a reliable permission system. The main edge of this permission system is flexibility. The administration can easily specify the restricted areas on the system. The administrators have access according to the assigned role.
  • 20. Administrator Management: The administration can manage the usage of the system. Such as registration parameterization (setting criteria for registration: per major, school, number of credits, etc…)
  • 21. Accounts Management Faculty Accounts Management Adding / Editing / Enabling / Disabling Resetting Grading System Resetting Account Password Students Accounts Management Blocking / Unblocking Staff Accounts Management Adding / Editing / Enabling / Disabling System Administrator: Semester Management Current Semester Administration Pre-registration Period Registration Start/End Add/Drop Start/End Withdrawal Start/End Classes Start/End Semester Start/End Refund Percentage Setting holidays New Semester Creation Semester Creation Setting of Payment Dates Course Offerings Adding course offerings Deleting course offerings Setting type of offering System Configurations Schools Majors Contract Sheets Courses Course Prerequisites Grades Lists Official Documents Entrance Exams Rooms Registrar: Applications Management Data Verification Entrance Exams Official Documents Major Selection Curriculum Editing ID issuance Setting of Financial Aid Forced Course Registration Students Affairs View Absence View Grades Incomplete Grades Management Honor Lists Official/Unofficial Transcripts Contract Sheets (Curriculum) Academic Withdrawal Accounting Department All tasks related to Payment Vouchers All tasks related to Transactions Special Permissions to debit or credit students’ accounts Faculty Payroll File Management: The files accessed are grouped into categories where the administrator can set privileges. For example, a user might view data but cannot delete/modify. The categories are divided into subcategories where handling of permissions will be limited to page level.
  • 22. WHAT UMS-X1 ENSURES • UMS-X1 Maintenance UMS-X1 Maintenance is the process of enhancing and optimizing, as well as remedying defects that may be encountered in the UMS-X1. UMS-X1 maintenance involves changes to the software in order to correct defects and deficiencies found during field usage as well as maintaining the integrity of the database, file transfer client, and backups. • UMS-X1 Scalability Scalability ensures that the system can adapt to growing demands such as being able to handle more users or a larger number of enquiries and transactions, and to have the capability to meet peak demand periods without introducing unacceptable delays for processing queries. • UMS-X1 Availability High availability is a primary and critical requirement. It means that the system must be up and running 24/7 with no downtime. The system must be able to recover immediately from any failure situation, from software bugs to hardware crashes. This means that there must also be fast failover, so that other operating nodes will continue to process requests seamlessly.
  • 23. Presented By Internet Traders International S.A.R.L
  • 24. Presented By Internet Traders International S.A.R.L