...Introduction: For this final paper, I am to assemble the executive reports for which I have completed over the last 5 weeks and combine them into one final report. These reports will consist of: - The two auditing frameworks or hardening guidelines / security checklists used by the DoD. - How a security assessment addressing modern day risks, threats, and vulnerabilities throughout the 7-domains of a typical IT infrastructure can help an organization achieve compliance. - How to gather and obtain needed information to perform a GLBA Financial Privacy & Safeguards Rules compliance audit and what must be covered. - The top workstation domain risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to prevent these issues from happening. - The top LAN – to – WAN risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to how we can prevent these issues from happening. - The top Remote Access Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. - The top Systems / Application Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. Part 1: Purpose: The purpose of part 1 for this lab is to develop an executive summary in regards to either the two auditing frameworks or hardening guidelines/security checklists used by the DoD. For this, I have chosen to discuss the two auditing frameworks. Background: ...
Words: 2140 - Pages: 9
...the human sensory feelings to give people the opportunity to be heard, to listen and be educated, to recognize and be recognized. It is a type of technology that allows you to express yourself anywhere, anytime toward achieving a greater level of communication. The objective in this paper is to become familiar with the concept of wireless technology. Various topics are covered to include Wireless history, standards, basic principles, regulatory change, and global implications. There was a time when you could easily count all the men in the country who even pretended to know anything about wireless. No one of the few who were working with wireless then, knew whether a set carefully put together would work at all or how far the signals could be heard. Transmissions of a hundred miles or more were hailed as remarkable. Present-day radio listeners are quite prone to think of radio as nothing more than telephonic broadcasting. But before the wireless telephone, came tremendous amounts of hard, sometimes discouraging, but always fascinating and essentially romantic work. Wireless first startled the world’s fair in 1904. At that time there was, of course, no radio public, and the range of wireless was only a few miles. The sending and receiving instruments were unbelievably crude, resembling in no way the marvels of today. Messages were sent at the snail-like pace of a few words per minute, in the...
Words: 6344 - Pages: 26
... BUILDING A SUCCESSFUL NETWORK 2 Abstract This paper explores different methods of networking techniques in order to build a successful network in Ocper, Inc. On the last proposal, the company was ready to expand its business by changing its network from peer to peer to client/ server network. Today, wireless network become more popular. In order to compete with other businesses and to adapt with the evolving technology, Ocper, Inc is getting ready to proceed to adapt wireless networking. Wireless networks are uniquely positioned today to support corporate enterprise client/server efforts in order to extend the reach of information systems to the front lines of business operations. VPN access in wireless network is also beneficial to Ocper, Inc.; because it allows an organization to carve out a private WAN through the internet, serving only its offices, while keeping the data secure and isolated from the other (public) traffic. The best option for VPN access for the employees to remotely access the Ocper, Inc. network is by way of SSL-based VPNs. They provide remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption (Greene, 2008). Keywords: wireless network, VPN access BUILDING A SUCCESSFUL NETWORK 3 Building a Successful Network A wireless network is the best network to use at Ocper, Inc. because a wireless networks are becoming increasingly popular. The president of...
Words: 1076 - Pages: 5
...Academic Honesty statement: I attest that this is my original work. I have not used unauthorized source of information - including paid sites/services - either modified or unmodified. I attest that the only source of information used in the development of this project has been retrieved from the course textbook and those sources listed within the documentation that is being provided as part of this assignment. I have not given other fellow student(s) access to my code, script, diagram, etc., in any form. Complete the Picture Troy Baillargeon Kaplan University IT 332 Principles of Information Systems Architecture May 4, 2014 Table of Contents Abstract 4 Introduction 5 Operating System 5 Servers 5 Computers 6 File System 7 Processors 9 Servers 9 Computers 10 Cluster Architecture 11 Network Architecture 12 Network Topology 14 Conclusion 15 References 16 Abstract This paper will discuss the suggested solution for our new network architecture. With our insurance company moving to new headquarters in Denver, Colorado and the expansion of our company to include satellite offices on both the east and west coast we will need to have a better system architecture which would include new processors, new operating system for our computers and servers, proper data backup, cluster architecture and use of RAID. All these details are important to make sure we have the proper infrastructure in place to continue to have high availability...
Words: 3828 - Pages: 16
...following case study and answer the following questions. 1. Briefly describe the current state of NDAS’s office automation, system integration, and networking. Begin by explaining how each department uses information technology, what hardware it uses, and what functions currently are automated. Also assess which department is most in need of a network. [5 marks] The level of automation varies significantly among the NDAS departments and offices. In addition, NDAS is in the process of downsizing to achieve a more cost-effective computer support system. For example, the Sales and Marketing Division has a desktop computer for each of the account representatives. All of these computers are connected to a small local area network (LAN) that serves only the Sales and Marketing Division. The Accounts Receivable Division recently downsized its minicomputer to a powerful desktop computer with a faster processor, motor memory and increased disk storage space. This new desktop supports databases for both customer billing and “bad dept” expenses. The Accounts Payable Division has an older minicomputer and is in the process of downsizing to a modern powerful desktop computer. It has its own vendor database that includes invoices...
Words: 1815 - Pages: 8
...IT190-1502B-10 Introduction to IT Introduction to IT Document Shell Shamika Herrington May 25, 2015 Table of Contents Section 1: Information Systems Overview 3 MDHS: Program Selection and Job Functions 3 Job Functions 4 Section 2: Information Systems Concepts 6 Networks: WAN and LAN 6 Wi-Fi, Telecommuting, and Associated Issues 7 Section 3: Business Information Systems 9 Management Information Systems 9 Transaction Processing Systems 10 Decision Support Systems and Artificial Intelligence 11 Transforming Data to Information and Information to Knowledge 11 Section 4: System Development 13 Waterfall Model 13 Prototype Model 14 Section5: Information Systems and Society 15 Approaches Hackers Use to Steal Data 15 Preventing Hackers From Stealing Data 16 References 18 Section 1: Information Systems Overview MDHS: Program Selection and Job Functions The Mississippi Department of Human Services is an organization whose sole purpose is to assist and serve the residents of Mississippi. The services range from offering nutrition assistance through Supplemental Nutrition Assistance Program (SNAP) and employment assistance through the Temporary Assistance for Needy Families (TANF) to offering support for families and children. There are many different programs that are offered through programs in specific departments. Each department uses specific computer resources to assist the clients within their respective counties. It is important...
Words: 3669 - Pages: 15
...Week 5 Individual Final Assignment Galo Figueroa NTC / 362 October 26th, 2017 Eric Winch Week 5 Individual Final Assignment I will begin by explaining the network’s current characteristics and components. KFF is comprised of three geographic locations in San Diego County, California. Their home office is located in La Jolla. The two other locations are in Del Mar and Encinitas. They have an OC 1 SONET using a T3 dedicated line connecting all three stores. This requires a fiber optic physical connection between stores since a T3 is equivalent to 28 T1 lines. This dedicated network is leased from the ISP and is guaranteed a continuous uninterrupted connection. This type of connection allows for a total of about 44736 Kbps and has 672 channels. KFF is using a 25Mbps connection to the internet. All three KFF locations are using a linear bus topology using 100base T Ethernet, which means that Ethernet is used and allows for data transfer rates of up to 100Mbps. The file server, workstations and all equipment previously mentioned are connected to a linear cable. This type of LAN network has disadvantages that outweigh the advantages. One major disadvantage is that the entire network is disabled if there is a break in the main cable, and locating the break can prove to be difficult. Another disadvantage is that the more devices are added, the less efficient it becomes. This outdated design broadcasts data which uses up important bandwidth that can be used for better purposes...
Words: 1984 - Pages: 8
...Storage Devices 21 Computer Networks – LAN and WAN 22 Systems Software and Application Software……………………………………………24 Conclusion 24 Bibliography 25 Introduction This project is been carried out for the Business Computing module for the Computer and Network Technician FETAC Level 5 Certificate course. In completing this project I hope to acquire a greater understanding of computers and the technology that is commonly used with them in the modern workplace. The carrying out of this project itself will also hopefully leave me better equipped with the skills to carry out projects in the workplace if I am required to do so in the future. For this project I will use the internet to research for the information that this report requires. Once I feel confident I have enough sources for the topics that need to be covered I will start choosing relevant information from these websites and use them in my report where needed. If needed the information taken from websites will be rephrased so that the content is fully relevant to the project. For this report I will use various Internet search engines to find my information. For browsing websites I will use Google Chrome and its syncing bookmarks feature. For typing up the report I will use Microsoft Word. For any image editing I will use Adobe Photoshop CS 6. By the end of this report I hope to have a greater knowledge of how to use Internet search engines for carrying out research. I also hope...
Words: 4963 - Pages: 20
...Riordan Network Design Project NTC/362 November, 2013 Riordan Network Design Project Riordan Manufacturing is a plastics manufacturing company that produces products such as beverage containers, custom plastic parts and plastic fans. Riordan was created in 1991 and was founded by Dr. Riordan. Riordan currently has a location in Hangzhou China and is moving that location to Shanghai China. This document will outline the network design, Project timeline, design approach, detailed design, current network topology, new network topology, security and plans for starting up new location and decommissioning the old location. Network Design Project Timeline Assignment | Timeline | Design Approach | Phase 1-Four Weeks | Detailed Design | Phase 1-Four Weeks | Current Network and Establishing New Network | Phase 2 6 weeks | Security Considerations | Phase 2 6 weeks | Decommissioning Old Facility | Phase 3 4 weeks | Old Equipment | Phase 3 4 weeks | Old and New Employees | Phase 3 4 weeks | Design Approach and Rationale Riordan Manufacturing is currently seeking to move the current location from Hangzhou China to Shanghai China. In order to successfully move the entire location to its new location we will setup the new location and get it up and running before we shut down the current location. In doing so we will need to purchase new hardware and software for the new location and also setup a new firewall...
Words: 1997 - Pages: 8
...network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients would be notified of the changes being made via email, departmental meetings, and online training in order to be able to find their files and incur minimal downtime. | 6. Basic requirementsSome of the basic requirements we would be looking at would be the cost effectiveness of using cloud services, the capacity of our current networks to be able to maintain a feasible connectivity for the...
Words: 3576 - Pages: 15
...other, we need to understand the type of devices and how they need to be configured within the network. We cannot form a network without communication devices and understanding their uses. To develop any type of network, communication devices are required and in this paper I will talk about three devices that are used within a network environment. The first device I want to mention is a NIC Adapter. NIC stands for Network Interface Card, I consider this the most important network hardware when building your LAN (Local Area Network), WAN (Wide Area Network), or even MAN (Metro Area Network). This adapter is the most common part of the computer we use for our offices and homes. To call your office space a network, these cards need to be attached together with communication mediums (cables). Each card is assigned a unique MAC address that will identify the system it is in. Once you establish your LAN, then you can move on to connect with other LANs which will form a WAN or MAN, not only through the NIC Adapter but other network devices mentioned below. This is where a Router comes into play. A router is an intelligent network device which transmits data to other destined computers. It connects two networks and like I said, it forwards packets between them according to the information in the packet header. This communication occurs at the network layer of the OSI model. Routing was initially performed by general purpose computers, but today they are typically performed by dedicated...
Words: 607 - Pages: 3
...GROUP 2 PROJECT PART 1: DESIGNING A NETWORK PART 2: TYPES OF EQUIPMENT PART 3: PROTOCOL CHOICES PART 4: COMPANY PHONE SYSTEM PART 5: SECURITY PROPOSAL Project scenario: ABC Company with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, and Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. The main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo. Corporate Headquarters are in San Francisco. The remaining offices are sales offices. Consider the company to operate on a 24x7 basis, because it is global. To meet the goals of this scenario, Group 2, made up of the members below, have been assigned the following tasks in designing a network structure for this project: 1. Sean Dillon: Project Manager, Contributor; Editor Parts 1, 2, 3, 4 and 5; Submitter. 2. Denzel Chatman: Project Contributor; Section 3. Parts 1, 2, 3, 4 and 5. 3. Christopher Foster: Project Contributor; Section 1-A. Part 1; Part 2; Part 3; Part 4; Part 5. 4. William Collado Cancel: Project Contributor; Section 1-E. Part 1; Part 2; Part 3; Part 4; Part 5; Microsoft Project Editor. 5. Alex Graves: Project Contributor; Section 1-B. Part 1; Part 2; Part 3; Part 4; Part 5. 6. Mark Fortune: Project Contributor; Section 1-C. Part 1;...
Words: 10833 - Pages: 44
...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in...
Words: 12317 - Pages: 50
...might involve an electrical hazard? A. Fitting or removing a plug B. Switching a computer on at the mains C. Walking on a carpet that builds up static electricity D. Fitting the paper tray on the copier C. A firm installing a large new computer system at its head office with a large number of workstations connected to the centeral processor. The health and safety officer has expressed concern that the large amount of cabling required for the system will create a safety hazard, due to the risk that staff will tread on or trip over cables. What is the most appropriate way of dealing with this hazard? A. Reducing the number of workstations B. Putting the workstations physically closer together C. Putting the workstations physically further a part D. Using under – floor cabling D. Which of the following basic safety checks should be made each time a desk to computer is watched on i. The mouse should be properly connected to the computer ii. There should be no spilled liquid on the desktop, such as a spilled cup of coffee iii. Any extension cable used to connect the computer to the electricity mains is not lying across any passage way in the office A. (i) and (ii) only B. (i) and (iii) only C. (ii) and (iii) only D. (i), (ii) and (iii) E. When you switch on your computer ,the display screen shows a message informing you that the computer c annot detect a connection to the mouse . You need to check the connection...
Words: 2988 - Pages: 12
...Technical Project Paper: Information Systems Security Information Systems Security Haseeb Ahmed Khan Mark O’Connell CIS 333 Fundamentals of Information Security March 12, 2012 Abstract In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution. The case we have been assigned today deals with physical and logical vulnerabilities and protection against the risks and threats by implying the best controls to either mitigate, avoid and transfer the risks. Being an Information Security officer at a newly opened location in a busy mall, I have been asked to identify physical and logical risks to the pharmacy operations and also to suggest remedies to avoid any huge loss to the business. The pharmacy operations involve the unique transactions which involves the critical patients’ data, valuable medication and access to cash. The regulation set by the government obligates a pharmacy to meet certain standards to secure logical and physical access to information systems. The pharmacy is comprised of 4 work...
Words: 2531 - Pages: 11