Free Essay

As a Member of the Information Security Team at a Small College, You Have Been Made the Project

In:

Submitted By nhung75
Words 2715
Pages 11
Your neighbor is starting a small billing business and has asked you to design the network. Currently, you neighbor has nothing, but needs the following:
- 2 workstations, 2 laptops, and 1 server supporting 3 users
Go to Dell.com website, Small Business section. Then select 2 workstation (PCs), 2 laptops, and one server. Pick all standard configurations; copy all information details including cost of each. Add the cost together and see if it less than $5,000 or not. If it was more than $5000, then change hardware components or pick lower end computers to lower the cost. You need to get total cost for these items no more than $3,000.
- Wireless networking
Do the same thing above but choose a wireless switch or routes that have at least 8 ports for expanding at later time. Include cost$$
PowerConnect 2808 Switch. >> Organizations seeking an 8-port switch that offers incredible value, flexible management capabilities and energy-efficient power savings. >> Dell Price $119.00
- 1 quality networked printer
Dell V525w All-in-One Wireless Inkjet Printer: Versatile and efficient, this all-in-one printer provides enhanced high speed performance at a great value. Print, scan, fax, and copy with this efficient printer for your office
- File and folder sharing
Do this through Windows Server 2008 Standard Edition. Setup account, access and permission; create shared folder, etc./437
- Internet access
Use Verizon for internet service. Get monthly fee estimate online. Buy a domain name for business and web site bundle (package).
- Multiple email addresses
This include in Verizon service so include all cost for internet, email, website. This is recurring cost.
- Basic security environment (similar to home environment)
- Initial investment $5,000 or less
Add all hardware, software, cables, and printer. Make adjustment for no more than $5,000
- Recurring costs less than $200 per month
Add the two recurring cost above, and make some adjustment to get cost no more than $200
1. Recommend a design that meets all the customer’s needs.
The design, is very basic local area network: a server with Windows 2008 Standard server edition; computers include two Windows 7 desktops, two Windows 7 Laptops, a network printer, a Verizon cable modem for internet connection, a Netgear switch or router for sharing connection. Star topology, Giga-bit Ethernet seems OK.
We should recommend our neighborhood use the Windows server 2008 is the latest of Microsoft’s NOS. Windows Server 2008 helps increasing control, availability, and flexibility of datacenter and desktop infrastructure. This network is based on client/server architecture, in which server enables multiple clients to share resources and uses multiple domain controllers. When a network use domain controllers, a change to the database contained on one domain controller is copied to the database on other domain controllers so that the database are always identical. This network needs at least two domain controllers, if one of domain controllers fails, another controller can step in to allow clients to log on to the network, be authenticated, and access resources. We use the client/ server with star-hybrid topologies because star topology is easy for him to expand or reduce the number of windows later in the architecture on this network, star topology helps this network facilitate communication and resource sharing between other computers on the network. The clients do not share their resources directly with each other. The user logon accounts and passwords for anyone on a server based network can be assigned in one place. They access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users. The Problems on the network can be monitored, diagnosed, and fixed from one location. The servers are optimized to handle heavy processing loads and dedicated to handling requests from clients, enabling faster response time. Because of their efficient processing and larger disk storage, the servers can connect more than a handful of computers on a network. We use a wireless router is connected to the cable DSL modem using an RJ-45 cable. The cable is inserted into the access point’s WAN port, which is set apart from the other data ports. The additional ports on the access point allow for wired access to the router. Access point provides security features, by, for example, including and excluding certain clients. It may participate in VLAN; allowing mobile clients to move from one access point’s range to another while belong to the same virtual LAN. We use the star topology to connect two windows 7 desktops, two window 7 laptops, one server and one printer to the wireless router. I think that star topology will help my neighborhood facilitate changing his network if he would like to expand or reduce the network in the future. Further, star topology has a centralized connection point, so it can easily be moved, isolated, or interconnected with other network. (Dean, P. 384).

For internet service, I recommend him buy a Phone plus Internet Bundle package from Verizon. It has High Speed Internet with up to 1 Mbps download, and up to 384 Kbps upload, and IP Address: dynamic. It includes two Phone Lines, Line one is with Unlimited Nationwide Calling, and Line two is Basic with usage based plan. When he orders this package, he is going to get the free DSL modem, which connects to wireless router. A wireless router is a network device that enables him connect several computers to the Internet without using cables, beside that the wireless networking include freedom and affordability. Furthermore, the package includes Google Apps that help his small business while he is working, all his critical data is automatically backed up on Google servers. So when accidents happen, if your computer crashes or gets stolen, he can be up and running again in seconds. When he puts his data in Google Apps, he is still own it, and it says just that in our contracts. Apps’ powerful is easy-to-use tools help administrators manage things like users, documents and services, and keep track of usage and data via dashboards. Our data centers are designed and built for our applications and don’t include unnecessary hardware or software. This reduces the number of potentially exploitable vulnerabilities. Google Apps offers an extra layer of security with two factor authentication, which greatly reduces the risk of hackers stealing usernames and passwords. Finally, the package includes three Accounts with one year free domain name. It means that help him to facilitate communication to his customers by using three accounts.
2. Create a diagram of wireless network.
3. Suggest network architecture and Internet access configuration.
It should be TCP/IP protocol, Gigabit Ethernet LAN. Internet access using broadband from Verizon. Authentication basically use 3DES security encryption with password, etc.
I think we should use TCP/IP for this network because most modern network relies on the TCP/IP protocol. It allows clients work with computers, and an Internet service provider to access and share information over the Internet. TCP/IP enables the network to be connected to the Internet. It lets computers and devices with different hardware architectures and running different operating systems communicate with each other. In this network, we connect the DSL modem to the internet; the DSL modem has broadband cable, which provides a dedicated, or continuous, connected that does not require dialing up a service provider. DSL has over a dial-up Internet connection is that it will not tie up our phone. This can be an important benefit if our neighborhood operates a business where he needs simultaneous access to the telephone and Internet. Also, DSL is always "on," so he will not have to worry about getting connected like he does with dial-up. The charge for line access from the phone company is also relatively inexpensive. The DSL internet service has another benefit that why we should recommend our neighborhood should choose DSL Internet service because A DSL connection makes use of our existing telephone wiring, so we will not have to pay for expensive upgrades to your phone system. Also, DSL uses extra lines from our telephone channels, so you will not need to have another line installed.
Because so many networks connect to the Internet, the threat of an outsider accessing an organization’s network via the Internet, and then stealing or destroying data, is very real. So, our neighborhood needs a Network security to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. We should recommend him buy the firewall and anti-virus package. This package provides protection him from getting viruses such as trojans, malware and spyware. Viruses range in severity from the harmless to the downright system crippling. Not only can a virus destroy all of the valued data on your computer, it can make the computer utterly worthless by infecting and destroying processes vital to your computer's performance. Further, it protects him while he surfs the Internet, preventing hackers from gaining access to personal things such as credit card information and bank account access. The firewall feature included with most anti-virus software will block any unauthorized incoming connections to your network or computer, preventing hackers from digging their hooks into your life and your computer.
4. Describe hardware recommendations and related costs.
We should recommend our neighborhood that he should buy Inspiron One 23 All-in-One Entertain and inspire with the Inspiron™ One 23 All-in-One. It offers up to 3rd Gen Intel® Core™ processors, stellar graphics and a 58.4 cm (23) Full HD display with Dell price $699, and Vostro 260s Slim Tower Desktop An essential space-saving desktop PC powered by 2nd Gen Intel® Core™ Processors with Dell price $299.00. He would like to add two laptops, I recommend him buy Dell Latitude E5530 Advanced Laptop, it Multitask with a large LED display of the Latitude™ E5530. This affordable laptop offers the latest security features and docking capability with Dell price $499.00. Further, he should buy PowerEdge T110 II Tower Server - PowerEdge™ T110 II is an ideal first server for small business with the right combination of value, reliability, collaboration and data protection features to improve your business continuity and productivity with Dell price $299.00. N300 wireless ADSL plus 2 modem router with Dell price $105.99, which provides higher speed and better range. It blocks unsafe Internet content and applications and enables flexible and customizable settings through web interface. Wireless-N provides higher speed and better range than your old DSL equipment and its ready share USB port provides fast and easy access. It comes with built-in ADSL plus 2 modem and use with DSL Broadband through the telephone line. Features live parental controls, powered by open DNS dedicated network for guests with restricted access without sharing your own security password. Moreover, automatic quality of service is useful for reliable video, voice and gaming. The broadband usage meter ensures accurate measurement of download internet traffic with customized alerts. Also, it provides firewall protection; denial-of-service attack prevention, intrusion detection and prevention, Wi-Fi protected access and WEP push and connect using Wi-Fi protected setup and smart wizard. Finally, He should buy a Dell V525w All-in-One Wireless Inkjet Printer with Dell price $89.99, which is versatile and efficient, this all-in-one printer provides enhanced high speed performance at a great value. Print, scan, fax, and copy with this efficient printer for your office.
5. Describe software recommendations and related costs.
First of all, I would like to recommend my neighborhood about Microsoft Windows Server 2008 R2 Standard - 1 server, 5 CALs with the Dell price $763.00. Microsoft Windows Server 2008 R2, built with Web and virtualization technologies, is the most robust, secure, and reliable foundation on which to develop, deliver, and manage rich user experiences and applications. Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding features to enable IT professionals to increase the reliability and flexibility of their server infrastructures. Virtualization tools, Web resources, management enhancements, and exciting Windows 7 integration help save time, reduce costs, and provide a platform for a dynamic and efficiently managed data center. Powerful tools such as Internet Information Services (IIS) version 7.0, updated Server Manager and Hyper-V platforms and Windows PowerShell version 2.0 combine to give customers greater control, increased efficiency and the ability to react to front-line business needs faster than ever before. Next, he should buy the Microsoft Windows 7 Professional w/SP1 - 1 PC with Windows 7 Professional from Dell, fewer walls stand between you and your success. He can run many Windows XP productivity programs in Windows XP Mode and recover data easily with automatic backups to your home or business network. He can also connect to company networks effortlessly and more securely with Domain Join. With all the exciting entertainment features of Windows Home Premium, it's a great choice for small business and its price is $83.99.
Windows Server 2008 cost, windows 7 professional cost, get from the above or from Dell.
6. Provide a Cost Table listing all the items needing purchasing and the associated cost. ITEMS | COST | 2 desktop | $299.00 | 2 HD display | $699.00 | 2 laptops | $499.00 | 1 server | $299.00 | Dell V525w All-in-One Wireless Inkjet Printer | $89.99 | N300 wireless ADSL +2 modem router | $105.99 | Microsoft Windows Server 2008 R2 Standard - 1 server, 5 CALs | $763.00 | Microsoft Windows 7 Professional w/SP1 - 1 PC | $83.99 | RECURRING COST | Firewall and anti-virus package/service from Verizon | $12.98/mo. | Bundles with High Speed Internet package from Verizon | $79.99/mo. |

7. Describe the basic configuration recommended for a secure computing environment.
We should recommend him buy firewall and anti-virus package/service from Verizon with monthly payment is $12.98. This package includes features for PC, such as Active Protection technology, Anti-virus software, Anti-spyware software, Website safety advisor, Anti-phishing software, Identity protection, Two-way firewall protection, Anti-spam software. Further, it includes features for MAC, such as Anti-Virus, Firewall protection, Anti-spyware software. In Anti-Virus/Anti-Spyware, it detects, blocks, and removes viruses, spyware, and adware from email, browsers and downloaded applications. In Anti-Phising alerts him to web sites that may try to steal his identity so he can browse the Internet safely.
This package protects his business with our all-in-one; it includes Anti-Virus, Anti- Spyware, Firewall, Content Management, and Pop-Up / Ad Blocker services. The Verizon Internet Security Suite provides fully integrated state-of-the-art protection. Verizon Internet Security Suite also includes the following capabilities that will help to protect against known malicious viruses, worms and "Trojan" programs, Acts as a shield and helps block hackers, hostile attempts to access your computer and malicious incoming and outgoing network traffic.
Allows him to control Internet access and monitor your employees’ Internet usage by:
•Restricting access to inappropriate sites, Defining Internet use schedules, Locking Internet access, Preventing employees from divulging sensitive information online, Automatically detects and eliminates a broad range of unwanted spyware and tracking software, Blocks online ads before they appear, including pop-ups, pop-unders, banners, animations and title ads, Scans all outgoing communications for sensitive or identifying information and prevents its release without your consent, Provides control over how much information Web sites record about your browsing habits
Firewall, anti-virus/spam, Windows logon, no inbound access from internet, only outbound internet access,
8. Cite at least three (3) references to articles from relevant, non-commercial, and non-wiki sources. http://smallbusiness.verizon.com/products/apps/security_suite/features.aspx#packages http://smallbusiness.verizon.com/bundles/bundles.aspx http://anti-virus-software-review.toptenreviews.com/the-benefits-of-having-anti-virus-protection.html?a_aid=aff1070 http://www.ehow.com/list_6150677_advantages-antivirus.html#ixzz25qQjbODT
http://techtips.salon.com/advantages-dsl-cable-wireless-internet-service-providers-21803.html

Similar Documents

Premium Essay

Access Control

...Running head: Dormitory Access Control Case Study: Dormitory Access Control Elizabeth Koch CIS 210 Dr Lopez Abstract As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.  Create a 3-4 page project plan for this project in which you: Project Scope Statement The Information Security team at Small University has been given the project to install an access control system (ACS) from Dynamics Security in a dormitory. The ACS will automatically unlock the doors via an electronic proximity reader and integrate with an existing security camera system. The existing cameras are designed to face and rotate to record a person as they use their identification card to unlock the doors. For this reason, the system will be designed in a way that the user will have three chances to unlock the door, if the user fails to unlock the door on the third attempt, then the alarm will go off. The ACS will also be designed to allow the security administrator to make changed for the ACS operations. These changes will be the camera positions, setting the alarm time, and setting the time the dormitory doors will lock. ...

Words: 755 - Pages: 4

Premium Essay

Case Study 1: Building an Access Control System

... 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a project plan identifies the tasks and estimates the project’s completion time and costs of the project. 14 Days Assign Tasks Assigning tasks (Scheduling) is the start to finish timeline of charts that would show the tasks, Task dependencies, and critical tasks that may delay the project. In assigning tasks, the selection and staffing of a project’s team members come together. 2 Days Obtain...

Words: 886 - Pages: 4

Premium Essay

Event Management Report

...A Project Report On EVENT MANAGEMENT Submitted By: Mayur .A.Ghunkikar Roll #7920 MMS II Second Year Masters In Management Studies (IV–Semester) Oriental Institute Of Management Studies To the University of Mumbai In Partial Fulfilment Of MMS Academic Year: 2008-2009 CERTIFICATE  This is to certify that, the project assigned on ‘Event Management’ has been successfully completed by Mr. Mayur .A. Ghunkikar of Oriental Institute of Management Studies, Vashi. The project is being completed as a part of the syllabus and also in partial fulfillment of the two year full time degree of Master Of Management Studies conducted by University of Mumbai.  | | | | | | | | |Signature of examiner | |Prof. Rupali Mohite | | | |(Course coordinator) | | | | | | | | ...

Words: 16843 - Pages: 68

Premium Essay

Building an Access Control System

...CASE STUDY 1 Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control...

Words: 1248 - Pages: 5

Premium Essay

Project on Beverage Company

...PROJECT FEASIBILITY DOCUMENT |Project name |insert project name | |Release |Draft/Final | | |Date: | |Author: | | |Project | | |Director: | | |Project | | |Champion: | | |Accountable | | |Body: | | |Executive Summary ...

Words: 1199 - Pages: 5

Premium Essay

Capstone

...Computerized Book Inventory System Golden Success College 1297 V. Rama Ave. Corner Singson St. Guadalupe, Cebu City A Project Implementation Report Presented to The Faculty of Information Technology Golden Success College, Inc. In Partial Fulfillment of the Requirement for Capstone Project Proponents Dave Oficiar Barabat Catherine Rule Benlot Mark Jayson Jarina Cueva Mia Mangyao Labonite Ms. Lenny B. Yamilo Adviser October 2014 Table of Contents Page No. Acknowledgement Report Summary Project Proposal Introduction Rationale of the Study Background of the Study Statement of the Problem General Problem Specific Problem Objectives of the Problem General Objectives Specific Objectives Scope and Limitation Scope of the Study Limitation of the Study Significance of the Study System Design Specification System Design Review of Related Literature Methodology of the Study Theoretical Framework Appendices Appendix A Appendix B Appendix C Curriculum Vitae Glossary Bibliography Acknowledgement The proponents would like to express the deepest appreciation to Ms. Leny B. Yamilo, who has the attitude and the substance of a genius; she continually and convincingly conveyed a spirit of adventure in regard to research and an excitement in regarding to teaching. Without her guidance and persistent help this dissertation would not have been possible. Special thanks also to my co-proponents, who stood and determinedly joined...

Words: 4229 - Pages: 17

Premium Essay

Study of Eyewatch-Mobile Phone Application for Personal Safety

...PROJECT REPORT ON ‘STUDY OF EYEWATCH – MOBILE PHONE APPLICATION WITH SPECIAL REFERENCE TO WOMEN POPULATION AND ITS PROMOTIONAL STRATEGIES’ FOR INDIANEYE SECURITY PVT. LTD. [Submitted in partial fulfilment of the requirement for the PGDM- IB (2011-2013) course at FSM, New Delhi] Submitted By: Submitted To: Palak Thukral Prof. Neetu Jain Roll No.- 053027, IMG5 FORE School of Management FORE SCHOOL OF MANAGEMENT B-18, QUTAB INSTITUTIONAL AREA NEW DELHI CERTIFICATION This is to certify that Ms. Palak Thukral, Roll No.053027, IMG V has completed her corporate business project and submitted this report entitled ‘Study of Eyewatch- mobile phone application with special reference to women population and its promotional strategies’ for Indianeye Security Pvt. Ltd., towards partial fulfilment of her Post Graduate Diploma in Management – International Business (PGDM-IB)(2011-2013) course at FSM, New Delhi. This report is the result of her own work and to the best of my knowledge no part of it has earlier comprised any other report, monograph, dissertation or book. It was carried out under my overall supervision. Date: Place: Prof. Neetu Jain Internal Faculty Guide ACKNOWLEDGEMENT I take the opportunity to express the feeling of gratitude towards FORE School of Management for keeping project as part of Bachelor of Business Administration Course. ...

Words: 13441 - Pages: 54

Premium Essay

Mba Essay

... Think about the decisions you have made in your life. Describe the following: PAST: What choices have you made that led you to your current position? PRESENT: Why is a Stern MBA necessary at this point in your life? FUTURE: What is your desired position upon graduation from the Stern School? I like options, I like security, and I like power. With these wants, I knew at a very early age that I would enter business and thus I attended a college that specializes in the subject. In my first position out of school, I was hired by Dunhill Equities as a cold-caller. After several weeks of being hung up on by angry prospects, I decided that this career path would not lead me to success. I then moved within the firm to a position as sales assistant. While this was by no means my dream job, I learned a tremendous amount about business, and I gained useful exposure to the world of finance. Unfortunately, the company hit a period of instability, and after ten months I transferred with my boss to Coleman & Company. Thirteen months later, that company also began to fail, and I began to search for another path to advancement. With two strikes against me, I hit a home run and was hired by Sanford Bernstein into a challenging job with limitless opportunity for growth. After almost three years at Bernstein, I am once again seeking career advancement. My education and work experience have provided me with an excellent introduction to business, and they have sparked my interest in finance...

Words: 1452 - Pages: 6

Premium Essay

Financial Consulting

... Think about the decisions you have made in your life. Describe the following: PAST: What choices have you made that led you to your current position? PRESENT: Why is a Stern MBA necessary at this point in your life? FUTURE: What is your desired position upon graduation from the Stern School? I like options, I like security, and I like power. With these wants, I knew at a very early age that I would enter business and thus I attended a college that specializes in the subject. In my first position out of school, I was hired by Dunhill Equities as a cold-caller. After several weeks of being hung up on by angry prospects, I decided that this career path would not lead me to success. I then moved within the firm to a position as sales assistant. While this was by no means my dream job, I learned a tremendous amount about business, and I gained useful exposure to the world of finance. Unfortunately, the company hit a period of instability, and after ten months I transferred with my boss to Coleman & Company. Thirteen months later, that company also began to fail, and I began to search for another path to advancement. With two strikes against me, I hit a home run and was hired by Sanford Bernstein into a challenging job with limitless opportunity for growth. After almost three years at Bernstein, I am once again seeking career advancement. My education and work experience have provided me with an excellent introduction to business, and they have sparked my interest in finance...

Words: 1453 - Pages: 6

Premium Essay

Benifits of Language

... Students talking together provide for input and listening. Students often have to assess the thoughts/ideas of peers, determine whether they “fit” their own, whether they disagree, or partially agree. Students have an opportunity to speak their ideas/thoughts for better formulation. Some often say, “I didn’t think of that” or “That’s a different slant.” 2. Promotes greater student-faculty and student-student interaction. Students assist each other in understanding material/content. This may even help students broaden their perspectives on issues or problems. Professors have an opportunity to move from group to group, listen and if appropriate add comments. For some students this is the only personalization with a professor that ever occurs. Professors may answer questions that might never be asked without the closer interaction. Problems or misunderstandings can quickly and quietly be handled. 3. Increases student retention and limits anxiety. Students are not overloaded with information. Students actually get time to think about, to talk about, and process information. Improves interaction and “talk” (Vygotskian Constructivism) and provides opportunities for students to think about and process the information. Time for “talking” and/or “writing” is needed to help students make sense of what they hear before attempting to “take in” even more information. 4. Permits opportunities to connect the content to real life. Students are...

Words: 5829 - Pages: 24

Premium Essay

Cyber Sysems

...California Cyber Security Systems By Alvin Canlas (D01621385) Hernando De Leon (D40160634) Arees Dikranian (D01501086) Edward Huron (D01298546) Sandry Kho (D40246297) Chirag Patel (D40152599) Maria Ramirez (D01636860) Jaime Solorzano (D40201380) Submitted in Partial Fulfillment of the Course Requirements for MGMT 404 Project Management Dr. John Lindem October 15, 2014 Executive Summary Information Technology continues to change at a rapid pace. These changes greatly affect the world we live in. Corporate giants such as Target, Home Depot, and Apple have been recent targets of cyber-attacks. To protect customer date we have to constantly adapt to the different style of attacks and adjust to their business technology policies. At Cyber Security Systems (CSS) it is our mission to maintain the continuity of these vital services and preserve the public’s trust in our information systems. In addition, it requires new levels of communication and cooperation among the public and private sector, corporate agencies and departments. Furthermore, it involves protecting our critical infrastructures from intrusion or attack as well as using the infrastructure as a tool with which law-enforcement agencies can gather, analyze and disseminate information. This business plan will provide a vision, purpose, mission and goals for technology at Cyber Security Systems. In addition, it also includes the current organization of Information Technology, which affects...

Words: 4839 - Pages: 20

Free Essay

Case Study

...MIS Mini-cases -- 1 of 30 Cases for Use in Management Information Systems MIS Mini-cases -- 2 of 30 MIS Mini-cases -- 3 of 30 Case 01 -- Freeway Ford You are a management consultant working for Franklin Absolom, the majority stockholder for a group of 10 automobile dealerships. He has asked you to spend several days at Freeway Ford, a dealership that is not performing up to its potential. You are not to go ―looking for trouble‖: instead, your assignment is to find ways to help management at the dealership take advantage of opportunities. One day while you are talking with James Kahler, the sales manager for Freeway Ford, you realize that the dealership only uses transaction processing systems—it is not realizing the full potential of the information it has gathered for managerial decision making. For example, Freeway Ford knows the purchase date and owner of every car it sells, but it never contacts owner about routine maintenance. Freeway Ford know that people who purchase a new car generally trade it in for another new car 3 to 4 years later, but the dealership does not contact these previous customers. Another opportunity comes from used car purchasing and sales. Every car has a vehicle identification number (VIN), and the dealership uses this number to check for known problems with a used car before it makes a purchase. A data bank of car insurance claims histories and major repairs is kept on a set of CDs that is sent to the dealership each month. At the...

Words: 12946 - Pages: 52

Free Essay

Assignment

...GROUP PROJECT April, 2012 Executive Summary: Information Technology has become a necessity and inseparable entity of any organization. Whether large or small, any organization if it seeks to achieve efficient and effective performance and thus leading to high productivity and profitability, it has to implement and deploy optimal ICT practice. The report examines the ICT infrastructure that is utilized and deployed at Bahrain Polytechnic, which is one of the leading and well-established public universities in Bahrain. It attempts to provide a comprehensive overview of how ICT is implemented within the institution in regard to the physical infrastructure, systems, applications, networking and all other technical issues that are relevant to the ICT implementation and operations. Through the journey of investigating all aspects and concepts of ICT at Bahrain Polytechnic, this report tries of shed light on and assess the ICT services provided to the staff as well as to the customers who are the students. As it is the case to any organization, Bahrain polytechnic’s main aim of implementing best ICT practices is to ensure the best learning environment to the students and improve their performance and achievement as well as facilitate the performance of both the tutors and other staff. All this can maintain the institution’s competitive edge and place it amongst the most distinguished and pioneering universities in Bahrain. By carrying out surveys, observations and face-to-face...

Words: 6680 - Pages: 27

Free Essay

Group and Organizational Dynamics

...areas of our lives. From the corporate jobs, small business owners to family and friends, each area of our lives consist of different groups. Working in groups can be challenging at times. Knowing your strengths as individuals as well as knowing your role in group settings can make the challenges easier. I will discuss group and organizational dynamics from six different areas: group vs. individual decision making; motivational patterns in group dynamics; conflict; competition; task functions; and maintenance function. Group vs. Individual Decision Making It has been said that two heads is better than one. When it comes to making a decision rather it’s in your personal or professional life many seek the opinions of others before making a final decision. When I worked in 911 call centers there were times when you had to work with a group of dispatchers on task throughout the city and then there were times when I needed to make a quick decision to make sure that officers in the field were safe on my own. I found myself at ease when making the group decisions because I knew that the bulk of what happened wouldn’t be on my shoulders. There was someone else to share responsibilities with me. When working with a group of people communication with all individuals is critical to keep the group on the same level. There are verbal and non verbal ways to communicate with individuals in the group. Depending on your role in the group the way you decide to communicate with others will vary...

Words: 2647 - Pages: 11

Free Essay

Haha

...109 Interview Questions & Sample Excellent Responses: PART 2 of 2 By Gary L. Melling This Whitepaper includes 50 of the most typical interview questions that you may either ask or face in job interviews; Part 1 of this series contain the previous 59 questions. Developed by eLancer, questions are in no particular order, so take your time and go through the entire list. Whether you are about to graduate from University, a seasoned professional or an HR Practitioner looking for questions to use, there is something here for everyone. 60. Tell me about a time when you had to go above and beyond the call of duty in order to get a job done. Sample excellent response: Although I had already punched out, I stayed behind to help a colleague solve a problem. A customer was very angry as he had waited very long for his coffee. My colleague was new, she was quite slow. I came out and explained things to the customer. Although he was very angry at first, I just listened to him and told him that we try to bring our best out to each customer who walks in to our store. After a one-hour discussion, he left with a happy face and was satisfied. 61. Give me an example of a time when you were able to successfully communicate with another person even when that individual may not have personally liked you (or vice versa). Sample excellent response: During my time in the theater, I had one director with whom I absolutely did not work well. However, because of my track record, she would assign me...

Words: 7978 - Pages: 32