Free Essay

Technical Data Controller

In:

Submitted By normanhaughton
Words 788
Pages 4
N&H Investments Inc. March 12, 2012 To: David Maybach, Director IT security From: Norman Haughton, IT Security Analyst Subject: Progress of the ‘’Web Security Two-­‐Factor access‘’ Project at N&H Investments Dear Mr. Maybach, In keeping with our corporate objective of being Canada’s most secure financial institution, I must report that the progress of the “two-­‐factor” security access system is underway at a steady pace. We are currently looking at different hardware and software systems analyzing their cost versus benefits, and usability. The project is forecasted to be on time with the final details of the findings being ready for April 4, 2012.

Background: As per your request, I am in the process of completing a feasibility study on new types of “two-­‐factor” security access for our customers. I strongly recommend such a system in our world of online piracy and identity theft. According to Criminal Intelligence Service Canada, banking information and passwords are listed as some of the most commonly targeted data for online pirates. The study also finds that 1 in 2 Canadians feel that their personal information is not adequately protected by computer systems (Criminal Intelligence Services Canada, 2008). In 2008 Phonebusters reported 12,142 claims on identity theft, which amounted to losses over $9.5 million dollars in Canada (Stolen Identity, 2009). With these facts, I support the initiative of increasing our web security measures, and will use all the resources available to achieve our target of implementation by the end of 2012. I am currently completing impact studies on your hardware device proposed (token with changing codes every 60 seconds). I suggested a keychain type, due to the ergonomics and ease of use. I also formulated an idea for a new “two-­‐factor” software identification system, that asks for your login username and password but also tracks users’ last transactions. The software will ask intuitive questions based on previous account activities during high-­‐risk transactions. The concepts were tendered for bidding and I authorized a budget for this project from our ‘’innovations” allotment for the financial year. On completion of the designs, the products will be tested by a focus group that will be providing us insight on the products and personal relevance of tighter security measures when using online banking tools.

N&H Investments Inc.

Work completed: On February 25, 2012, I tendered a contract for bidders to propose designs for a keychain card with an electronic interface, which gives a pin-­‐ code that changes once every 60 seconds. On February 27, 2012 I submitted a request to a local statistical company to gather a diverse “focus group.” The group will give insight on tighter security measures, and the ergonomics of a keychain card access code device. On February 28, 2012, I tendered a contract to 5 software developers. Details of the type of software system were proposed, and the contractors will make their pitches on March 17, 2012. They are currently in the process of design authentication. On March 1, 2012, I contacted our business analyst, giving her a detailed description of the project. We made a schedule for testing the software and hardware that will be implemented. We discussed and drafted minimum system requirements that would meet our firm’s objectives. Work to be completed: Currently we are waiting for the contractors to give their design models. On delivery of the design models, we will begin testing with the focus group. The findings from the group will be tabulated by the statistical firm chosen for the project and results presented for your review. Anticipated problems: The problems we forecast will be in the form of implementation funding. The feasibility study will be completed on time, but the implementation process might be stalled while waiting for decisions as to how we plan to fund the new security product for our customers. The current options suggested are to fund the new systems by increasing user fees, or adding the associated cost to our expense bill. Studies will be completed to assess the impacts of increasing user fees. Some initial reviews show a reduction in our competitive advantage. As it relates to adding the associated cost to our wage bill, we did a preliminary assessment and found that this would be possible by utilizing the projected retained earnings of the fiscal year ending 2012. The final report containing the feasibility of the project will be completed on April 4th 2012 for your review. Works Cited: Criminal Intelligence Services Canada. (2008). Retrieved from Government of Canada: http://www.cisc.gc.ca/annual_reports/annual_report_2008/feature_focus_20 08_e.html

N&H Investments Inc.
Stolen
Identity. (2009, September 29). Retrieved from CBCNEWS: http://www.cbc.ca/news/story/2009/01/21/f-­‐idtheft.html

Similar Documents

Free Essay

Atc, Atc1,Atc2

...ote ote technical note tech Air Traffic Control Specialist Decision Making and Strategic Planning – A Field Survey Jean-François D’Arcy, Ph.D., Titan SRC Pamela S. Della Rocco, Ph.D., ACT-530 March 2001 DOT/FAA/CT-TN01/05 Document is available to the public through the National Technical Information Service, Springfield, Virginia 22161 U.S. Department of Transportation Federal Aviation Administration William J. Hughes Technical Center Atlantic City International Airport, NJ 08405 NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The United States Government assumes no liability for the contents or use thereof. The United States Government does not endorse products or manufacturers. Trade or manufacturer's names appear herein solely because they are considered essential to the objective of this report. This document does not constitute FAA certification policy. Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient’s Catalog No. DOT/FAA/CT-TN01/05 4. Title and Subtitle 5. Report Date March 2001 Air Traffic Control Specialist Decision Making and Strategic Planning – A Field Survey 7. Author(s) 6. Performing Organization Code ACT-530 8. Performing Organization Report No. Jean-François D’Arcy, Ph.D., Titan SRC and Pamela S. Della Rocco, Ph.D., ACT-530 9. Performing Organization Name and Address DOT/FAA/CT-TN01/05 ...

Words: 12904 - Pages: 52

Free Essay

Network Design for Remote Monitoring

...My capstone project is to recommend a Windows networked environment to facilitate the remote monitoring of neuro-surgeries. As a consultant I was approached by XYZ-Monitoring to assist in the design of a network from the ground up that would support the remote monitoring of neuro-surgeries using Cadwell Laboratories’ Cascade system. XYZ-Monitoring (herein referred to as XYZ) wanted a Windows network that would be integrated with their existing Cisco ASA firewall device. XYZ wanted to use a virtualized environment because they had a limited budget for new hardware. They needed a secure solution that would meet HIPAA requirement concerning the security of patient data. XYZ requires all users to connect to their environment through a VPN connection bound to the Cisco ASA firewall. They have three user groups that will need to have access to the environment; however, they have multiple clients that need to remain separated when connected to the network. Given these requirements by XYZ, it was clear they wanted an Active Directory integrated environment so that users would be grouped by job function and by client. XYZ would need at least three high level Organizational Units (OUs), one for each job function; they would also potentially need an OU for each client. They would need Group Policy Objects (GPOs) to provide ease of administration once the design was complete as well as provide access policies to the environment based on job function. Provided with these requirements...

Words: 5873 - Pages: 24

Premium Essay

What the Heck

...2015 International Compendium of Data Privacy Laws COUNTRY BY REGION Australia Australia................................................................................................................................. 6 Central Asia China (People’s Republic) .................................................................................................. 37 Hong Kong........................................................................................................................... 78 India..................................................................................................................................... 88 Japan................................................................................................................................. 106 South Korea....................................................................................................................... 149 Taiwan ............................................................................................................................... 157 Central America Bahamas ............................................................................................................................. 16 Costa Rica ........................................................................................................................... 43 Trinidad and Tobago.......................................................................................................... 160 Europe Austria .............

Words: 64291 - Pages: 258

Free Essay

Stuxnet

...Over the past couple of decades, the increasing dependence on information technologies has led to a relatively new form of security threat – cyber-attacks. Numerous advantages of the attackers in cyber space and a lack of attribution and awareness has resulted in an increasing number of aggressive operations in the digital realm. Contrary to the beliefs of many, cyber security is not exclusively a technical issue but also a matter of politics and economics. We can observe an increasing number cyber warfare policies in the international realm, which increases the pressure to establish rules of governance in cyber space. The following essay will be concerned with the Stuxnet worm and its role in Operation Olympic Games, which targeted the Iranian nuclear power plant Natanz. The analyses will provide an overview of the attack, including technical comprehension of the attack, and also looks at the attack in term of its political consequences. The first section will discuss the origins of the attack, building on Ralph Langner’s article published in ‘IEEE Software’. Even though numerous cyber offences took place before, it will explain what made Stuxnet stand out. The second part of the essay analyses the political perspective of the attack and two competing theories explaining the presence of malware in the nuclear facilities. The following section analyses the role of cyber warfare as viable military strategy. It will be argued that cyber offences appear to be more applicable...

Words: 2431 - Pages: 10

Free Essay

Dell 1435c

...Dell™ PowerEdge™ SC1435 Systems Hardware Owner’s Manual w w w. d e l l . c o m | s u p p o r t . d e l l . c o m Downloaded from www.Manualslib.com manuals search engine Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib...

Words: 32860 - Pages: 132

Free Essay

Research

...assigning the IP to PCs on the network. * Managing the network at client places. * Routine maintenance and clean-up of server file and directory structure. Academic Profile: * B.Tech – Electrical and Electronic Communication Engineering, Vidya Jyothi Institute of Technology affiliated to JNT University, Hyderabad (2008-2012). Experience: Seven Active Technology Solution Pvt. Ltd. as a Admin from November 2012 – April2015. Technical Skills: * Languages : C , .Net, Core JAVA * Operating systems : Windows XP/7/Vista, Windows server 2003/2008 Professional Experience Project 3: Online portal data updating – Sciencetuts.com Project Description: Seven active technology solutions are the content developers and step forwarded into online portal with the name of Sciencetuts.com, where can X, XI & XII Standards can easily understood the science subject with provided footages and e-books. (Presently in process) Role: Administrator Team Size: 7 Responsibilities: * Data uploading to Host server. * Linking the content as per standards from host...

Words: 745 - Pages: 3

Free Essay

Humance Resource

...Introduction to Managing the Human Resource Question one: Identify the kind of information which must be stored by Ann Smith of Goodwins plastic, and explain why it is important that this information is accurate and up date. 1. Information: ← Contact and personal details of workers (Name, Address, Telephone number, Date of Birth, Medical history, etc.) ← Worker profiles (Level and type of qualifications held, Training and working experience, Details of performance review interviews, Absence and holiday recording, etc.) ← Contractual agreements (Hours of work, Level of salary agreed, Agreed changes to contract, etc.) 2. Purpose of Personnel Record Keeping ← To keep contact and personal details of workers. Because of the records for worker had been lost so that the workers parents had not been contacted with this worker. The result is the worker concerned being taken to hospital without the knowledge of his parents. So it is important to store up the staff’s contact and personal detail. This can help personnel manager know the situation of staffs and contact them in time. ← To make more informed decisions for the benefit of the organization and the individual. Ann has taken a telephone call from a lady who was interviewed for the position of a machine operator last week. Ann knows that the man who gets the job is based on his knowledge and ability to do the job. However, the lady believe that she has...

Words: 901 - Pages: 4

Premium Essay

Inventory System

...“Garments Yarn Inventory System” A Thesis Report Entitle “Garments Yarn Inventory System” SUBMITTED BY: Mayeen Naomee Md. Ahsanul Alam [ID: 01201076] [ID: 02101084] SUPERVISED BY: ____________________ Dr. Sayeed Salam Head of Department of Computer Science and Engineering BRAC University Declaration This is to certify that this project is our original work. No part of this work has been submitted elsewhere partially or fully for the award of any other degree or diploma. Any material reproduced in this project has been properly acknowledged. Students’ names & Signatures. _________________________________ 1. Mayeen Naomee (ID:-01201076) _________________________________ 2. Md. Ahsanul Alam (ID:-02101084) Approval The Thesis titled “Garments Yarn Inventory System“ has been submitted to the following respected members of Board of Examiners of the Faculty of Computer Science and Engineering in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science on 2007 by the following students and has been accepted as satisfactory. 1. Mayeen Naomee (ID:-01201076) 2. Md. Ahsanul Alam (ID:-02101084) ___________________ Dr. Sayeed Salam Head of the Department of Computer Science & Engineering BRAC University Acknowledgements We are grateful to Dr. Sayeed Salam, our thesis supervisor for giving us the chance to work with Garments Yarn Inventory System and for proper guidelines and necessary supports...

Words: 2948 - Pages: 12

Free Essay

Active Directory

...DS) Without getting too technical and wordy, but being able to help the client understand more about what active directory does, the following can be explained: - AD shows a better representation of the network by a process known as centralization. Centralization is the process of managing users regardless of the size of the network in one location. - Utilizes organizational units to improve scalability. If an organization is large, OUs can help simplify the task by grouping resources (such as users and computers) that have similar rights. - Replication makes it easier because any changes that are made are replicated to other domain controllers so that the network can run more efficiently. http://www.techrepublic.com/article/the-benefits-of-moving-clients-to-an-active-directory-environment/ Active Directory Domain Services (AD DS) benefits: Redundancy Fault Tolerance Serves as a domain controller that authenticates users when logging on to a network. Participates in storing, modifying, and maintaining the AD database (Textbook) Page 3 for major benefits of AD DS Mark is concerned about ensuring the network so that it has little to no downtime at all. AD DS can help ease this issue because of the system providing fault tolerance. It continues to provide services even if 1 or more servers experience hardware failure or loss of connectivity. How does it do this? It does this through its multimaster domain controller. Fault tolerance exists...

Words: 625 - Pages: 3

Premium Essay

Sippican Case

...------------------------------------------------- Sippican Corporation A manufacturer of hydraulic control devices – valves, pumps & flow controllers. Currently the company is undergoing a severe economic impact from price cutting in pumps one of its major product lines. This has led to decline in its profits in this line of business – (as illustrated below) | Sales | 1847500 | | | | Variable Expenses | 809000 | | | | Contribution | 1038500 | 56.21% | | | | | | | | Machine related expense | 334800 | | | | Setup Labour | 117000 | | | | Receiving & production control | 15600 | | | | Engineering | 78000 | | | | Packaging & Shipping | 109200 | | | | | | | | | Manufacturing Overhead | 654600 | 35.43% | | | | | | | | Gross Margin | 383900 | 20.78% | | | Other Expenses | 350000 | | | | Operating Income (pre-tax) ROS | 33900 | 1.83% | | The company’s gross margin is expected to be 31% whereas as shown in the exhibit it is currently at 21%. Return on sales is 1.8% which is far below the target of 15-20% that the company has been realising in the past. Sippican had recently raised the price of its flow controllers by more than 10% but yet failed to achieve any good financial results It operates at a simple cost accounting system that directly charges each unit of product for its direct labour and material cost (exhibit 3) * Material cost is based on the prices paid for components under annual purchasing...

Words: 914 - Pages: 4

Premium Essay

Signal Analyzing Kit

...Resume Of S.M. Hasanur Rahman C/O,M.A.Samad, Holding No# 778, Post:Noapara,Village: Guakhola, Thana: Avayanagar, District: jessore, Country:Bangladesh ,Post code-7460. e-mail: hasanur98@yahoo.com Ph:+88-01711-504709 CAREER OBJECTIVE : ( To build up my career in the field of Telecommunication engineering. ( To be a professional technical leader and efficient manager. ( Willing to work in an environment where I can utilize my experiences and always get the feelings that I am developing through my works. JOB EXPERIENCE : 5 Years in the field of telecommunication sector and one year in data communication field KEY EXPERIENCES : ❖ Experience on Quality Audit and Acceptance: ➢ 3 Years work experience in Grameenphone Ltd. (A sister conern of Telenor) as a highly performing quality controller and acceptance engineer. I’ve the strong sense and good knowledge on international standard procedure of installation and acceptance of GSM network, Transmission backbone & Optical fibers. ❖ Technical Experience on GSM Network & Power System: ➢ In depth knowledge and installation, commissioning & Maintenance of Ericsson 2202, 2206,2206V2 GSM RBS and HUAWEI 3900 BTS. ➢ Installation, commissioning, acceptance and critical fault handling of PDH transmission network specially PASSOLINK, PASSOLIN+, NEC NEOC, SRAL, SRAL XD, OPTIX RTN equipments. ➢ Practical experience on acceptance and trouble shooting of both...

Words: 1484 - Pages: 6

Free Essay

Gvhjgjkbhjb

...MINI-MAX/ARM-C and MINI-MAX/ARM-E Single Board Computers Technical Manual Date: 27 August, 2006 Document Revision: 1.04 BiPOM Electronics 16301 Blue Ridge Road, Missouri City , Texas 77489 Telephone: 1-713-283-9970. Fax: Fax: 1-281-416-2806 E-mail: info@bipom.com Web: www.bipom.com 2 © 1996-2006 by BiPOM Electronics. All rights reserved. MINI-MAX/ARM Single Board Computer Technical Manual. No part of this work may be reproduced in any manner without written permission of BiPOM Electronics. All trademarked names in this manual are the property of respective owners. WARRANTY: BiPOM Electronics warrants MINI-MAX/ARM for a period of 1 year. If the board becomes defective during this period, BiPOM will at its option, replace or repair the board. This warranty is voided if the product is subjected to physical abuse or operated outside stated electrical limits. BiPOM Electronics will not be responsible for damage to any external devices connected to MINI-MAX/ARM. BiPOM Electronics disclaims all warranties express or implied warranties of merchantability and fitness for a particular purpose. In no event shall BiPOM Electronics be liable for any indirect, special, incidental or consequential damages in connection with or arising from the use of this product. BiPOM Electronics’ liability is limited to the purchase price of this product. 3 TABLE OF CONTENTS 1. OVERVIEW 2. SPECIFICATIONS 3. FUNCTIONAL BLOCKS 4. PERIPHERALS 5. SOFTWARE 6. BOARD LAYOUT 7. SCHEMATICS...

Words: 2669 - Pages: 11

Premium Essay

Port Expanders

...expansion plate of multiple ports, an external device plugs into the existing port and then has multiple places to connect. When not part of a computer system, these devices are commonly known as splitters. Types of ports that are available on expander hardware: USB, Ethernet, firewire,DB-25,Serial,VGA,DVI,SCSI,Audio,Video,Microphone,RS-422,SATA,SAS,SSD,Modbus Serial. SAS(Statistical Analysis System; not to be confused with SAP) is a software suite developed by SAS Institute for advanced analytics business intelligence, data management, and predictive analytics, RS-422 is a technical standard originated by Electronic Industries Alliances that specifies electrical characteristics of a digital signaling circuit. Differential signaling can transmit data at rates as high as 10Mb/s or may be sent on cables as longs as 15meters. SATA is the faster serial version of parallel ATA (PATA) interface. Both SATA and PATA are integrated drive electronics, which means the controller is in the drive, and only a simple circuit is required on the motherboard. USB is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. Ethernet is a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and simultaneous transmission...

Words: 610 - Pages: 3

Free Essay

Kamazon Project

...has back up fail safe options and also as being very secure. We have held standing contracts with major companies, as well as small business. We are located on 104 Industrial Drive, Suite 200, The Woodlands, Texas 77385. CTI members are as follows: Richard Gibson, Marvin Pierre, Raven Hamilton, Morgan Worthman, and Victor Calderon. Biography/Roles Richard Gibson Graduated from ITT Technical Institute & University Of Houston Project Manger/SNA Systems Network Administrator Degree Business Degree/Bachelors Marvin Pierre Graduated from ITT Technical & University of Texas Accounting/SNA System Network Administrator Degree Accounting/ Bachelors Raven Hamilton Graduated from ITT Technical & Sam...

Words: 2724 - Pages: 11

Free Essay

3ware Cli Ug

...the information contained herein. Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Ways to Run the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1) Interactive with command interface . . . . . . . . . . . . . . . . . . 4 2) Single command with output . . . . . . . . . . . . . . . . . . . . . . . . 4 3) Multiple commands through an input file . . . . . . . . . . . . . . 5 Controller Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 The info command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Examples using Interactive Mode . . . . . . . . . . . . . . . . . . . . . .7 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 The set command . . . . . . ....

Words: 6727 - Pages: 27