... * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management * Information Technology * Team Building & Leadership * Troubleshooting * Network Administration * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management Derrick Lamont Grays Network Administrator & Information Technology Professional 7206 Jamacha Road, San Diego, Ca 92114 Ph: (619) 549-1914 email: dgrays07@gmail.com CORE STRENGTHS & QUALIFICATIONS * 8+ years of extensive IT strategy experience as a Network Administrator with a proven track record of success. * Network administration skills include backup, security management, user account management, e-mail systems including e-mail web server, internet access, printers, office systems and applications support. * Exceptionally advanced computer knowledge with an ability to manage complex disciplines and circumstances; provides competence under pressure in highly complicated situations. * As a Network Administrator for the United States Navy, managed a Network Operations Center and led a team of 50 technicians responsible for over 350 computers, 28...
Words: 422 - Pages: 2
...The crux of the business is to buy lighting products from Chinese supplier situated in China and sell them through the retailing shop in Lahore, Pakistan. The business has recently expanded and another outlet has been opened in DHA, Lahore. However, due to problems in inventory management of the first shop, the inauguration of the second shop has been delayed. Workforce of Butt Lights: Title | Job Description | 1 Outlet Manager | * Receives the customer and acknowledges their purchase. * Supervise the shop workers. | 2 Shop Workers | * Help the customers look around the displayed lights. * Run to-and-from errands of outlet and warehouse. | 1 Warehouse Worker | * Receives the stock from supplier * Makes the manual receipt. * Retrieves products from inventory for customer. | Warehouse Manager | * Updates and maintains inventory records. * Supervise the warehouse worker. | Project Scope and Problem Statement The project’s scope is extended to one current shop of Butt Lights. However, the proposed automated system for inventory management can be applied to any manufacturing and retailing business. Following are the prevailing problems in Butt Light’s Inventory Management: * When the stock is received from the supplier, the transaction is not recorded in a proper standardized receipt. Instead, the “number of products” and “product category” is manually written on a piece of paper by the Warehouse Worker. Often the receipt is lost. * That...
Words: 1853 - Pages: 8
...Risk Management Computer Network Charles Watson PROJ/595 James Hiegel Table of Contents Project Scope…………………………………………………… Pages 1-9 WBS…………………………………………………………….. Page 10 Risk Management Plan…………………………………………. Pages 10-14 References………………………………………………………. Page 15 Project Scope Project Scope Statement Project Name | Computer Network | Project Number | | Project Manager | Charles Watson | Prioritization | | Owner(s) | Charles Watson | Statement of Work—Project Description andProject Product | Updating the network will allow the company to have a more reliable network infrastructure as well as the ability to become more scalable. High deliverables for the project include; what software (NOS, Computer OS, anti-virus, and applications, firewalls) is needed, what hardware (computers, servers, cables, routers, VOIP, firewalls), is needed, documentation, budget, scheduling, planning. I plan on completing this project using a team of four people that are highly knowledgeable in computer networks as well as computer systems. 1. The first step is to determine what antivirus software is needed or if the current one is sufficient, but to just a newer version of what is already installed. To determine if the current one can be updated, it has to be compatible with updates to the server such as the OS, NOS. With confidential information, it is imperative that the antivirus/firewall software and firewall hardware can handle the possibility of network intrusions...
Words: 3738 - Pages: 15
...yareda2@gmail.com 240-423-8250 July 28, 2013 Dear Sir/Madam, I have graduated with a BSC Degree on Management Information System (MIS). I have taken trainings on Graphics design, ARC-GIS, VDO-fleet management, Microsoft, Dell, Kaspersky, VMware… and also I am a master’s program student at Virginia international university in field of MIS. I have worked as Technical consultant & engineer and this has enabled me to know my real potential for such a responsible position and where I can reach in the future. I am a conscientious person who works hard and pays attention to details. I'm flexible, good in communication, quick to pick up new skills and eager to learn from others. I also have lots of ideas and enthusiasm. I am looking forward to meeting you as soon as I am considered to further discuss my qualifications and experience. You may reach me at this number, 240-423-8250. Thank you for your consideration & I look forward to hearing from you soon. Yours Sincerely, Tadesse, Yared Assefa 0 Date – July/28/2013 CURRICULUM VITAE YARED ASSEFA TADESSE Nationality: Ethiopian Sex: Male Date of Birth: 1974 E.C Contact Numbers: 240-423-8250 Email: yareda2@gmail.com KEY QUALIFICATION AND EXPERTISE SUMMARY Recently I work as a Technical Consultant and Engineer position in one of the leading IT solution provider in Ethiopia creative computer systems. I have a BSC degree in Management Information System (MIS). While working in this position, I have been adding a lot of Microsoft &...
Words: 1812 - Pages: 8
...is a program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. True Trojan horses are not technically viruses, since they do not replicate, however many viruses and worms use Trojan horse tactics to infiltrate a system. Although Trojans are not technically viruses, they can be just as destructive. 2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well. Virus maybe can send files to other people that don’t allow reading these files. It will affect Confidentiality. Some virus will break program. Then these programs cannot run. This wills effect Availability. Some virus will change some file in a program. This wills effect Integrity. 3. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing computers and devices? Besides Vendor IDs and Product IDs, some devices also have a serial number associated with them. The “Serial Number Descriptor” string is optional, but a fair number of devices such as thumb drives, removable USB hard drives, PDAs and cell phones have them. While most of these scanning and tracking details would be of most use with the “USB Mass Storage devices containing malware” and the “U3 thumb drives with "evil" autorun payloads” categories, they...
Words: 1736 - Pages: 7
...Administrator: Theresa Burke, Project Management Office BACKGROUND: Good Health Medical Services opened its doors in 1997. The company started out with just one primary physician and one specialty physician, which was an Obstetrician/Gynecologist to assist with the women’s health. The company was slow to start up and therefor manual record keeping was not a problem. The head receptionist was able to maintain the records in a timely fashion and was able to keep records up to date. Good Health Medical Services has grown over the years from seeing an average of twenty patients a week to over two hundred patients a week. The staff has also grown and now has over ten specialty physicians that range from Pediatrics to Oncology. The record keeping staff has grown as well going from one person to three people. There have been several cases of misfiled information or lost or missing files and the directors want to lessen some of these factors, save money and move into the current technology world of Electronic Medical Records (EMR). Purpose/ Business Need: The directors feel that there are several benefits to be had by moving from paper files to electronic files. The benefits of EMR are less paper files, savings on paper, less maintenance to the files and manpower being put into looking for the files. Plus, many times a patient can be seen by more than one physician at the facility. If the file is electronic that can assist the physician in updating files. With today’s technology...
Words: 2778 - Pages: 12
...Joseph W Costa LOT2 Task 2 5/24/2013 Best Practices in Prevention of DoS/DDoS Attacks This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations. Know the Signs of an Attack An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack. As seen at the time of attack, certain characteristics were: Network performance unusually slow Website was unavailable for at least 24 hours Thousands of bogus HTTP packets sent to internal web server Taking these factors into account, it can be safe to say it was an actual attack rather than just legitimate network usage. Now that it is known what such an event would look like, identifying similar attacks in the future will be much easier and may allow...
Words: 1264 - Pages: 6
...As displayed in Figure 1.0 data collection will occur for approximately the first two month of the intervention. Management meetings will occur before pre and post intervention, along with after the completion of each intervention. The pre and post intervention meetings will have a duration of four hours. This will allow time for Targets management team to understand what to expect and the intervention process and to provide feedback after the completion of the intervention. Meeting that occur after the completion of each intervention will last three hours. Allowing time to provide feedback about team intervention and the progress made. Each intervention will be completed in separate stages. The first team intervention that will take place is the cleansing of unnecessary and high risk consumer data. The second team intervention will be the cyber software update. This would take place with the information technology and require that the department has the most up to date and reliable security software. The first two team interventions would last about two months and would entail the training and implementations of change. The final team intervention that would take place is the updating of retail store equipment. For example, updating credit card readers to improve...
Words: 1017 - Pages: 5
...P.O Box 2142 | Telephone: | +254 716 174 062 | | | Postal Code | 00200 | Email: | robertoketch@yahoo.com | | | PROFILE: Robert has a bachelor degree in Strategic Management. He also has a Certificate in Computer Packages and its Applications. Robert is a social scientist with a good grasp of social and economic development issues in Kenya. Having worked as an administrative assistant in Agrobiologica Africa Ltd now Development Shift consultancy, Kogelo Village Resort in the Management Trustee team as the Operation manager, Lake Basin Development Authority as an intern in Human Resource and Administration department, he has valuable experience in managing the administrative, human resource and operations in an organization. He has managed program portfolios and worked with technical teams and service providers where he provided guidance and program support. Robert therefore has extensive experience working in human resource and administrative departments. In these organizations he assisted in salary preparation (ERP), collecting, managing, interpreting and storing data and management and maintenance of office equipments and assisting secretarial duties. KEY SKILLS/COMPETENCIES * Registry Management: has experience in general records keeping in the central registry. Filling and management of employees’ complete records in files. Receiving, filling and detaching documents and efficient storage of the organization’s documents for future reference. * Excellent...
Words: 1071 - Pages: 5
...goods because they do not have the technical expertise to establish the IT infrastructure to catch up with, and to remain profitable and competitive amidst the changes in the industry, growing competition and other external factors. Thus, this study allows distributors as end users to be given the idea about Cloud Computing Technology that is centered on the assessment of their own business environment prior to and when already using this technology. This study is designed for these local distributors of consumer goods in Zamboanga City. This study will allow them to acknowledge the benefits and advantages that they may be able to reap when moving into or adopting this innovation in their core operations – inventory monitoring, sales updating and reporting. Although there is a great potential for success, this study also looks into the risks involved but will also give the end users the possible mitigations to eliminate, to reduce or to control such risks. Moreover, this industry study will also give them an assessment of other factors that may affect its implementation such as legal and technical ones. B. Background of the Study Distribution companies...
Words: 11645 - Pages: 47
...1.The creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster. Business continuity planning (BCP) involves defining potential risks, determining how those risks will affect operations, implementing safeguards and procedures designed to mitigate those risks, testing those procedures to ensure that they work, and periodically reviewing the process to make sure that it is up to date. 2.When a business continuity plan is correctly used it can help reduce operational risks. Operational risk is the risk of loss experienced from internal processes as a result of external events. These internal processes could have failed completely or simply been inadequate. This does include calculating the legal risk as well but does not take into account business risk that is based in strategy or reputation. Some examples of operational risk are losses arising because of internal or external frauds, natural disaster, failed transaction processing or inability to meet the commitment of service, and the disruption of business or system failures. 3.There are many different approaches to BCP and DRP. Some companies address these processes separately, whereas others focus on a continuous process that interweaves the plans. The National Institute of Standards and Technology 4.The degree of spread of Ebola in the months ahead is uncertain. In the unlikely...
Words: 1432 - Pages: 6
...This project outlines customer credit card use and PCI compliance security standards. Categories that PCI compliance security standards are broken down to are provided in detail. Additionally, in the first part of the project, requirements that should be fulfilled by the owner in order to build and maintain secure networks, protect cardholder data, maintenance vulnerability management programs, implement strong access control measures, monitor and test networks, and maintain information security policies, are detailed herein. In the second part of the project, questions are raised and answered, concerning the information outlined on PCI’s potential role in bringing HGA’s mainframe data storage capabilities up to policy standards. Insights regarding HGA’s role in storing cardholder information, and HGA related software, are provided in question and answer format. Keywords: PCI, security, compliance, networks, HGA, policy, access, mainframe. Unit Five Project Part One: The considerable events here are use of credit card by the customer, processing of transaction etc. According to Practical Ecommerc Staff (2007), “The major credit card issuers created PCI (Payment Card Industry) compliance standards to protect personal information and ensure security when transactions are processed using a payment card”. In terms of major events, PCI compliance security standards could be categorized in following categories:...
Words: 2093 - Pages: 9
...HD211-3229/2011 4. FLEMINS MUTSOLI VUDOHI- HD211-0977/2011 DATE OF SUBMITION: 11TH OCTOBER FACILITATOR: MR MBITHI INTRODUCTION An information system (IS) is any combination of information technology and people’s activities using that technology to support operations, management, and decision making. In any business organization, data is the most important thing. Different types of information are produced from data. When the amount of data is large, it becomes more difficult to process this data manually. In order to get quick results and timely information, an information system is used in almost all organizations. As the business grows, the amount of data also increases. As a result, it becomes more difficult to process the data manually. With the use of information system, data can be processed with rapid speed and information is generated quickly. To run a business successfully, effective and timely decision-making is very important. The decision making is based on the information we get from the stored data. The history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century. Regarding the circulation of information, numerous information systems still exist today that are continuously updated to improve data integrity and to improve the social effectiveness and efficiency of the whole process. In general, information systems are...
Words: 1515 - Pages: 7
...CHAPTER 1 1.1 Introduction: Real estate is a term used to describe land, including all natural attributes as well as man-made improvements of a permanent nature placed on the land thereon such as buildings. A real estate agency is a firm whose work is to bring together a buyer and seller or even landlord and tenant. The property being exchanged in this case refers to apartments, houses, office space etc. Details availed to clients include size of the property, location, available services, cost and payment plans if any etc. Setim Real Estate Management is an agency located at Westland. It currently uses a manual data entry system as well as manual processing of data. This involves handling volumes of documents stored in different cabinets. The documents contain information from owners of houses of houses for sale or rent. The process begins with, all the information of the apartment property is put onto the database and when a suitable client comes to the firm he is provided with the details of the property. If the client likes the property, the agency marks the property as booked for rent and this is reflected in the database. 1.2 Problem statement In Setim Real Estate Agency the managers are responsible for the appraisal process in various operations such as recording new property details, new buyer details and also new seller details. The appraisal process is done manually by supervisors or mangers filling out forms on the work performance of certain employees whereby...
Words: 3284 - Pages: 14
...System administration By: MANUEL Y.R.C What entails to be a system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator...
Words: 507 - Pages: 3