Free Essay

Linux and Windows Server Critique

In: Computers and Technology

Submitted By jakuipers
Words 1833
Pages 8
Linux and Windows Server Critique
Team C
POS 420
June 25, 2012
Yevgeniy Tovshteyn

Linux vs. Windows
Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming.
Kudler Fine Foods Current Systems:
3 locations: La Jolla, Del Mar, and Encinitas
La Jolla
Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem
Del Mar
Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem
Encinitas
Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 56K modem
9 Access Databases: Customer, Inventory, Item, Order, Order Line, Store, Supplier, Tax Table, Tender.
It looks like they will need some type of Enterprise Server software and upgrades to their hardware for compatibility purposes.
Security
Overview of Windows Security
Windows security is used in many natural business settings. Windows Server incorporates features such as Encrypting File System (EFS), a feature allowing for encryption/decryption of files and algorithms as well as Access Management and Identity Protection, a feature that protects the policies and processes to control personal and private data. Windows Server uses networking security to combat viruses and provide network stability. Windows Server also uses secure messaging and collaborative solutions, such as SharePoint, for use when dealing with business partners (Adams, 2012).
Overview of Linux Security
Linux is an open platform allowing for users to add to the structure of the system. Strength in numbers helps Linux security in that security threats are often fixed right away and for all to see.
Why we choose Linux over Windows for Kudler Fine Foods, no system can ever be completely secure.
Network Administration
The total network size for the company is not that large, so administration of the network and the associated systems; including all the Point Of Sale (POS) terminals currently associated with the Novell 4.11 servers, Inventory Spreadsheet systems, and Winfax Pro systems; should not be a daunting task even remotely. But we also have to take into consideration that all the offices are severely restricted in their Internet connection speed by their 56k connections. This situation would demand a lightweight administration solution so as not to swamp their Internet connection with administration traffic.
On the Windows front a well-positioned possible contender for this would include Microsoft’s System Center Configuration Manager (SCCM) to monitor the health of the servers and the workstations, both POS and desktops (Microsoft, 2012). SCCM monitors the system specifics such as antivirus findings and software update status over the network remotely, and gives alerts if problems are found (Microsoft, 2012). SCCM can even monitor UNIX, Linux, and Apple systems integrated into a Windows network as well (Bake, 2008). If a total UNIX or Linux network is desired then a similar administration suite to consider has to be ServiceDesk Plus by ManageEngine (ManageEngine, 2012). This software tracks assets on the network and reports issues detected with system health to the administrators (ManageEngine, 2012). This software comes highly recommended by such successful companies in the computing technology field as Honda and Intel (ManageEngine, 2012). But it is a commercial Linux software package that I consider highly worth the cost for what it brings to the attainability of a healthy computer networking environment.
Performance
Kudler’s existing network is within the boundaries of each store. There are no connections to the other store locations at this time; however, that could be a future upgrade for the business. The network capabilities between Windows and Linux could be beneficial to Kudler. The Linux system has a simpler means of access between workstations than Windows. Using command lines in the terminal to allow real time editing is a useful source and there would be no need for expensive software or licenses. With Windows the methods of setting up other network devices is easier because you have the option of setting up a network via the installed network wizard. This is a tool that is very useful when you have inexperienced users. This process can be done manually as well; however, it is more time consuming and tedious. Linux has to be set up individually on each machine and does not have a wizard
Windows weakness is the expensive licenses, software, and timely updates. When updating Windows, each software application installed has to be updated individually. Linux can update all software at once automatically with no need for rebooting. Linux has a range of free software which lowers cost because you don’t need expensive licenses. Linux’s weakness is that most users are trained on the Windows system and many users may have to be trained on how to use the system.
Security
The Windows system requires antivirus software, spyware, firewalls, and constant updating to keep the system safe; however, this may cause the system to slow down and performance may not be sufficient. Windows also requires a separate firewall besides the one that is built-in because it does not check the outgoing traffic. Linux is vulnerable to viruses as well; however, these viruses are specifically built to attack a Linux system. The number of viruses Linux has is very low in comparison to the amount Windows has. This makes it easier and faster to fix. Hackers will try and attack the most popular of systems and that would be Windows. Windows viruses cause no harm to Linux systems; however, they can still be sent out via a Linux system and do harm to other Windows systems. Linux has antivirus software available to help when this occurs.
Performance
Kudler Fine Foods must take into account the compatibility of their current systems to include hardware and software when selecting either a Linux Red Hat server or Windows based server. The majority of their current systems are Windows based therefore an upgrade to new hardware and possibly software would need to be completed. The Linux server offers better performance because of the ability to process higher loads which include mirrored mirror logs, four volume mirror, merging snapshots and rollback, and thin provisioning with discard support (Red Hat, 2012). All of these allow the Linux Red Hat server to process quicker and more efficient. The Microsoft server is not as efficient when it comes to processing higher loads however it is still effective based on the environment. Microsoft Server 2012 includes a large variety of storage features which help the processing of data. Microsoft utilizes the storage stack method to increase efficiency. With the release of Server 2012 a company can utilize the multiple levels of storage to combine features to build a system based on the company needs. Microsoft is introducing a new file system called Resilient File System (ReFS) which maximizes the availability of data in an online operation (Microsoft, 2012). This is very helpful with the web based systems that are being used by Kudler Fine Foods.
Scalability is very important when it comes to the performance of a server. Kudler Fine Foods has three current locations however they may want to expand in the future. Red Hat Linux 6 supports up to 4,096 processors (Red Hat, 2012). Allowing this many processors gives the user the ability to expand the current system. Microsoft offers large scalability with the new ReFS file system. Kudler Fine Foods would not use the full functionality of either Microsoft or Red Hat so either one will work for their needs.
Programming Capabilities
Linux and Windows both support several ways of computer programming. The 1st way is that there is a scripting language that utilizes shell scripts. The 2nd way is having a high-level programming language to develop applications. Whichever way is selected, the capability to program translates into a better experience by letting the user use the system as they necessitate.
Similarities
While the ‘underside’ of both OS’s have a share of noteworthy variations, their ability to support various programming languages, scripting, as well as programs share a number of commonalities. Shell scripts support in both OS’s is one main field of similarity. Both OS’s support many types of shells, and many types of shell scripts. The shell script programmer just requires picking a scripting language supported on both systems to easily develop portable code, even though a few alterations might be needed for things like file support (Microsoft Corporation, 2012).
Differences
The variations between Linux and Windows are several as well as programming abilities is not any exclusion. The 1st main variation still exists in the file processing field; Linux wrestles files from the root, where Windows produces hierarchies depending on drives as well as other key elements. The management of the programmed files varies also with Linux continuing to look at application files just as if they were anther file in the tree - like text. Windows needs specific programs to read a lot of file types including the structure of this Microsoft Word report.
UNIX supports 3 key scripting languages related to the 3 key shells: the Bourne (sh), C (csh), and Korn (ksh) shells. In addition, UNIX also supports a command-line development atmosphere. Windows on the other hand supports the Windows Script Host (WSH) in the cmd.exe shell, and Windows development atmosphere as well as a UNIX-like development atmosphere having an add-on service.

References
Adams, F. (2012). Windows Server Security Features. Retrieved from http://www.ehow.com/list_7462530_windows-server-security-features.html
Bake, J. (2008). System Center Configuration Manager 2007: Managing Unix, Linux and Mac OS X. Retrieved from http://blogs.technet.com/b/johnbaker/archive/2008/08/18/system-center-configuration-manager-2007-managing-unix-linux-and-mac-os-x.aspx http://www.desktoplinux.com/articles/AT3307459975.html?regen=yes&display=yes (Mar. 27, 2003)
Microsoft. (2012). Windows Server 2012 Datasheet. Retrieved from http://www.microsoft.com/en-us/server
Microsoft (2012). Microsoft System Center 2012 Configuration Manager. Retrieved from https://www.microsoft.com/en-us/server-cloud/system-center/configuration-manager-2012.aspx
Red Hat. (2012). Detailed Summary of Benefits and Features. Retrieved from http://www.redhat.com
Ziff Davis Enterprise Holdings Inc. copyright © 1999-2011

Similar Documents

Premium Essay

Windows Server and Linux Critique

...Riordan’s Windows Server and Linux Critique Learning Team A POS/420 Date: Instructor: Riordan’s Windows Server and Linux Critique At the request of Riordan Manufacturing, Inc., the project team conducted a thorough review to compare the advantages and disadvantages of Windows Server and Linux. The recommendation of an operating system will ensure Riordan’s business operations continue with compatibility between all locations with the highest level of security, administration, networking, performance, and programmabilityimplemented. Security Although there are proponents everywhere for each type of operating system available on the market today, the focus of this project team, at the request of Riordan management, is to compare the security advantages and disadvantages of Windows Server and Linux. Windows Server Advantages. Windows Server has improved over the years in providing basic security provisions for administrators. Access to any system is extremely important to security professionals, such as domain name system (DNS), active directory domain services (AD), and access to web servers using Internet Information Services (IIS). DNS security extensions (DNSSEC) provide added security when a consumer is gaining access to a company’s website as well as how the company interacts...

Words: 1859 - Pages: 8

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...

Words: 2750 - Pages: 11

Free Essay

Linux and Windows Server Critique

...Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect •...

Words: 2469 - Pages: 10

Free Essay

Linux

...students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1),...

Words: 1560 - Pages: 7

Premium Essay

Unix/Windows Systems Review

...Unix/Windows Systems Review for Riordan Manufacturing Micah Gerber POS/420 December 21, 2012 Charles Mathieu Abstract Riordan Manufacturing is the leader in the plastic injection molding industry with facilities in both the United States and China. As a large global operation, having adequate systems in place to support the organization network and databases is of upmost importance. A critique which addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within Riordan Manufacturing will be completed by Team A. Areas to be addressed within the critique will cover security, administration, networking, performance, programmability, and reliability as it relates to UNIX or Linux and Microsoft Windows Server. Riordan Manufacturing currently has a combination of Unix and Windows servers which support the organization, however, the team will recommend that the organization standardize it’s systems to support one platform across the agency. Through this recommendation Riordan’s Manufacturing infrastructure will have one platform Security Review The histories of both Windows and UNIX security development have taken diametric paths. The Windows operating system (OS) is monolithic by design, which means that most of the features are integrated into a single unit and is located into the core of the OS. UNIX, on the other hand is based on the core of the operating systems residing in a distributed manner where...

Words: 1893 - Pages: 8

Premium Essay

Windows Server Proposal

...PropAdvwork Proposal University of Maryland University College Shiv LLC will greatly benefit from using Windows Server 2012 to manage their network. Windows Server 2012 brings great updates to security and functionality over past editions of Windows. In this proposal, the major areas I will cover are Active Directory, Group Policy, DNS, File Services, Remote Services, and WSUS (Windows Server Update Services). These major roles have features that will make Shiv LLC Company’s infrastructure run smoothly. Active Directory Shiv LLC will have sites across a large geographic location. Because of this, a regional domain model should be used. Domains will be broken down into where users are working. For example, currently Shiv LLC has three locations, Los Angeles, Dallas, and Houston. This means there will be three domains, representing each of these cities. This strategy will make sure the network can be maintained by regional administrators, who will only worry about users in their area of the network. With this style of deployment, it can be difficult to decide what will be the forest root domain. The main staff for the company is in two cities, Dallas and Houston. This makes it difficult to make one of these sites the forest root domain. To make this decision neutral, a dedicated forest root domain can be suggested. This domain will be created only to function as the forest root. It will not contain and users, except for service administrator accounts for the forest root....

Words: 466 - Pages: 2

Premium Essay

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...

Words: 2760 - Pages: 12

Free Essay

Linux

...Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux's share of the desktop market will increase? Why or why not? Linux is used proportionally due to the fact that we live in a Windows world. All of the name brand software applications like Office, Peachtree and QuickBooks are Windows based. I couldn’t imagine playing Call of Duty on Linux. Not saying it couldn’t happen. Without being said there is a huge demand to make Windows applications. The overall installation process for Linux is different. I won’t say difficult but different. Linux overall doesn’t have the virus issues that Windows tends to obtain. I know there are a ton of LIVE CD’s out there that is used for forensics, firewalls, backup and recovery. I have used a few of them in the past to recover partitions on hard drives unattainable by windows. I see windows becoming more and more of an online service in the future. If Microsoft goes this route, I can see users adapting to Linux just to avoid a big brother conspiracy. One thing that could also increase the usage of Linux might be those entities that are trying to implement technology with a tight budget. 2) What are some of the benefits of cloud computing? What are some of the drawbacks? Find an article about cloud computing online. Summarize and critique the article in your...

Words: 663 - Pages: 3

Premium Essay

Microsoft

... ©Copyright 2000, The Progress & Freedom Foundation. All rights reserved. TABLE OF CONTENTS EXECUTIVE SUMMARY iii I. INTRODUCTION 1 II. MICROSOFT’S OPERATING SYSTEM MONOPOLY 3 III. NEW MARKET DEVELOPMENTS 5 A. America Online/Netscape Merger 5 B. America Online/ Time Warner Merger 6 C. Linux 6 D. Information Appliances 6 E. Web-Based Computing 7 IV. ANTICOMPETITIVE ACTS: THE NETSCAPE BROWSER 8 A. Market Division Proposal 9 B. Exclusive Arrangements with Original Equipment Manufacturers (OEMs) 9 C. Exclusive Arrangements with Internet Access Providers (IAPs) 10 V. OTHER ANTICOMPETITIVE ACTS 12 A. Java 12 B. Intel 12 C. IBM 13 VI. HARM TO CONSUMERS 14 VII. ALTERNATIVE REMEDIES 16 A. Conduct Remedies 16 B. Structural Remedies 17 1. Functional Divestiture 18 2. Full Division Remedy 19 3. One-Time Licensing Auction 21 VIII. The Hybrid Structural Remedy 22 A. The Minimum Scope of the Windows Company 23 B. The Applications Company 24 C. Addition of Products into the Windows Companies 25 D. Other Operational Issues 26 1. Shareholders 26 2. Intellectual Property 27 3. Employees 27 4. Contracts 28 5. Pecuniary Assets and Investments 28 E. Measures to Preserve the Hybrid Structural Remedy 28 IX. BENEFITS OF THE HYBRID REMEDY 31 A. Operating Systems Competition 31 B. Competition in the...

Words: 15664 - Pages: 63

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...

Words: 5050 - Pages: 21

Premium Essay

Microsoft Antitrust

...The Microsoft Antitrust Case* by Nicholas Economides** Revised April 2, 2001 Abstract This paper analyzes the law and economics of United States v. Microsoft, a landmark case of antitrust intervention in network industries. The United States Department of Justice and 19 States sued Microsoft alleging (i) that it monopolized the market for operating systems of personal computers and took anti-competitive actions to illegally maintain its monopoly; (ii) that it attempted to monopolize the market for Internet browsers because such browsers would create competition for operating systems; (iii) that it bundled its browser (Internet Explorer) with Windows; and that it engaged in a number of other anti-competitive exclusionary arrangements with computer manufacturers, Internet service providers, and content providers attempting to thwart the distribution of Netscape’s browser. The District Court Judge found in most points for the plaintiffs and ordered the breakup of Microsoft into two companies, one with all the operating systems software, and one with all other products of the company. The District Court also imposed a number of severe restrictions on the business conduct of Microsoft. We analyze the economic issues related to liability. We also analyze the applicability and effectiveness of the remedies imposed by the District Court and contrast them with other potential remedies. * Forthcoming in Journal of Industry, Competition and Trade: From Theory to Policy (August 2001)...

Words: 17051 - Pages: 69

Free Essay

Cathbaz

...theories about so=ware engineering suggested by the history of Linux. I discuss these theories in terms of two fundamentally di:erent development styles, the “cathedral” model of most of the commercial world versus the “bazaar” model of the Linux world. I show that these models derive from opposing assumptions about the nature of the so=ware-debugging task. I then make a sustained argument from the Linux experience for the proposition that “Given enough eyeballs, all bugs are shallow”, suggest productive analogies with other self-correcting systems of selfish agents, and conclude with some exploration of the implications of this insight for the future of so=ware. 1 The Cathedral and the Bazaar Linux is subversive. Who would have thought even five years ago (1991) that a world-class operating system could coalesce as if by magic out of part-time hacking by several thousand developers scattered all over the planet, connected only by the tenuous strands of the Internet? Certainly not I. By the time Linux swam onto my radar screen in early 1993, I had already been involved in Unix and open-source development for ten years. I was one of the first gnu contributors in the mid-1980s. I had released a good deal of open-source so=ware onto the net, developing or co-developing several programs (nethack, Emacs’s vc and gud modes, xlife, and others) that are still in wide use today. I thought I knew how it was done. Linux overturned much of what I thought I knew. I had been preaching...

Words: 15545 - Pages: 63

Free Essay

Gestion de Log

...Projet de Fin d’Etudes Pour l’Obtention du Diplôme Master en Ingénierie Informatique et Internet Intitulé : Gestion et centralisation des logs avec leurs corrélations Présenté par : BENZIDANE KARIM Le, 06/07/2010 Encadrants : Moussaid Khaild , Faculté des Sciences, Casablanca Zoubir Sami , Crédit du Maroc, Casablanca Ouali Youness, Crédit du Maroc, Casablanca Membres du Jury : Mr Abghour, Faculté des Sciences, Casablanca Mr Bouzidi, Faculté des Sciences, Casablanca Mme Fetjah, Faculté des Sciences, Casablanca Année Universitaire 2009 / 2010 1 Remerciements J’adresse mon remercîment à Mr. Zoubir sami pour sa disponibilité et écoute ainsi de m’avoir accepté dans son département et m’avoir permis le choix du sujet. Je remercie également Mr. Youness OUALI pour ses valeureux conseils ainsi que son encadrement au cours de ce stage allant de la démarche du travail jusqu’au technique de déploiement. Je remercie également Mr Abderahim SEKKAKI pour nous avoir donnée l’opportunité d’acquérir ces connaissances, ainsi que tous les enseignants que j’ai eu au long de ces 2 années du Master. Un grand merci à mon encadrant Mr Moussaid pour son aide et conseil pour que ce stage soit réalisé et finalisé. Je tiens aussi à remercier toute l’équipe du plateau ou j’étais à CDM, pour leur aide afin de me fournir les informations nécessaires pour le bon déroulement du projet . Mes remerciements aux membres des jurys qui m’ont honoré en acceptant de juger ce travail. 2 Table des matieres Liste...

Words: 19106 - Pages: 77

Premium Essay

Termpaperwa

...MIS (Spring 2007) Information Systems Theory and Practice Professor: Professor Jason C.H. Chen, Ph.d. Class time: Tuesday (February 27 – June 16) E-mail: chen@jepson.gonzaga.edu URL: http://barney.gonzaga.edu/~chen Office: to be announced Office hour: to be announced and by appointment Required text: 1. Pearlson, K.E. and Saunders, C.S, Managing and Using Information Systems, Wiley, 2006 (3nd edition) 2. A package of Harvard Business School Case Studies Additional Readings and Cases: Class handouts as needed. Course Description and Goals This course is designed to provide the current and future managers with understanding and appreciation of the issues that are related to the organization’s information technology assets. The course is not to educate technical specialists, rather, it is to give students a managerial perspective on the use of, design of, and evaluations of information systems that exist in organizations today. The objective of this course is to prepare students to manage information services in both today’s and tomorrow’s environment with its managerial, social, political, ethical and global issues. Conduct of the Course All students are expected to read the assigned materials (text, end-of-chapter discussion board questions (DBQ) and Harvard Business School case studies- HBC) before coming to the class. Some days we will discuss the materials in the text book. You are expected to be prepared...

Words: 4164 - Pages: 17

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96