Premium Essay

Nt1310 Unit 3 Assignment 1

Submitted By
Words 463
Pages 2
Access-Control Policy (6.2.3)
Access to intellectual property is controlled because of business and security requirements (ISO, 2005 p. 60). Further, access to IP by DTK/MTK users is restricted in accordance to access control policy (11.6.1 p. 73). With this in mind, enforcement of an access control policy (ACP) ensures that only authorized DTK/MTK personnel access information to preserve its confidentiality, availability, and integrity. In closing, the Finman SLA should address access control measures to protect IP from illegal sharing; unauthorized use; retention without permission; and unapproved destruction.

First, Finman will ensure the following processes are in place before the start of the project to limit use of IP. To begin with, all DTK/MTK computer operating systems is controlled by a secure log-on. Additionally, authentication methods, such as username and password, will exist for all personnel working on the project. Furthermore, remote access authentication will limit use of IP. In closing, these standards will hinder unauthorized access to corporate IP. …show more content…
Interestingly, limiting sharing of IP primarily occurs on networks devices and servers. For instance, Finman will limit DTK/MTK personnel’s network and server access to reduce sharing of intellectual property. Also, similar to the asset management policy, the ACP encourages access to IP on a “need to know basis” prevent illegal sharing of corporate IP. Finally, these standards are possible because sensitive IP is segmented on computer systems and

Similar Documents

Premium Essay

Nt1310 Unit 3 Assignment 1

...Star One of the most common setup of networks is the “star topology”, being that every node within the network connects to a central network device. The central network device can be a hub, switch, or even a computer, and it also acts as a server to the nodes on the network. Some advantages to the star topology are the ease of adding another computer to the network and the networks continue to function normally when one network fails. The disadvantages are the cost is higher, the performance is determined by the central network device, and lastly if the central network device fails there is no back up so all networks fail. Bus The “Bus Topology” is a network setup in which each computer and network device are connected to a single cable. This type of setup is not good for large networks for many reasons. Some reasons are difficulty in troubleshooting individual devices and the entire network, the network can fail if the cable is damaged, and the more devices on the network slows down the entire network. In contrary to larger networks, this set up is perfect for smaller networks, because it requires less cable length and setting up the actual network is easier as well. Ring This network is mostly used in schools and offices, where the networks are smaller. In this setup the devices are connected to each other going in a circle shape, so that each packet must go around the circle until it reaches its destination. Data flows only in one direction at high speeds between...

Words: 297 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1

...The reason for this project is based on the high risk of processing and storing customer personal information that can lead to a data breach which can become a high financial loss to the company if gone undetected. Regulatory recommends that financial institutions implement data security to minimize attacks and to implement security controls in areas that process personal, confidential customer information (FDIC.gov, 2014). This project will help with unauthorized data use and also assist in protecting the information if they ever have a data breach. The company’s security methodologies were put in place with minimal security in mind when they first implemented the online website. Since there is confidential customer information stored internally, there is a need to encrypt the information in storage. The goals of this project are to make sure customer data is secured from unauthorized use but also in making sure the solution does not cause any outages. The solution must align with the business users and not interrupt the application processes already in place. It must not disrupt the data in storage or cause slowed response time when users are retrieving information. The project objectives are to analyze the environment and recommend an encryption methodology that will work with the existing databases. Users will not know that encryption is applied and only authorized security personnel will have access to the encryption keys. The main element is to make sure that the information...

Words: 708 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...3. The mechanism that is used to detect/avoid/correct data transmission collision in Layer 2 is called Carrier sense multiple access (CMSA). CMSA is a Media Access Control protocol that listens for signals (senses) on the network medium (carrier) before transmitting data. The rule is that only one device can transmit data at a time. Before a device begins to transfer data, CSMA will listen for any transmissions on the network. If CSMA notices there is a transmission, then CSMA will wait for that transmission to end in order to send a transmission. For Etherenet, Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is used. In CSMA/CD, CSMA uses collision detection when two devices notice that the network is clear and begins to transmit at the same time which causes a collision. The collision is detected, the signals are dropped, and each device will wait a random time using a back off algorithm to send each of their signals again. For, WiFi, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is used. In CSMA/CA, collisions are trying to be prevented beforehand. A device will use a backoff counter when the network is being used. If the network is clear when the backoff counter reaches 0, the device will transmit. If the network is still being used, the backoff counter will reset and repeat the process until the...

Words: 1270 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 1

...For be an architect we need a laptop computer powerful enough to support the demanding video and computational requirements necessary for course work, as well as adequate storage to accommodate new software releases that's why I will choose the option 2 because it has better characterics than the option 1.it has Intel Core i5 with 8GB Memory and 1TB Hard Drive and a nice design vreated by an excellent company making it a better option for an architecht because they need something fast and a lot of gb for save files those characterists doesn’t had the option 1. Also Windows is most definitely the historical favourite of most architectural offices, certainly in the UK. Although many companies are shifting over to the more design driven OS X, Windows operating systems are still very widely in use. One major advantage Windows is more software has been designed for Windows than any...

Words: 648 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...effects and it might cause in disturbance in the existing process of communication and etc., so these kind of situations has to closely watched for any kind of hacker intrusion from that vulnerable location apply other risk mitigations in the form of configuration changes or isolation. Credentials, an easy source for intruder: Almost most of the attacks will target to get the credentials of the user, so that, they no need to go through all the difficulties in finding out the ip address then look at the ports and all that stuff. Of the reported incidents in 2015 as per the report, 63% of proved date breaches involved weak, default or stolen passwords. These happen mostly in the Web application attacks, and the POS Intrusions. One simple thing that we ignore is that by maintaining static credentials, a user is luring the attacker for easy way of intrusion. Compare to other methodologies of hacking, a static password hacking is the easiest and most convenient way. Even by maintaining the password as instructed by the organization rules, like using the upper case, lower case and special character isn’t enough to protect if you are not making changes in the password over time. The catch and also reuse of capabilities is used in different scenes. It is used as a piece of exceedingly centered around attacks and furthermore in organized criminal groups. It is in the standard tool kit of criminal social activities alike. In reality, even distortion submitted with stolen portion card data...

Words: 584 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Let us take the example of a communication system. One would like to send 4 bits of data (a bit is a binary digit, which is simply a logic variable that accepts only two values: “0” and “1”). These 4 bits of data will correspond to 16 different possible levels (0000 to 1111). If we associate a number to each combination, then we will have 16 numbers from 0 to 15 (if using hexadecimal base, we have then the following digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F). The probability to have each of one of the digits is then 1/16. Let us assume that we connect a microphone to a digital system that will encore the different sound levels over 4 bits, or 16 levels (this is called quantization), then before any sound is recorded, one cannot know, a priori, what will be the value in bits of the data to be collected....

Words: 503 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Infect Windows based computers: Stuxnet, as previously stated, could infect networked and non-networked computers utilizing zero-day exploits and rootkits in multiple versions of the Microsoft Windows operating systems. Stuxnet would also “install[ing] signed drivers on Windows operating systems” (Mueller & Yadegari, 2012) that would make it appear as though it were produced and installed by a reliable software company which provided the means to escape detection by anti-virus software. 2. Check: Stuxnet would then identify whether the affected computer was in fact its target as a controller of industrial systems. 3. Update: If the infected computer was the intended target, Stuxnet would attempt to connect to the Internet where it would be able to receive updates. 4. Compromise: Stuxnet would then exploit zero-day vulnerabilities in the software of the industrial system’s logic controllers that had not previously been identified. 5. Control: Stuxnet would analyze the operations of the targeted system. The information that is gathered is then exploited to allow for the worm to control the physical layer of the industrial system. At this point, the worm would cause the centrifuges to spin at high speeds without slowing...

Words: 1263 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 1

...For example; ADC_Value = 980 which can be represented in binary as 1111010100. Upon right shifting this value we get 11110101 which makes 245 in decimal. On the receiving end, upon multiplying by 4, we get 980 which gets plotted. This technique produces a maximum error of +/-3 which is negligible. The ADC module converts the incoming values into a digital value and saves it in a dedicated register ADC10MEM. The value of this register is first copied into UCA0TXBUF (After being converted into 8-bit) in order to transmit it to the PC. It is kept in mind to clear the UCA0TXBUF and the Interrupt flag register each time after transmitting the value in order to ensure proper transmission of data. 6.4.2 TALKING TO PC 6.4.2.1 COM PORT A COM port, also...

Words: 808 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1

...ABOUT US Code01 is a full service advertising firm, specializing to meet all your business communication needs. We work with our clients to create and implement innovative solutions, utilizing all media to deliver targeted and effective communication. This could be in the form of a, Website, Company Profile Designing, Flash Video Multimedia Designing, Corporate Marketing Campaigns.....all kinds of online promotion activities. It is our philosophy that a design must not only have a specific 'look', but is also more importantly, a form of making a statement. Simply put, we are not in the business of making 'pretty pictures'. We build visual solutions that are suitable for your image and your target audience, making sure you succeed in projecting a lasting impression of your company's image on your targeted clientele. We offer a wide range of solutions to assist you in your critical business communications. Our unparalleled innovative graphic design skills and printing capability make us the provider of choice. To promote your business you may require a company brochure, product catalogue, company logo, literature, pamphlet, direct mailer, invitation card, CD-Rom video presentation, PowerPoint presentation, user's manual or things of that sort. We help you meet the ever-changing compliance requirements with unprecedented resources, for when the deadline is yesterday. For promoting your business on Web World you may require tools like a website, e-commerce web application, flash...

Words: 425 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1

...Communication Network The wireless communication network is different type of computer network that is not connected by wires, and is normally associated with a telecommunications network where the connection among the nodes are made without the using any wires [1]. The wireless telecommunications networks normally use some type of electromagnetic waves for the transmission of data or communication. 3.1.1 Types of Wireless Networks: Wireless PAN Wireless Personal Area Networks interconnect devices within a small area. For example, by using Bluetooth in create wireless PAN for interconnecting a headset to a cell phone. Fig: 3.1 Block diagram of WPAN Wireless LAN Wireless local area network is represented as a Wi-Fi technique or a Fixed Wireless Data Communication technique. Fixed Wireless Data implements technique point to point links among computers at two various locations, by the using microwave signals or laser beams above the line of sight paths. The connect two networks existing in two or more adjacent locations. Fig: 3.2 Wireless LAN structure...

Words: 1702 - Pages: 7

Premium Essay

Nt1310 Unit 3 Assignment 1

...To connect a projector to computer, begin by selecting the type of cable you will be using (HDMI, VGA or USB). HDMI (High Definition Multimedia Interface) provides an interface between any audio/video source, such as a set-top box, DVD player, or A/V receiver and an audio and/or video monitor, such as a digital television (DTV), over a single cable. VGA (Video Graphic Array) cable is used to connect an analog PC monitor to a PC or laptop. VGA cables utilize an HD15 connector to connect the monitor and PC/laptop. USB (Universal Serial Bus) allows a person to connect an electronic device to a computer, used mostly to connect computers to peripheral devices such as cameras, camcorders, etc. Newer projector may have a DVI connector or optical connector. Once you have chosen the appropriate cable and have connected it to the computer and projector, windows 7 should automatically detect the projector and begin searching for the correct device drivers. If Windows 7 cannot find the device driver for the projector, it will give the option to search the internet or to insert a manufactures disc with the device drivers on it. Once the device drivers are installed you are ready to use the projector with Windows 7. Now that Windows 7 is ready to work with the projector, there are options on how to display the image. Pressing the Windows key + P, you can select one of the four options that should appear on the screen. There is a “Computer only” option, which is the option were it displays...

Words: 516 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Make sure you activate it within 30 days and stay updated to get genuine products or soft wares from Microsoft Windows. After, you have installed Windows in your computer, check the status whether is it activated because some operating system like Windows 32-bit or Windows 62-bit will automatically activate Windows if you installed a genuine product. Activating Windows Go to 'Control Panel' and click System to activate and check your current status and proceed in order to activate your Windows or operating system. If your Windows is activated then, see the below example. Eg 1 : Windows is activated. Product ID: 0042625-OEM-8992662-00400 Eg 2: Windows is not activated. Activate Windows now. Product ID:...

Words: 570 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Ethernet and B-channel sides. There isoEthernet had some vendor support, due to the rapid adoption of Fast Ethernet it lost in the marketplace and the working group was disbanded. XIII. IEEE 802.10 Standard for Interoperable LAN/MAN Security (SILS) (Withdrawn). 1. IEEE 802.10 is a former standard for security functions that could be used in both local area networks and metropolitan area networks based on IEEE 802 protocols. 802.10 specifies security association management and key management, as well as access control, data confidentiality and data integrity. 2. Specifications for an interoperable data link layer security protocol and associated security services are provided by IEEE 802.10. The Secure Data Exchange (SDE) protocol is supported by an application layer Key Management Protocol (KMP) that establishes security associations for SDE and other security protocols. A security label option is specified that enables rule-based access control to be implemented using the SDE protocol. A method to allow interoperability with type-en-coded Medium Access Control (MAC) clients is also provided, as well as a set of managed object classes to be used in the management of the SDE sublayer and its protocol exchanges. 3....

Words: 1337 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 1

...Wireless Access An assessment of the wireless coverage was conducted with BT that resulted in uncovering 4 problematic areas at the following locations: downstairs in the Acoustics Lab, downstairs in open space conference room, and two overlapped upstairs in stack velocity area, causing the whole corner to be out. This issue has been resolved by tracing the cables and identifying the problematic ports. Once the appropriate ports were identified, BT added the WAPs back to the WLC. Going forward we will take these approaches: 1. Streamline the reactive support approach - network team (BT) and site IT are aligned with resolving these issues quickly 2. Working on proactive support approach – The network team (BT) is investigating additional monitoring capabilities to more proactively correct issues before users notice the problem. BT will be joining the call next Wednesday, February 21st, to address these capabilities. While this process is occurring the Site IT Team will conduct a weekly walkthrough of the facility, to monitor Wi-Fi issues. Intermittent Network Outages...

Words: 629 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Choose a series of lessons you decided to teach in order to promote pupil learning in a particular area of the curriculum. Write a detailed review of the process, explaining your choice of area, detailing what you wanted pupils to learn, justifying the pedagogical choices you made and describing how you implemented them, and finally analysing how successful that learning was. Remember that if you wrote about Maths in Assignment 1, you must write about Language in this assignment and vice-versa. Introduction The Curriculum for Excellence (CfE) places a clear emphasis on numeracy across learning. Mathematics plays a vital role in the progression of people’s lives. It is important to develop children’s ideas and knowledge within maths, and to...

Words: 4226 - Pages: 17