Grenn

In: English and Literature

Submitted By volcomsurfer696
Words 299
Pages 2
Raymond Tello
NT2580
4/2/2013
Access Control Models
1. Shovels and Shingles is a small construction company consisting of 12 computers that have internet access.

They would need Rule-based access control so they can only go on what they are allowed to access.

2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smartphones.

They would need access to Rule-based control and content-dependent access controls for the fact they access what they are allowed to access and what content they can access.

3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have internet access and 45,000 servers. All employees communicate using smartphones and email. Many employees work from home and travel extensively.

They will need access to Discretionary, mandatory, role-based, rule-based, content-dependent, and nondiscretionary access controls, they are a large company and will need someone to be in charge of each control because not everyone have the same access.

4. Backordered parts are a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email.

They would need Discretionary, content-dependent and rule-based access control, they have a group of people who contain sensitive data that need to be controlled. They communication parts need to be safe.

5. Confidential Services Inc is a military-support branch consisting of 14,000,000 computers with internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and email.

They would need Mandatory, Discretionary, role-based, rule-based, content-dependent, nondiscretionary. They have many individuals all who need different access, so they need someone…...

Similar Documents

Grenn

...Raymond Tello NT2580 4/2/2013 Access Control Models 1. Shovels and Shingles is a small construction company consisting of 12 computers that have internet access. They would need Rule-based access control so they can only go on what they are allowed to access. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smartphones. They would need access to Rule-based control and content-dependent access controls for the fact they access what they are allowed to access and what content they can access. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have internet access and 45,000 servers. All employees communicate using smartphones and email. Many employees work from home and travel extensively. They will need access to Discretionary, mandatory, role-based, rule-based, content-dependent, and nondiscretionary access controls, they are a large company and will need someone to be in charge of each control because not everyone have the same access. 4. Backordered parts are a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email. They would need Discretionary, content-dependent and rule-based access control, they have a group of people who contain sensitive data that need to be controlled. They communication parts need to be safe. 5. Confidential Services Inc is...

Words: 299 - Pages: 2

Gdarg

... the grip. He flipped it in the air, caught it again with his other hand. “Such sweet balance. You want to find the owner, is that the reason for this visit? You have no need of Ser Aron for that, my lady. You should have come to me.” “And if I had,” she said, “what would you have told me?” “I would have told you that there was only one knife like this at King’s Landing.” He grasped the blade between thumb and forefinger, drew it back over his shoulder, and threw it across the room with a practiced flick of his wrist. It struck the door and buried itself deep in the oak, quivering. “It’s mine.” “Yours?” It made no sense. Petyr had not been at Winterfell. “Until the tourney on Prince Joffrey’s name day,” he said, crossing the room to wrench the dagger from the wood. “I backed Ser Jaime in the jousting, along with half the court.” Petyr’s sheepish grin made him look half a boy again. “When Loras Tyrell unhorsed him, many of us became a trifle poorer. Ser Jaime lost a hundred golden dragons, the queen lost an emerald pendant, and I lost my knife. Her Grace got the emerald back, but the winner kept the rest.” “Who?” Catelyn demanded, her mouth dry with fear. Her fingers ached with remembered pain. “The Imp,” said Littlefinger as Lord Varys watched her face. “Tyrion Lannister.” JON T he courtyard rang to the song of swords. Under black wool, boiled leather, and mail, sweat trickled icily down Jon’s chest as he pressed the attack. Grenn stumbled backward, defending himself...

Words: 304099 - Pages: 1217

Abcd

... their separate tables, some bent over bowls of porridge, others filling their bellies with fried bread and bacon. Jon saw Pyp and Grenn at one table, Bowen Marsh at another. The air smelled of smoke and grease, and the clatter of knives and spoons echoed off the vaulted ceiling. All the voices died at once. “Lord Janos,” Jon said, “I will give you one last chance. Put down that spoon and get to the stables. I have had your horse saddled and bridled. It is a long, hard road to Greyguard.” “Then you had best be on your way, boy.” Slynt laughed, dribbling porridge down his chest. “Greyguard’s a good place for the likes of you, I’m thinking. Well away from decent godly folk. The mark of the beast is on you, bastard.” “You are refusing to obey my order?” “You can stick your order up your bastard’s arse,” said Slynt, his jowls quivering. Alliser Thorne smiled a thin smile, his black eyes fixed on Jon. At another table, Godry the Giantslayer began to laugh. “As you will.” Jon nodded to Iron Emmett. “Please take Lord Janos to the Wall—” —and confine him to an ice cell, he might have said. A day or ten cramped up inside the ice would leave him shivering and feverish and begging for release, Jon did not doubt. And the moment he is out, he and Thorne will begin to plot again. —and tie him to his horse, he might have said. If Slynt did not wish to go to Greyguard as its commander, he could go as its cook. It will only be a matter of time until he deserts, then. And how many others will...

Words: 427105 - Pages: 1709

Daenerys

... once, raining down from one side and then the other, driving him where he would, keeping him off balance. Already he could feel his arms growing numb. Even when Ghost’s teeth closed savagely around the ranger’s calf, somehow Qhorin kept his feet. But in that instant, as he twisted, the opening was there. Jon planted and pivoted. The ranger was leaning away, and for an instant it seemed that Jon’s slash had not touched him. Then a string of red tears appeared across the big man’s throat, bright as a ruby necklace, and the blood gushed out of him, and Qhorin Halfhand fell. Ghost’s muzzle was dripping red, but only the point of the bastard blade was stained, the last half inch. Jon pulled the direwolf away and knelt with one arm around him. The light was already fading in Qhorin’s eyes. “...sharp,” he said, lifting his maimed fingers. Then his hand fell, and he was gone. He knew, he thought numbly. He knew what they would ask of me. He thought of Samwell Tarly then, of Grenn and Dolorous Edd, of Pyp and Toad back at Castle Black. Had he lost them all, as he had lost Bran and Rickon and Robb? Who was he now? What was he? “Get him up.” Rough hands dragged him to his feet. Jon did not resist. “Do you have a name?” Ygritte answered for him. “His name is Jon Snow. He is Eddard Stark’s blood, of Winterfell.” Ragwyle laughed. “Who would have thought it? Qhorin Halfhand slain by some lordling’s byblow.” “Gut him.” That was Rattleshirt, still ahorse. The eagle...

Words: 92277 - Pages: 370

Heloo

... on the island is called La Bandera, or “The Flag.” It is made with meat, rice, and red beans: making the dish distinctly Dominican, many will also serve it with friend plantains called “tostones.” As a culture that loves to eat, the meal will often continue beyond this first course. Be prepared to try boiled grenn plantain known as “mangu,” “pastels en hojas,” which are wrapped turnovers cooked in banana leaves; and various casseroles, stews, and meat dishes featuring braised goat, pork, and chicken rinds. Economy: The Dominican Republic has the second largest economy in the Caribbean. It is an upper middle-income developing country primarily dependent on agriculture, trade, and services, especially tourism. Although the service sector has recently overtaken agriculture as the leading employer of Dominicans (due principally to growth in tourism and Free Trade Zones), agriculture remains the most important sector in terms of domestic consumption and is in second place (behind mining) in terms of export earnings. Tourism accounts for more than $1 billion in annual earnings. Free trade zone earnings and tourism are the fastest-growing export sectors. According to a 1999 International Monetary Fund report, remittances from Dominican Americans are estimated to be about $1.5 billion per year. Most of these funds are used to cover basic household needs such as shelter, food, clothing, health care, and education. Secondarily, remittances have financed small businesses and other...

Words: 1362 - Pages: 6

Grenn Computing

...Assignment 3 (MCAP-303) Perform an Internet search on the phrase “green computing” and then answer the following questions. How would you define green computing? Green computing or green IT, refers to environmentally sustainable computing or IT. It is also defined as "the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems—efficiently and effectively with minimal or no impact on the environment.” Green computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste). GREEN computing is the environmentally responsible use of computers and related resources. Such included the implementation of energy-efficient central processing units as well as reduced resource consumption and proper disposal of electronic waste. Modern IT systems rely upon a complicated mix of people, networks and hardware; therefore GREEN computing initiative must be systemic in nature. GREEN computing may comprise items such as management restructuring, energy use, virtualization of server resources, and return on investment. The term “GREEN computing” was coined shortly after the Energy Star program. The...

Words: 1959 - Pages: 8