Free Essay

Project Part 2 - Executive Summary

In: Computers and Technology

Submitted By mozurjus
Words 251
Pages 2
Students need to summarize their learning in Tasks 1–3 of Project Part 2

Given the scenario that it's a requirement for a customer to read confidential data but not modify it, and at the same time any information to be modified by authorized personnel. This data to be stored on the LAN of the First World Bank Savings and Loan.
First it is listed the there should be some sort of Anti-virus/Anti-malware that runs with the solutions and services on the Linux network. This provides multi-layered security for the servers, and at the same time, protects the file system in real-time. This allows users to view the data without manipulating it.
The Second is the recommended network sharing service. Network File Service (NFS) is recommened where access is through Secure Socket Layer (SSL). NFS allows the mounting of file systems on remote computers, & access to them. The client or accessing computer would just need to be running NFS client which is compatible with the NFS server. This is done with the mount points, and after the share or file, is mounted, all I/O operations are written back to the server. All clients then notice the change instantaneously, as if it was on the local filesystem.
Lastly it is recommended to use NFS with access to the LAN via SSL. The encryption that is used will make sure that the data is not compromised and is kept within the C-I-A Triad.

Similar Documents

Premium Essay

Microeconomics Project Part 2

...Sales & Marketing Management CA 2 – Group Project (20%) ________________________________________________________________ Group Project • • • • • • Form groups of no more than 5 students to work on this project. A list of products and customer groups, is given on the next page. Discuss among your group members which product your group will choose. No two groups can do the same product. Choice is on a first-come-first-serve basis. Register your product with your lecturer by Lesson 2 Report Component 1. Research and briefly explain about this customer group you have selected. 2. Research and showcase your knowledge of your chosen product. 3. Explain how you intend to sell your product to this customer group. 4. Presentation materials Your report should be type-written and 1.5-spaced in 11-point (Arial or Times) font. You must produce a picture/visual of your chosen product to accompany the report. It must not exceed 1500 words (not inclusive of the presentation materials) This report is due on 11/6/2012, 1159AM. Presentation Component 1. Each group is given 20 minutes to make the sales presentation to the chosen customer group. A 10-mark penalty will be imposed for exceeding the time limit. 2. Every member in the team must present his/her part. Absentees without a valid reason will be given a zero grade. Presentations are scheduled for Lessons 11 and 12. Each group will be allotted a slot to present. Products 1 Photocopy machines 2 2-liter cars 3 Laptops 4......

Words: 548 - Pages: 3

Premium Essay

Project Part 2

...Project Part 2 Entrepreneur Edward Date: 7/14/12 To: My Boss I have researched ice cream and the effects of supply and demand associated with it. I have found several reasons for the increase or decrease in supply and demand and thought you may be interested in my findings. The first issue I have found would be the seasonal changes in the area that the ice cream would be sold. Customers seem to demand ice cream when the weather is hot and they are looking for a way to cool off. So, in the spring/summer months the demand would be high. When the season changes to fall/winter the demand seems to shift to the lesser. Climate of the area has a huge effect on ice cream sales. Secondly, a change in taste could shift the demand to less, People’s taste changes from time to time and there are other substitutes to ice cream. Also if people were to start dieting that could also affect the demand for ice cream. An increase in the price of sugar, and dairy would shift the supply curve to the lesser. With an increase in the cost of making ice cream it would in turn cause companies to order less and raise prices. Therefore people would be paying more for their beloved ice cream. An increase in electricity costs, cow feed, natural gas could also effect the supply curve in a negative way. Increasing the cost of production will shorten supply and increase costs over time....

Words: 255 - Pages: 2

Premium Essay

Project Part 2 It Security

...infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses. Malicious Code A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes. Malware Short for malicious software, software designed to infiltrate a computer system without the owner's informed consent. Usually refers to a variety of forms of hostile, intrusive, or annoying software or program code. Malware encompasses computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software. Casey L. Swain NT2580 August 25, 2013 Project Part 2: Student SSCP® Domain Research Paper REFERENCES Kim D. & Solomon G. M., (2012). Fundamentals of Information Systems Security: The Seven Domains of a Typical IT Infrastructure (1st ed.), 15-33. Burlington, MA. The State of Queensland Government. Department of Education, Training and Employment. Malware and Malicious Code Prevention. July 27, 2012. Web. Aug. 2013 <http://ppr.det.qld.gov.au/corp/ict/management/Pages/Malware-and-Malicious-Code-Prevention.aspx>...

Words: 953 - Pages: 4

Free Essay

Project Part 2

...include in the GDP. I think some activities out of our standard of living that the nation does not rely on, their use might encounter some inaccuracies and defect the national income account. We will not accurately measure black market activities and inflation which is always adjusted for some reasons. Also the GDP does not take welfare into account. The GDP is considered to be the market value of all final goods and services produced in the economy during a period of one year, plus income earned locally by the foreigners minus income earned abroad by the nationals, then the GDP shows another limitation of the national income account; some of the activities to external parties to the production or consumption are simply dismissed. Exercise 2: Chapter 16 Question 5 Frictional unemployment is the time period between jobs when a worker is searching for a better job in comparing his or her previous job to another suitable job. It is the economy stage in which short-term unemployed and employers search respectively the best job and the most skilled employees. The frictional unemployment include the labor force who for some reasons such as searching a better job, moving to another location or they just lost their job therefore look for another job. This does not affect negatively the economy, indeed it is a sign of well-being or healthy economy, due to the fast-growing economy with a mobile and adaptable labor force that have choices. Frictional unemployment is important......

Words: 1030 - Pages: 5

Free Essay

Nt1310 Project Part 2

...This is an Executive Summary Plan for our new building for which construction begins in exactly six weeks. My name is David Pierce and I will be the Project manager for the design and installation of our new cable network for that building. I am excited to be a part of the project and look forward to working with each and every one of you during this exciting time of growth for our company. When considering the capacity if this project I ask you to consider all ideas or changes you see as plausible and should be brought to my attention at anytime. All input will be appreciated and welcomed. When I was assigned with this project I was given several different diagrams of how our new building will be occupied and a few different floor plans. With these my team and I will need to come up with a wiring diagram that will not fit our building’s needs but also allow for future growth of our building. With this project we plan for it to be a bit more expensive than common plans but it will allow for less problematic growth of our building and network in the future. When tacking a project like this we have several different issues that must be addressed. Our first priority in this process is to understand all of the proper building standards and codes. There are several different organizations that we will have to contact and work with to include the Insulated Cable Engineers Association and the Electronic Industries Alliance (EIA). These organizations, along with a few others will......

Words: 2276 - Pages: 10

Premium Essay

Project Part 1 - Executive Summary

...Students need to summarize their learning in Tasks 1–3 of Project Part 1 In the first part of the project we listed out the security policy recommended for First World Bank Savings and Loan. This included listing the scope of the project, to cover the estimated $100,000,000 annually at least, in online credit card transactions. This also listed the Roles and Responsibilities to include the cost, performance, and security in the open source infrastructure. The C-I-A- Triad was specified by three goals in Information Security (Confidentiality, Integrity, and Availability). Confidentiality is that information is not disclosed to those it should not, Integrity is that any information is only modified by authorized users and is stored in a secure location, and Availability is that the information is only made accessible at specific times and via specific avenues (SSL). The fact that there are government regulations that must be adhered to, and if not there are penalties that are enforced (eg. Jail-time, termination, monetary fines, etc.). It recommended a security framework implementing various security access controls. Some of these controls were the use of LSM’s, Discretionary access controls via SELinux, Domain and Type Enforcement (DTE), and Linux Intrusion Detection System (LIDS). The second part of the project was listing various open source software for the servers and the reasons why they are recommended. The four that were recommended were Apache Web Server – the......

Words: 304 - Pages: 2

Premium Essay

Project Part 1 - Executive Summary

...Students need to summarize their learning in Tasks 1–3 of Project Part 1 In the first part of the project we listed out the security policy recommended for First World Bank Savings and Loan. This included listing the scope of the project, to cover the estimated $100,000,000 annually at least, in online credit card transactions. This also listed the Roles and Responsibilities to include the cost, performance, and security in the open source infrastructure. The C-I-A- Triad was specified by three goals in Information Security (Confidentiality, Integrity, and Availability). Confidentiality is that information is not disclosed to those it should not, Integrity is that any information is only modified by authorized users and is stored in a secure location, and Availability is that the information is only made accessible at specific times and via specific avenues (SSL). The fact that there are government regulations that must be adhered to, and if not there are penalties that are enforced (eg. Jail-time, termination, monetary fines, etc.). It recommended a security framework implementing various security access controls. Some of these controls were the use of LSM’s, Discretionary access controls via SELinux, Domain and Type Enforcement (DTE), and Linux Intrusion Detection System (LIDS). The second part of the project was listing various open source software for the servers and the reasons why they are recommended. The four that were recommended were Apache Web Server – the......

Words: 304 - Pages: 2

Free Essay

Project Part 3 - Executive Summary

...Summary of the Project part 3 is regarding the use of a Kernel & Recommended Software Management Plan for Linux, the need to install anti-virus software on Linux servers, & how to manage critical and noncritical security-related updates. Regarding the Kernel used to support the Linux based infrastructure is to use one of the vendors available (Red Hat, Novell, or Canonical/Unbuntu). Of these there were only two (Red Hat & Unbuntu) that are ready for enterprise systems and do a great job with customization. No matter what is chosen (open-source or vendor distribution), the first thing that needs to be done is to update the security. It cannot be stress enough that you must not implement security updates to a “live” network. Any security updates that are sent out by authorized personnel to use on the live network, must first be thoroughly tested inside a virtual “test’ environment. It is mentioned that the stock kernel option (open-source) is not recommended due to the amount of information that is needed to sort through in order for the specific needs of the industry (organization). Because of the work-load involved in sorting through system software that is used, and not all of the system software that is used will be listed. This is a complete waste of time and resources. The second thing mentioned is for a software management plan. It is recommended to use RPM as the software management tool, which forms the core of administration on most systems. The...

Words: 388 - Pages: 2

Free Essay

Menu Project Part 2

...Nutrition for the Young Child ECE 130 Graded Project #405030 Part II: Menu Children 3-5 Years Old Monday Tuesday Wednesday Thursday Friday Breakfast • Milk • Bread • Fruit/Vegetables 1/3 cup cereal 3/4 cup low-fat milk ½ cup fruit juice ½ cup orange fresh sections ½ cinnamon roll ¾ cup low-fat milk ½ cup diced peaches 1 blueberry pancake w/1 Tbsp low-cal syrup ¾ cup low-fat milk ½ cup pear halves ½ slice wheat toast w/ ½ oz low fat cheddar cheese, melted ¾ cup low-fat milk ½ cup fresh banana slices ⅓ cup unsweetened cereal ¾ cup low-fat milk Snack • Bread • Fruit/Vegetable or Milk 4 crackers with 1.5 oz low-fat cheese Water ½ toasted English muffin with 1 Tbsp peanut butter 3/4 cup low-fat milk ½ cup low-fat yogurt with 1 Tbsp granola ½ whole wheat roll ½ cup sliced fresh strawberries ½ oz graham crackers (2 crackers) ½ cup diced peaches, Water ½ oz wheat crackers (4 crackers) ½ oz cheddar cheese Water Lunch • Milk • Bread • Fruit/Vegetable • Fruit/Vegetable • Protein ½ turkey sandwich with 1.5oz turkey ½ cup cooked vegetables ½ banana ¾ cup low-fat milk 1 Pizza Pocket 1/2 cup green salad w/1 Tbsp low-fat dressing 1/2 cup apricot halves 4 oz low-fat yogurt ¾ cup low-fat milk 1.5oz Baked Chicken 1/2 cup boiled carrots 1/2 cup fresh orange sections ¼ cup cooked rice ¾ cup low-fat milk 1 ½ oz lean, broiled hamburger patty 1/2 cup lettuce and tomato salad 1/2 cup pineapple ½ whole wheat bun ¾ cup......

Words: 605 - Pages: 3

Premium Essay

Eg481 Project Part 2

...Project Part 2 This research and overview provides awareness of global warming and how our planet’s atmosphere is overloaded with heat trapping carbon dioxide (CO2), which threatens wide-ranging disorder in climate with devastating consequences. Global warming is an environmental issue that affects human health, ecosystem, etc. and this study is summed up into basic responses and opposing viewpoints. I. What are the causes of global warming? • CO2 emissions and increased concentration of greenhouse gases • Human activity is causing the Earth to get hotter • Global warming is a natural occurrence of nature a. Deforestation and natural resources are part of the earth’s cycle b. Negative conception due to media c. Lack of scientific evidence II. Global warming causes serious concern. • Record-breaking extreme weather a. Severe droughts b. Damaging wildfires c. Rising sea levels, warmer temperatures d. Heat waves; diseases • Clean Air Act (CAA), Endangered Species Act, and the Clean Water Act (CWA) that addresses pollution from sewage systems and storm water run-off • NRDC examines long-range consequences if issue is not addressed III. Solving global warming will improve our lives. • Set practical and feasible limits on global warming pollution; in accordance with EPA standards • Think “green” a. Smart cars b. Public transportation c. Communities and buildings d. Stricter efficiency requirements for appliances IV. Curbing climate......

Words: 484 - Pages: 2

Free Essay

Project Part 3 - Executive Summary

...After reading the article of corporal punishment for children I would have agree to a certain extent with John Rosemond. He not only defends spanking but also believes that it is a vital part of raising healthy children. I understand some of his assessment, being from the era of paddling and detention I seen firsthand how effective this kind of punishment could be. Students were more attentive and respective to the teachers in that time. There were some that still caused problems due to no discipline at home but for the most part if you had the right teacher, they could speak enough fear in you that you never wanted to “feel the pine”. With that being said, I was one of the one that needed to “feel” in order to believe what the teacher was saying was true. I had gotten in some trouble earlier one day due to not listening to the teacher because I was the class clown and was liking the attention that the girls and my male classmate was giving me but mainly because the girls was giving some attention. The teach I guess had taken all the disruptions she was going to take and decided that I would be perfect candidate to help her demonstrate how far back her little arm could go back behind her She called me up front and walked over to a drawn that came out about five foot. She pulled out a long board like she was wilding a sword. This thing had holes drilled in it that was about two inches in diameter space throughout the flat portion. I learned that the hole help......

Words: 470 - Pages: 2

Free Essay

Course Project Part 2

...Formal Proposal Submission Assignment Go to the https://fbo.gov 1. Search for an opportunities within a 90 day period and select any opportunity of your choice. 2. Include the solicitation Number and Contract Award date. 3. Submit a formal written proposal in response to the opportunity that you have selected.   Evaluation Criteria  Technical merit is substantially more important than price in determining who will be included in the competitive range. As proposals become more technically equal, price will take on greater significance. The Government will select the top 3-5 Offers, considering the following evaluation criteria, listed in descending order of importance. * Technical Approach * Subject Matter Knowledge * Key Staff and Other Resources * Past Performance * Cost   Written Proposal Format and Instructions Your written proposal must have a minimum of 20 pages but not exceed 25 pages in length and include the items below: * 1 Page Business Professional Cover Letter addressed to the bid contact, including your overall cost estimate (bid) for the project. * Technical Approach should be at least 5-7 pages and include a description of your management plan for the overall project. Hint: Use of PM concepts apply here! * Resumes should be summarized for the key staff that you are proposing indicating their past experience, skills and education relative to the bid selection (at least 3-5 – one page each).......

Words: 445 - Pages: 2

Free Essay

Lab 2 Case Study Executive Summary Is3350

...Executive Summary on Veteran’s Affairs (VA) and Loss of Private Information On 3 May 2006, a Department of Veterans Affairs (VA) laptop was stolen from a VA data analyst’s home in Montgomery County, Maryland. In addition to the laptop, a personal external hard drive was stolen. The external hard drive contained the personal data (names, social security numbers, dates of birth, disability ratings) for 26.5 million veterans and their spouses. It should be noted that the massive data theft was only one of many that had been discovered over the course of 1.5 years. Upon discovery of the theft, the VA employee immediately notified the local police and his supervisors. His supervisors did not notify the Veterans Affairs Secretary until 16 May 2006. On 17 May 2006, the Veterans Affairs Secretary notified the FBI, who began to work with the Montgomery County police to investigate the theft. There were two main issues in this incident that I identified. Issue 1 was the VA employees had authorization to access and use the VA databases for performance of his duties. He was not authorized to take it home as he had no official need to have the data at home. The private data was not properly safeguarded. He failed to password protect (at the very minimum) and encrypt it. Issue 2 was the response of managers and senior executives regarding the notification of stolen data were inappropriate and not timely. They failed to determine the magnitude of the data loss. There was a failure......

Words: 336 - Pages: 2

Free Essay

Project Part 2

...This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the training that makes it possible to do the job. To prevent malicious software and etc. in the 7 domains of an IT infrastructure, you can isolate and install preventions for each domain. The domains are as follows: User Domain, Workstation Domain, LAN Domain, and LAN to WAN Domain, Remote Access Domain, WAN Domain, and the System/Application Domain. The first part of the IT infrastructure is the User Domain. It is the weakest link in the IT infrastructure and this is where the users connect to the system. You can make the user aware to the risks and threats that they are susceptible to by holding an Awareness Training session. The system is password protected however; you should change passwords every few months to prevent an attack. Also, log the users as they enter and exit the system to make sure there’s no unauthorized access. While it’s the company’s choice to allow employees to bring in USB/Removable drives, you have a threat to someone obtaining the wrong information, or getting malicious software into the system. If you allow the USB/Removable drives, have a virus scan every time someone inserts one into a company computer. In a Workstation Domain, you need to make sure virus protection is set up. You are protecting administrative, workstations, laptops, departmental workstations and servers, network and operating system software. You can enable password protection...

Words: 331 - Pages: 2

Premium Essay

Informatics Project Management Executive Summary

...Ezekiel’s Project Charter Project: Individual Assignment Date 20/9/2015 Scope Overview The scope of my project will outline the coverage of the IT infrastructure for the location of which I have decided to hold this conference, Curtin Stadium. To ensure that the venue is properly setup for the distinguished guest, I must correctly plan, allocate and design a layout so that the IT infrastructure in the building is fully setup and ready to go on the day. To ensure that Curtin Stadium can host: * 1000 Attendees * Business Case The purpose of this project is to ensure that every aspect of the IT infrastructure within the Curtin Stadium is setup correctly in order for the function to commence without any faults. Background (optional) Milestone Schedule and Deliverables Milestone | Completion Date | Stakeholder Judge | Acceptance Criteria | Project Requirements Approved | June 2 | Curtin | Sign off from Stakeholders | Agree on Audio/Visual Equipment | | ICT Curtin | Contract with Hardware vendor | Hardware acquired | | ICT CurtinContract Audio/Visual partners to install | Contract with Hardware Vendor | Software Acquired | | | | Implementing the new Hardware and Slo | | | | Determining Location of the Event, Determining IT staff, Determining Marketing crew for the event, Determining audio visual Installation staff, | | | | To Ensure success in the event | June 5 | | | * Select Project Team members | * | * Project......

Words: 332 - Pages: 2