Free Essay

Unit 1 Assignment 2

In:

Submitted By christopherrose
Words 2675
Pages 11
In this assignment seven stakeholders of the two businesses chosen will be explained in terms of their interests in the businesses and to evaluate the influences that they have over the businesses in terms of the business running. The two companies in this case are Tesco and Children in Need.
The stakeholders for Tesco that will be assessed in this assignment are: Customers Shareholders Suppliers Employees Local Community Competition Sponsors
The stakeholders for Children in Need that will be assessed in this assignment are: Owners Trustees Media Donators Volunteers Accountants The Cause
Tesco
The customers of Tesco are the people who buy goods and pay for the services from Tesco and Tesco try to persuade them to be lifetime customers and not just one time by offering special deals and bargains for long-time customers and new customers, so they can beat the other supermarkets and be the best. They are an external stakeholder as they are not employees and are outside of the business. In return the customers would want low prices and good quality items, great customer service and for Tesco to listen to the community and change in favour of them so that it is more suited, for example changing packaging so it is more environmentally friendly. The customers probably have the highest influence in terms of Tesco as they are needed for Tesco to increase revenue and earn a profit. They also provide as a motivator for Tesco to improve and expand as they want Tesco to do well for the environment as well with cheap prices.
The shareholders of Tesco are the people that hold a share or multiple shares of the business meaning that they own a bit of it to themselves and can get a profit off of them if Tesco do well in the stock market. Shareholders can be both internal and external for Tesco as they own part of the business but are also outside of it as they do not do anything for them other than hold shares. Shareholders want high amounts of cash back with their shares in the form of dividends, meaning that they want Tesco to earn a huge profit so that they get as much money as possible and their share has been worthwhile. The shareholders influence in terms of the business running is not very high as people can sell their shares back to Tesco when they believe that they aren't getting their money's worth and Tesco could sell them on again when they start to do better so shareholders are not really needed to run the business.
The suppliers for Tesco are the individuals or other business that sell Tesco their products to sell for themselves. Suppliers are external stakeholders of Tesco as they supplier the outside products to them. Suppliers would like Tesco to have good employee relations and manners so that the transaction can happen happily, they would also want fair prices for the good they are providing for the organisation as that is the way they make their money and profits. The suppliers do not influence Tesco very much in terms of the business running as Tesco can always get new suppliers if they are being awkward, uncooperative or unreliable. This is because Tesco is monopolistic in the market it resides in so Tesco has great purchasing power over suppliers allowing them to alter the prices of their supply if not suitable to their required payments.
The employees for Tesco are the individuals within the business that work for Tesco; they are internal stakeholders as they work for and are inside of Tesco. Employees want a good working environment, a fair pay and working hours from Tesco in return for their labour and work that they do for them. The employees can be quite influential depending on their role for the business as the very minor roles with easy tasks can be filled easily but the major roles like district sales manager cannot be replaced easily as they need a lot of training and qualifications to do the job.
The local community are the civilians that live around the area of the business and are an external stakeholder to them as they are the community and do not work inside Tesco. They want Tesco to be an environmentally friendly business so that their living areas do not get polluted and for Tesco to bring more money in and represent them in a good way, they also want employment opportunities from Tesco so that they will not have to travel far to get to their workplace. The local community have a small influence as they are not strong enough to take on Tesco as they are huge. However they can affect Tesco and get them to work more on trying new things to be more environmentally friendly.
The competition can be described as the rivalling businesses that threaten Tesco success through stealing their customers which results in Tesco losing some of their profit an example of this could be ASDA as they are currently one of the more oligopolistic companies in the market. Obviously Tesco’s rivals want to steal their customers to make more sales. The influence of the competition is quite strong as it forces Tesco to work harder to retain their customers and to attract customers of their rivals, also the competition works in the same industry as Tesco meaning that if they give a negative point of view to the public about a product range then not only will it affect Tesco’s rivals but also Tesco itself as is aimed at the company and not the industry itself.
The sponsors of Tesco are the organisations that use Tesco as a sponsor for their product meaning that Tesco give them some money and help them earn money towards what they do as a business. Tesco have sponsored quite a few things in the past such as ‘Cancer Researches Race for Life’, ‘Pride London’, Britain’s largest gay pride event and now the Tesco Finest products sponsor Downton Abbey. These help Tesco get more media coverage and become more well-known over the world. The influence of the sponsors in terms of running the business can be quite high as if Tesco sponsor a charity where the money does not go towards the cause then they could get a bad name and people may refuse to shop there. However if Tesco sponsor a good cause like Pride London then they can get more media coverage and show that they support their customers and community whatever sexual orientation they may be.
Overall, in terms of influence, the most influential stakeholder of Tesco is the customers as without customers they cannot reach their profit goals and will not earn enough revenue to expand or develop into more markets; they also allow Tesco to train their staff with good manners to be polite to everyone that they meet. Another highly influential stakeholder of Tesco would be the competition, such as ASDA, as it means that Tesco need to work harder to keep their customers and to attract new ones, this could also be a motivator for Tesco to expand into new markets and sell different products along with the things they already sell. The least influential stakeholder is the suppliers as Tesco are such a big organisation they would have no trouble finding new suppliers for their products. Another stakeholder with a low influence on Tesco is the shareholders as they own part of the business that they paid for and if they want to get rid of it then it does not affect Tesco as they can just sell it back or to a different individual. Employees could be either high or low in terms of influence as the minor employees can be easily replaced or covered for, but the higher up employees cannot be replaced easily as they would need training and the right qualifications to prove that they can do their job.
Children in Need
The owner is the person who founded the charity and is therefore an internal stakeholder, for Children in Need the owner is Sir Terry Wogan. He founded the charity so his interests are for the success of the charity and for many donations to be made by the public across the UK, to help the cause which is to help the less fortunate children in the UK. He also has to look after everything in the charity and make sure the donations go to the right places and not to the wrong charities. In return from the charity the owner would mainly like all of the support they can get by the other stakeholders of the organisation. They have a strong influence as they own the charity and determine the strategic direction of the charity, although they do not have control over people’s opinions. In terms of Children in Need, the influence of the owner is not the strongest stakeholder to have in the charity but is not the weakest either; this stakeholder would be quite high up in the importance of the charity.
A trustee is an individual person or a member of a board that has been given control or power of administration of property in the trust with legal obligation to administer it solely for the purposes specified as they work inside the organisation they are an internal stakeholder. A trustee wants the charity to do well in order to achieve their goals in the business, they are not motivated by pay as they are motivated solely by the cause of the charity, which in terms of Children in Need is to help under privileged children in the UK. In return a trustee wants the general support of the people for the charity to help it succeed in the long term and help the cause as much as it can. A trustee has a very strong influence in terms of the direction of the charity; however they are only a tool to the charity trying to get more donators to donate towards the cause, and for this reason lowering their influence on the charity.
The media are businesses that report on the charity, this could be by any platform like TV news or radio like what BBC do as they are a part of the charity and even newspapers like ‘The Sun’. The media work outside of the business so they are an external stakeholder. The media’s interests are that they want the information of whatever the charity are doing, whether it be a success or a failure, to inform the public on whether their donations will be put to good use and towards the cause. In return they would like the charity to give as much information as they can to the media so that they have something to do reports and articles on and do not lose their viewer’s support. They are very influential as the feedback they give will tell the public and their viewers whether it is good to donate to the charity or to not donate if they believe that it does not go to the cause completely, by giving a negative comment in their feedback. They will determine the amount of donations that are made by the viewers.
Donators are the individuals or organisations that support the charity with donations in the form of financial support to ensure that it proves successful in aiding the cause. Donators tend to be outside of the organisation, although some workers can be donators as well, so they are external stakeholders. The donators want to be able to help the charity and the cause through their donations and they want the charity to do really well and actually change the children’s lives. In return donators want the charity to do really well and put the donations to good use and actually help the people that they plan to. Donators are the strongest form of influence any charity can have as if there were no donators then no money would be raised for the cause and the charity would not be able to help anyone and be forced to shut down due to the lack of donators. For example, this year (2014) on one day the public helped Children in Need raise over £32 million during a seven hour telethon on BBC ONE.
The volunteers are the unpaid workers who voluntarily work for a business or charity to benefit themselves by giving themselves a look at what it is like in a business environment and giving them a good working experience that will help on their CV and the organisation they are working with. Volunteers are working inside of the business and are therefore internal stakeholders. Volunteer workers want do it for the experience they will gain whilst working for the charity and sometimes they do it as they believe in the cause and want to help it in a better way than just donating, it would look really good on anyone’s CV to have volunteer work for a charity as it shows that the person will happily work without the motivation from money and that they will work just to help people and a cause. Even though they help with aiding the business, they are not very influential as they do not do anything to further the help of the cause in a unique and innovative way. This makes them one of the least influential stakeholders going.
Accountants are the individuals within the organisation who maintain the financial records with high accuracy to make sure the money raised for the cause it budgeted and given out to the included charities fairly. The accountants’ are hired to help the organisation from the inside so they are internal stakeholders. They are generally motivated by profit but they may be helping the charity as they feel for the cause and want to help it in any way they can. In return, they want the charity to pay them a fair wage and a good working environment and reasonable times and breaks. They are not very influential in raising money for the cause or charity but are essential in terms of controlling the money and helping with the distribution of the raised money.
The cause is the people or thing that the charity is working towards saving or getting rid of so that everyone can have a better life that they help. The cause is an external stakeholder as they are not directly working with the charity or involved anyway although the charity is the main reason the charity is running, to help them. In return from the charity this stakeholder would like the donation money to go towards the cause and for it to actually help the cause at hand, in this case the cause is the under privileged children in the UK. Although the cause is the reason the charity exists and is running they are not really a high contester in terms of influence to the charity as they do not support the charity in any way and they are only interested in the charity as they are getting helped by it, they are not helping it in any way.
Overall, in terms of influence the most needed and influential stakeholders of the charity, Children in Need are the donators as they are needed to fund the running of the charity and to help the cause they were also the main force behind the £32 million raised in the BBC telethon, and the media as they will determine the amount of donations that are made by the viewers by the feedback they give on the charity. The least influential and needed stakeholders of the charity are the cause as they do not help in any way as they are the ones getting helped, and the volunteers as they do not provide any help to the cause and are only providing a little help to the charity so that they can further their own needs and benefit themselves.

Similar Documents

Free Essay

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is an...

Words: 274 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that spans...

Words: 289 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Free Essay

Unit 1 Assignment 2

...Unit 1 Assignment 2 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some user...

Words: 275 - Pages: 2

Free Essay

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company...

Words: 414 - Pages: 2

Free Essay

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because they...

Words: 314 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company...

Words: 413 - Pages: 2

Free Essay

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This ruling...

Words: 480 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...The “Internal Use Only” data classification at Richman Investments will include the User domain, Workstation domain, and the LAN domain. This data classification will include information such as new employee training materials, company telephone/email directory, and internal policy manuals. Even though this is not “Top Secret” information it is still important for the company to keep the information within the company. The User domain covers all of the employees that will be connecting to the company’s network. Since human beings cannot be controlled like computers this domain is the weakest out of the seven domains. In order to protect the company employees must sign an AUP before being allowed to connect to the network. The Workstation domain is where users first access company systems, applications, and data. In order to connect users will be required to login with their own unique username and password. Users will only be allowed to use company computers on the network. Company computers will be kept up to date on all software patches and updates in order to help ensure security. The LAN domain includes all data closets and physical as well as logical elements of the LAN. All data closets will be locked down and only authorized personnel will have access. The largest threat to this domain is unauthorized access. All users will undergo background checks through Human Resources to ensure they can be trusted on the company’s LAN. Works Cited Kim, D., & Solomon, M. (2012)...

Words: 257 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...Dear Supervisor: The IT infrastructure that is affected by the “Internal Use Only” data includes the following; User domain, Workstation domain, and LAN domain. The User domain is the person who is going to be using any Workstation at any given time and how this can be protected is by placing in effect an Acceptable use policy (AUP). An AUP defines what the users are allowed to access within the office. The Workstation domain is the physical computer that any employee has access to and how this can be protected from certain threats is by placing in effect the following; configure the hardware, hardening the system, and verifying antivirus files. Configuring the workstation would include not allowing the CD/DVD drive to work and any USB that is connected to the computer is automatically encrypting the data that is transferred to it so it cannot be used outside of the office. Verifying the antivirus files is just making sure that the antivirus software is up to date and is stopping most of the viruses that are coming into the network. And hardening the system is just ensuring that all the workstations have the latest software revisions, security patches, and system configurations. LAN domain is what connects all the workstations in the building. How this can be more secure is by implementing access control by setting up user LAN accounts with logins and passwords. Design of directory and file services which user will have to access. Configure workstations and servers to use...

Words: 295 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Course GS1145 06/28/2015 6:00PM Dear Mrs. Phifer, As a returning student to college I have very few if any questions. I know you are thinking if that is the case then why you haven’t graduated from a college or university. But the reason for so little questions and concerns is because I’ve realized my mistakes and I’ve come to terms with those mistakes and I’m currently in the process of making corrections to those mistakes. Anyways some of the few questions that I do have are as follows: 1. What if I want to go ahead on assignments am I allowed to? 2. How will this course assist me with my goals of obtaining an associate’s degree? 3. How will this course benefit me? Along with these questions and concerns I also have a few challenges that I need to overcome, one of those being time management with having to work all day attend school after gives me a very limited amount of time to finish and complete assignments. That’s one thing that be fixing this semester because procrastination has been my friend for far too long. Another challenge I would say is a big factor would be as previously mentioned procrastination I put tasks off for long periods of time, school being one of those tasks and it has caused some pretty good opportunities to slip away from me. Even though I have some challenges I still possess some good strengths a couple of them being persistence and motivation, both of them are essential qualities that are needed to finish and complete school and...

Words: 464 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Bill Gulliford Jacksonville City Council President Jacksonville City Council 117 West Duval Street Suite 425 Jacksonville, FL 32202 DearBill Gulliford: Recently my family and I have moved into the community so that I can take care of my elderly mother and father. I had always believe that their neighborhood was the perfect place for them to live peacefully, and for my family and I to build a life. Unfortunately, appearances were misleading. Since we have moved, I have noticed that there are people selling “illegal substances” at the corner of the street, adults and children, and in the middle of the night my family and I have been awoken several times by the sounds of gunshots. My family and I do not feel as safe as we had hope to be. The previous city we moved from had implemented a few different strategies to reduce the crime rates. One of the strategies is to increase police patrolling in neighborhoods that have been suspected of multiple law infractions. This would helpful because if law enforcement officers are there monitoring then the suspected criminals would be less likely to commit these crimes. Another strategy is “Stop-and-Frisk”. This would be helpful because if there is a suspicious character in the neighborhood the officers patrolling would legally be able to stop them and remove any weapons or illegal substances. Therefor reducing both of the issues at hand. The last suggestion I would have to offer is curfews. The only reason that I offer this suggestion...

Words: 409 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...A security breach has been identified in which an authorized user due to a security hole accessed the SMB server. The server software manufacturer detected the hole the day before. A new patch will be available in three days. However the LAN administrator needs at least a week to download the software, test it, and then install the patch. Based on this information, the window of vulnerability at the very least is eight days. WOV, Window of Vulnerability, is the time it takes the attack to start all the way to when the attack is found and removed or fixed. In this case it doesn’t say what day or time the attack was found, only that the server software detected it the previous day. We will pretend that the attack was on a Monday morning. The software company will be releasing a patch for the attack in three days. We will receive the patch either Thursday or Friday. When we get the patch we will need to install and test the patch, this will take at least one week. Once the patch is installed we will need to push the update company wide to all machines that access the network. We will need to send out an email message to all employees to either leave the PC’s on so that we can remotely install the updates. From the day we found the security hole to the the time we fix the security hole, it will take approximately take 8 weeks to complete the whole process. Work Cited:...

Words: 263 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...The integration of Active Directory & impact with the current Ken 7 Windows Limited environment is that all new users will be created within Active Directory at the Local Group Policy Object (GPO) level. They are assigned to Site GPO’s, Domain GPO’s, & an overall Organizational Unit GPO. The Organizational GPO would be “Ken 7 Windows Limited”, the Domain would be manager (level of authority), Site GPO would be location (state if national, country if international). The last level would be the Local GPO, where each users’ information is at. This is the level in which all new users are individually created or modified. One of the plus’ to Active Directory is that instead of having to manage each user account individually, you can modify the privileges of the higher level to apply the changes to all (eg. All users in the accounting department you want to now have access to something they previously did not). With the use of the levels of GPO’s described above, the lower level (user account) takes precedence over the higher level. If you want a specific manger or individual user to have privileges to something that the others in that GPO (Local, Site, or Domain) don’t, you have authorize that individual the privilege. It makes the management of privileges and security much easier to track, and not have to worry about mistakes being made. If they happen to be made, they can quickly be fixed or corrected. The last thing I want to cover is the use of SID’s (Security...

Words: 372 - Pages: 2