Premium Essay

New Networks

In:

Submitted By edblkmanmba14
Words 527
Pages 3
IT500 MOD 3
Information Security Continuous Monitoring
By Todd Crawley
July 28, 2015
Dr. Daniel Acquaah

This paper summary provides detailed information of the projects' purpose and what it actually accomplished. All commands within the Department of Defense (DoD) are directed to implement the Host-Based Security System (HBSS). This is a multifaceted software security application used within the DoD to protect vital network resources from exploitation. Protecting vital data on information systems by ensuring the information’s availability, integrity, authentication, confidentiality and non-repudiation is called Information Assurance (IA). The process used within the DoD to certify information systems meet documented IA requirements is known as the DIACAP process. The DIACAP process was established in order to comply with the Federal Information Security Management Act 2002 (FISMA).
The DIACAP directly supports and identifies the IA security tool, HBSS and fully implements those practices as prescribed in accordance with DoD I 8500.1M. All organizations within the DoD are mandated to comply with DoD I 8500.1M and Fragmentary Order (FRAGO) 13 to remain connected to the DoD’s GRID. This project envelops all applicable DIACAP processes necessary to obtain the accreditations for the Centrixs-M software application. This project outlines the process used to develop a complete set of HBSS policies for the Centrixs-M software application. The development phase of this project includes the site configuration within the ePO system tree, deployment of the McAfee agents, and the configuration of secure site as prescribed by FARGO 13, policy development, and validation testing of the newly created policies. One of the main reasons why this program is very important to me is in 2008, the United State Department of Defense suffered a significant compromise to

Similar Documents

Free Essay

New Media and Social Network

...people. The Internet offers numerous platforms to communicate with friends as well as developing new relationships with strangers. However, the effect of social networking sites on social relationships is a topic of many debates. There are multiple ways online interaction affects people, especially the youth of the society, both positively and negatively. Therefore, the studies done to examine the impact of the Internet on social relationships is definitely necessary and important. The article Use of Social Networking and Instant Messaging reports the study over the relationships between use of social media such as instant messaging and social networking sites, network size, and emotional closeness in a sample of 117 individuals between the ages of 18 and 63 years old. Participants were asked to list and categorize each member of their personal, offline network into a series of subgroupings, arranged in a hierarchically inclusive sequence. Each person was listed into one of the three layers of their network – the support group, the sympathy group, and the active network. Secondly, because quantity does not necessarily equal quality, the next step aimed at answering two questions: What effect does the use of social media have on the size of each offline network layer? And what effect does the use of social media have on the emotional closeness of relationships within each offline network layer? Therefore, in addition to some basic socio-demographic questions, participants were asked...

Words: 834 - Pages: 4

Premium Essay

New Technology Research for Network Systems Administration

...My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology; IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.” 802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands. SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it. WPA2- (Wi-Fi Protected Access II) is...

Words: 325 - Pages: 2

Premium Essay

Social Networks and Customer Involvement in New Service Development (Nsd)

...American tragedy”, Business Horizons, Vol. 24 No. 6, pp. 51-61. Blazevic, V. and Lievens, A. (2004), “Learning during the new financial service innovation process: antecedents and performance effects”, Journal of Business Research, Vol. 57 No. 4, pp. 374-91. Bowers, M.R. (1989), “Developing new services: improving the process makes it better”, The Journal of Services Marketing, Vol. 3 No. 1, pp. 15-20. Carbonell, P., Rodriquez-Escudero, A.I. and Pujari, D. (2009), “Customer involvement in NSP: an examination of antecedents and outcomes”, Journal of Product Innovation Management, Vol. 26, pp. 536-50. Carlile, P. (2001), “A pragmatic view of knowledge and boundaries: boundary objects in NPD”, Organization Science, Vol. 13 No. 4, pp. 442-55. Chesbrough, H.W. (2003), Open Innovation: The New Imperative for Creating and Profiting from Technology, Harvard Business School Press, Boston, MA. Christensen, C. (1997), The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail, Harvard Business School Press, Boston, MA. Cooper, R.G. and Kleinschmidt, E.J. (1994), “Determinants of timeliness in product development”, Journal of Product Innovation Management, Vol. 11 No. 5, pp. 381-96. Dahan, E. and Hauser, J. (2002), “The virtual customer”, Journal of Product Innovation Management, Vol. 19 No. 5, pp. 332-53. de Brentani, U. (1993), “The new product process in financial services: strategy for success”, International Journal of Bank Marketing, Vol. 11 No. 3, pp...

Words: 505 - Pages: 3

Free Essay

Jhfa Afsds

...Threaded discussion - A post and the series of messages replying to it • Hierarchies - Category information provided in the name of the newsgroup Newsgroups are categorized according to interest. The name of the newsgroup provides the category information, going from general to specific (left to right). For example, comp.lang.java.programmer is a newsgroup for Java programmers, in the Java section of the language category, which is part of the overall computer category • Big Eight - Usenet's original eight newsgroup categories Now, there are thousands of newsgroups in hundreds of categories, but Usenet originally divided newsgroups into one of eight major categories: comp (computers) humanities (arts and culture) misc (miscellaneous) news (news...

Words: 1148 - Pages: 5

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Premium Essay

Ipremier Case Study

...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...

Words: 967 - Pages: 4

Free Essay

Trending & Aggregation

... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...

Words: 1080 - Pages: 5

Free Essay

Help

... Although there are many agencies that have different approaches, human services rely on agencies that are most cost-efficient yet effective. Interoperability plays a major role in the future of human services. It is the “ability of two or more systems to exchange information and to use the information that has been exchanged” (Schoech, 2010). The three possible models for approaching interoperability in the human services are Loosely Linked Network Model, Network Model, and Top-Down Model. Human services emphasize in the importance of interoperability, as agencies collaborate with the same identified need to help others. Helping Hands Helping Hands Hawai’i manages numerous programs that benefit the people of Hawaii; this includes Behavioral Health Programs, Ready to Learn, Emergency Assistance Program and many more. Their mission is to support the community by improving the quality of people’s lives through the delivery of goods and services to those who are in need. For families and individuals, Helping Hands Hawaii is a new quality of life that overcomes the obstacles that block the way of meeting their full potential. This non-profit organization revenue from State agencies, grants from the local and national government and the Aloha United Ways. The annual donors that contribute to the agency helps the agency meet the growing needs of the local community of Hawaii (Helping Hands Hawaii, 2014). Model One: Loosely Linked...

Words: 869 - Pages: 4

Premium Essay

Network Infrastructure

...much growth is this network going to have to support? When planning for this, you want to make sure that the company is going to have room to grow, which may vary depending on the company. For example, Target is probably going to be a faster growing network than a local mom/pop shop. * Availability * How long your network is available to users. Basically: is your network and up and running all day, every day? * Network Performance * This includes categories that measure the throughput of data and how efficient your network actually is. (Optimum Utilization) * Security * Security design is one of the most important aspects of a network. Without proper security your network is vulnerable to online cyber attacks that can cripple and steal from your databases. * Manageability * This technical goal is going to vary based on company needs. Some customers are going to have more precise goals. The book talks about a company planning to record the number of bytes sent and received to each router. Other clients may have less specific goals than this, it just tends to vary based on company objectives. * Usability * Close to manageability, but different. Usability refers to people who are accessing and using the network you have setup. Your network needs to be easy to use for them (different from management. Easier To Use =/= Easier To Manage) * Adaptability * Design the network so that in can accept new technologies. Technology...

Words: 381 - Pages: 2

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...CIS 333 Week 10 Technical Project Paper – New 2015 http://homeworkfy.com/downloads/cis-333-week-10-technical-project-paper-new-2015/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves....

Words: 462 - Pages: 2

Premium Essay

Personal Responsibility Essay

...Personal Responsibility Essay According to Cisco’s new Visual Netwoking Index forecast, “Online video will be more popular than Facebook and Twitter by 2017”. Digital Media is a fast growing platform; I didn’t know anything about Digital Media until I started working with a YouTube Network. There are a lot of other online platforms out there such as Netflix, Hulu, Crackle, among others, but Youtube is the largest platform where independent content creators can share their work across the World and monetize their videos. Because YouTube showcases talented people who have channels, Networks started to come around in 2010/2011. I work as a Lead Recruiter for Brazil’s department of the largest Latin Network on YouTube, yet a startup company that started business in April 2012. Because it is a new company there are great opportunities for growth within the company, however, this business is very challenging due to competition. There are many other Networks around and 70% of channels across YouTube are already part of a Network. Even though the business I am in, most of the time depends on luck because it is all about sale and persuasion, I want to get a promotion in my current job and to make this happen, I will need to work really hard to exceed all my goals which are usually to bring to the network high number of monthly views. It is my personal responsibilities to either get a promotion at my current job or to find a new job, which will help me to advance in my career and to...

Words: 590 - Pages: 3

Free Essay

Cisco

...globally and manages their business by geography. As they strive for faster decision making with greater accountability and alignment to support they emerging countries and five foundational priorities, as discusses later, beginning in fiscal 2012, they organized their business into the following three geographic segment: - The Americas - Europe, Middle East, the Africa (“EMEA”) - Asia Pacific, Japan, and China (“APJC”) IN Fiscal 2011, Cisco organized their business into four segments: - United states and Canada - European Markets - Emerging Markets (eastern Europe, Latin America, the middle east and Africa and Russia and the commonwealth of independent states) - Asia Pacific Markets As part of Cisco business focus on the network as platform for all forms of communications and IT, their products and services are designed to help their customers use technology to address their business imperatives and opportunities – improving productivity and user experience, reducing costs, and gaining a competitive advantage – and to help them connect more effectively with their key...

Words: 727 - Pages: 3

Premium Essay

Aljazeera

...and the logo of the network is at the left side of the word, it's noticeable because it's written in a big font size and a special font style. A big network like Aljazeera need for sure to be updated frequently add on the argent news happening must be included in the website, the website has allot of parts and each part talks about a special kind of news for example the wither, sports, and watch live, those areas are a sensitive information's and must be updated as soon as an information is received to the network responsible employees, looking at the website Aljazeera didn’t miss that point at all, the information's are being updated frequently. At first the audience of Aljazeera was just Arab world, but at November 2006 Aljazeera English has been lunched the target audience after that is all the world with its deferent Taste and backgrounds Aljazeera nowadays gives almost all the news that each one around the world would need, it's almost nothing there you are not interested in. Aljazeera has no any obvious bias or slant to the information it has been always with the truth and human rights and it's taking it as a lead to its perfection, actually Aljazeera has an awards proofing that, and it's giving both sides Opinions which is fair enough. There are allot of information's are available in the websites and it could satisfy almost all the videos of the website, actually the website is sectioned in to the type of the news are provided there, and they are news(internationally with...

Words: 357 - Pages: 2

Free Essay

Mcitp Guide to Microsoft® Windows Server® 2008, Server Administration

...chapter 3 3.1 2. change system properties, View network connection, configure remote desktop 5. yes, go to windows firewall on the right side of the security information, never 15. window server techcenter. 17. Event viewer, Reliabilityand performance, Device performance. 3.2 7. overview of printer services, Migrate Print servers, Control Printer Driver security update printer Drivers, and resources for print management. 3.4 5. General- intel(R)82578DC Gigabit network Connection link speed- Link Speed and Duplex settings. Advanced- Advanced Adapter setting. Power Managemenet- Power Saver and Wake on LAN options Teaming- Adapter Teaming VLANs- Virtual LANs Driver- intel(R)82578DC Gigabit network Connection.basically updating drivers or uninstalling Details- intel(R)82578DC Gigabit network Connection, Details about the network adapter Resources - intel(R)82578DC Gigabit network Connection, Memory range and IRQ. 6. No conflics, Maybe update the driver or check if the network connction is ther or not. 3.5 2. /OFFBOORDIR= and /OFFWINDIR= 3.8 2. 16 GB 6. Automatically is checked off total paging size for all drivers min allowed : 16MB Recommended: 24474MB Currently Allocated: 16616MB. 3.10 4. user variable - TEMP %USERPROFILE%\AppData\Local\Temp TMP %USERPROFILE%\AppData\Local\Temp system variable- comSpec, Path,and others, Click New to add new variable 3.14 2. REG_SZ 3. REG_SZ, REG_DWORD, REG_DWORD...

Words: 464 - Pages: 2

Free Essay

Syllabus

...it is both my hope and expectation that you will complete this course with an understanding of network design and management.For me networking started with me completing my Bachelor of Science in Electronic Engineering Technology in 1988. I then went on to complete a Master of Science in Computer Science, from Illinois Institute of Technology in 1992.  In 2011, I completed my doctoral studies at Georgia State University. From about 1988 – Present, I have worked for various Telecommunication companies, such as, AT&T Bell Labs, Tellabs, Nortel, and Cisco Systems.  My most enjoyable position was designing fiber optic networks for many of the top tier ISP/Service Providers today.I love to play tennis; I wish that I could play tennis for a living. I play in KSWISS Men’s Single League, T2 Tennis, Peach Tennis and tournaments. I also love running at least three times a week. The other activities I enjoy, working on my computer, playing with my dog and enjoying the beautiful outdoors.If you every need to contact me, please give me a call or email me. We can setup a time that is convenient.  Please remember, I am here to help you not only complete the course, but also to be sure that you can master the concepts and skills that the course offers.  My contact information is listed in the syllabus. Thanks, Dr. Wright |   | Print This Page |   | | Course Text |   | Top-Down Network Design 3rd Edition by Priscilla Oppenheimer © 2011 Cisco Press | First Time Using VitalSource...

Words: 3071 - Pages: 13