Free Essay

Labs

In:

Submitted By amaos16
Words 2487
Pages 10
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones Bartlett
Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL
AligningBartlett DISTRIBUTION
Risks, Threats, and
NOT FOR
DISTRIBUT
NOT FOR
COBIT P09 Risk Management Controls
© Jones & Bartlett Learning, LLC
Introduction

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION
Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT,
© Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC
© ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework.
NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and
COBIT 5, which is the latest version released in June 2012.

Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to
© Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT control
NOT FOR SALE OR
NOT COBIT P09’s purpose is to guide the objectives called P09.FOR SALE OR DISTRIBUTION scope of risk management for an IT DISTRIBUT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers
© Jones &
© Jones & Bartlett Learning, LLC in version 5. Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION
In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION

Learning Objectives

Upon completing this lab, you will be able to:

© Jones & Bartlett Learning, LLC
Define what COBIT (Control Objectives for Information and related© Jones & Bartlett Learning, LL
Technology) P09
NOT FOR SALE OR DISTRIBUT
NOT FOR SALE OR DISTRIBUTION risk management is for an IT infrastructure.
• Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
• Explain how threats and vulnerabilities align to the COBIT P09 risk management
© Jones & Bartlett Learning, LLC management of IT risks.
© Jones & Bartlett Learning, LLC definition for the assessment and
NOT FOR the COBIT P09 controls as a guide to define the NOT FOR SALE OR DISTRIBUTION
SALE OR DISTRIBUTION
• Use scope of risk management for an IT infrastructure. • Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities. © Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION


10
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

11
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

Deliverables

© Jones & you are Learning, LLC
© Jones your
Upon completion of this lab,Bartlettrequired to provide the following deliverables to & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT
NOT FOR SALE OR DISTRIBUTION instructor: 1. Lab Report file;
2. Lab Assessments file.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
© Jones & Bartlett Learning, LLC
Copyright © Learning, LLC www.jblearning.com Student
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION Lab Manual

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

12 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk
Management Controls
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

NOT FOR SALE OR DISTRIBUTION

Hands-On Steps

© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LL
NOT FOR SALE OR
NOT FOR SALE OR DISTRIBUTION for this lab, you will need access to Microsoft® DISTRIBUT
This is a paper-based lab. To successfully complete the deliverables

uNote:

Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION
1. On your local computer, create the lab deliverable files.
2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
3. Review the seven domains of a typical NOT FOR SALE OR DISTRIBUTION
IT infrastructure (see Figure 1).
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

Figure 1 Seven domains of a typical IT infrastructure

4. On your local computer, open a new Internet browser window.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT
NOT FOR SALEInternet browser, type the URL
OR DISTRIBUTION
5. In the address box of your http://www.isaca.org/Knowledge-Center/cobit/Pages/FAQ.aspx and press Enter to open the
Web site.
6. Review the information on LLC
© Jones & Bartlett Learning, the COBIT FAQs page. © Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

13
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

ISACA—45 Years Serving Auditors and Business

ISACA is a global organization that defines the roles of information systems governance, security, auditing, and assurance professionals worldwide. ISACA standardizes a level of understanding of these areas through two well- Learning, LL
© Jones & Bartlett Learning, LLC
© Jones & Bartlett known certifications, the Certified Information Systems Auditor (CISA) and Certified Information Security Manager
SALE OR
NOTISACA has expanded its certification offerings to include two other NOT FOR around risk DISTRIBUT
FOR SALE OR DISTRIBUTION
(CISM). In recent years, certifications and IT governance.
ISACA was previously an acronym expanding to Information Systems Audit and Control Association, but today is known by the & Bartlett alone to better LLC its wider audience.
© Jones name ISACA Learning, serve
© Jones & Bartlett Learning, LLC

NOT FOR SALE OR DISTRIBUTION

NOT FOR SALE OR DISTRIBUTION

Similarly, COBIT was originally an acronym for Control Objectives for Information and related Technology. Now,
ISACA refers to the framework as just COBIT, in part because the concept of “control objectives” ends with COBIT version 4.1. COBIT 5 focuses on business-centric concepts and definitions, distinguishes between governance and management, and includes a product family of “enabler guides” and “practice guides.” The recent release of COBIT
© Jones & Bartlett is a complete break from COBIT 4. In addition, COBIT 5 alsoBartlett Learning, LLC
© Jones & incorporates other ISACA products, including version 5 Learning, LLC
Val IT and DISTRIBUTION
NOT FOR SALE OR Risk IT.
NOT FOR SALE OR DISTRIBUTION

7. In your Lab Report file, describe the primary goal of the COBIT v4.1 Framework. Define
COBIT. © Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LL

NOT FOR SALE OR DISTRIBUTION
8. On the left side of the COBIT Web site, click the COBIT 4.1 ControlsNOT FOR SALE OR DISTRIBUT
Collaboration link.
9. At the top of the page, read about the COBIT Controls area within ISACA’s Knowledge
Center.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
10.FOR SALE OR DISTRIBUTION major objective NOT FOR SALE OR DISTRIBUTION
In your Lab Report file, describe the of the Controls area.
NOT
11. Scroll down the Web page to the COBIT Domains and Control Objectives section.
12. Click the Text View tab.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
13. In your Lab Report file, list each of the types of control objectives and briefly describe
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION them based on the descriptions on the Web site. Include the following:







Plan and Organize
Acquire and Implement
© Jones & Bartlett Learning, LLC
Monitor and Evaluate
NOT FOR SALE
Delivery and Support OR DISTRIBUTION
Process Controls
Application Controls

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

14. On the Web site, under the Plan
© Jones & Bartlett Learning, LLC and Organize Control Objective description, click the
© Jones & Bartlett Learning, LLC
View all the OR DISTRIBUTION
NOT FOR SALE PO Control Objectives link.
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
© Jones & Bartlett Learning, LLC
Copyright © Learning, LLC www.jblearning.com Student
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION Lab Manual

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

14 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk
Management Controls
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

NOT FOR SALE OR DISTRIBUTION

15. Scroll down and find the P09 Control Objectives, which are labeled Assess and Manage
IT Risks.

© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LL
NOT but it SALE a
NOT FOR SALE OR DISTRIBUTION risk management is covered,FOR is done inOR DISTRIBUT
COBIT 5 is not an evolutionary but a revolutionary change. Naturally,

uNote:

holistic, end-to-end business approach, rather than in an IT-centered approach.

© Jones &the P09.1, Learning, LLC
16. Click Bartlett IT Risk Management Framework link. © Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION
17. Scroll down to about the middle of the page to read about the IT Risk Management
Framework.
18. Expand the View value and Risk Drivers and View Control Practices links to learn more.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
19. In your Lab Report
NOT FOR SALE OR DISTRIBUTION file, describe what thisFOR SALE OR DISTRIBUTION
NOT objective covers.

20. Click the other P09 Control Objectives by first clicking the back button to return to the
COBIT Domains and Control Objectives section of the COBIT 4.1 Controls
Collaboration page.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT
21. Click theNOT View tab.
Text FOR SALE OR DISTRIBUTION
22. Click the View all the PO Control Objectives link.
23. Scroll down to the P09 Control Objectives.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION of Risk ContextNOT FOR SALE OR DISTRIBUTION
24. Finally, click the P09.2, Establishment link. 25. Repeat this set of instructions for each of the other P09 listings.
26. Read about each of these.
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC
27. In your Lab Report
NOT FOR SALE OR DISTRIBUTION file, explain how you use the P09 Control Objectives to organize
NOT FOR SALE OR DISTRIBUTION identified IT risks, threats, and vulnerabilities so you can then manage and remediate the risks, threats, and vulnerabilities in a typical IT infrastructure.

uNote:

© Jones & Bartlett Learning, LLC

This completes the NOT FOR SALE OR DISTRIBUTION lab. Close the Web browser, if you have not already done so.

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

15
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

Evaluation Criteria and Rubrics

© the evaluation criteria for this lab that
© Jones & Bartlett Learning, LL
The following are Jones & Bartlett Learning, LLC students must perform:
NOT FOR SALE OR DISTRIBUT
NOT FOR SALE OR DISTRIBUTION
1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure. – [20%]
2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
© Jones & Bartlett Learning, LLC – [20%]
© Jones & Bartlett Learning, LLC
3. Explain how threats and vulnerabilities align to the COBITFORrisk management
NOT FOR SALE OR DISTRIBUTION
NOT P09 SALE OR DISTRIBUTION definition for the assessment and management of IT risks. – [20%]
4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure. – [20%]
5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and
© Jones & Bartlett Learning, LLC
© Jones & Bartlett Learning, LLC vulnerabilities. – [20%]
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LL
NOT FOR SALE OR DISTRIBUT

© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
© Jones & Bartlett Learning, LLC
Copyright © Learning, LLC www.jblearning.com Student
NOT FOR SALE OR DISTRIBUTION
NOT FOR SALE OR DISTRIBUTION Lab Manual

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

Similar Documents

Free Essay

Kaspersky Lab

...Kaspersky Lab: from Russia with anti-virus I will analyze the study case by putting focus on three important questions and points. First I will perform the internal and external environment analysis that Kaspersky Lab faced in year 2011. The internal environment can further be categorized in strengths and weaknesses of the company. It is inevitably that such a successful, fast growing company relies on many strengths. KL had initiatives and tendency to attract and retain qualified employees. Their skills and competences helped to delivering high-quality services and products. The products and services offered are technologically superior. Beside quality, their abilities also contribute to early detection of various threats. It was the first company to identify major shift in hackers behavior. The company ability to motivate and reward its employees is just a one piece of the strength puzzle. Another key strength is innovation. The constant updates and their pace with the changes and trends in the market is a key advantage over the other competitors. Furthermore, KL was the first company to introduce hourly anti-virus updates, leaving the competitors lacking with only daily updates. An important strength which helped KL to be successful in foreign emerging markets were the localized solutions. KL has great ability to launch products which will satisfy the needs of a certain market. Another strength is their webpage, which offers free trials, information and guidance for the customers...

Words: 1437 - Pages: 6

Free Essay

Lab Report Instructions

...Queen Mary University of London School of Engineering and Materials Science Laboratory report writing instructions DEN101 - Fluid Mechanics 1 Flow Rate Measurement Experiment A. Student Student Number: 1234567 Version 2.0, 27 November 2010 Template for Word 97-2003 Abstract This document explains what is expected in your Fluids 1 lab report. The sections that should be covered are outlined and a structure you could follow is proposed. Detailed advice on how to edit the report is given. The document concludes with the marking criteria for this lab report. Table of Contents Abstract 2 1. Introduction 3 1.1. Writing 3 1.2. Editing and formatting 3 1.3. Content of the introduction 4 2. Background and theory 4 3. Apparatus 4 4. Test 4 5. Experimental procedure 4 6. Results 5 7. Discussion 5 8. Conclusions 5 9. References 5 10. Appendix A: Marking criteria 6 Introduction Before starting to write a report, you should think about what is your audience. Am I writing for colleagues who want a lot of detail how it is done, or am I writing for my boss who just wants an executive summary as he has no time for details? In general, there is not a single type of audience and we have to make our writing suitable for the detailed read, as well as the fast perusal. To understand what is required from you in this report, please have a look at the marking criteria in the Appendix...

Words: 2017 - Pages: 9

Premium Essay

Nt1310 Unit 4 Lab Report

...Step 1: Select secret image S and target image T. If the size of the target image T is different from that of the secret image S, change the size of T to be identical to that of S Step 2: Convert target image into HSV image by using the equation (1) to form new target image T Step 3: For performing color conversion, first means and of S and T are find out and then find standard deviation quotient from equation (3.5) for each color channel Step 4: Limit mean value by eight bits and standard deviation quotient to seven bits Step 5: Based on this value, for each pixel p in each secret image S with color value c where c = r, g, or b, transform c into a new value by (3) Step 6: if is not smaller than 255 or if it is not larger than 0, then change to be 255 or 0, respectively; compute a residual value R for pixel p Step 7: Divide the color converted secret image S into n tile images as well as the target image T into n target blocks Step 8: Compute the means and the standard deviations of each tile image T and each target block B for the three color channels according to equations (1) and (2). Step 9: Compute accordingly the average standard deviations for T and B , respectively, for i = 1 through n and j = 1 through n. Step 10: Sort the tile images in the set = and the target blocks in the set = according to the computed average standard deviation values of the blocks; map in order the blocks in the sorted S tile to those in the sorted S target in a 1-to-1...

Words: 1254 - Pages: 6

Premium Essay

Hiro

...Fall 2015 Analytical Chemistry I Quantitative Analysis Chem 341WI 4 Credit Hrs | Instruction Mode: L (lab) and P (class) Professor Andrew Holder holdera@umkc.edu • SCB 113 • 816-235-2293 • 913-543-3709 (fax) Office Hours: T/Th 1:00-4:00, 5:00 – 7:30 Lecture: T/Th 4PM | Labs: T/Th 1PM (AFT), 5PM (EVE) Credit: Lab + Lecture = 4 credits | Format: Lab + Lecture (P) Lecture / Class Policies and Procedures Correspondence with UMKC Student Learning Outcomes Scientific Reasoning & Quantitative Analysis * Apply principles/methods of sciencea, mathb, statisticsc and logicd to solve problems and draw logical inferences. * Chpt 3: Experimental Error (c) * Chpt 4: Statistics (c) * Chpt 6: Chemical Equilibrium (a, b, d, e, f) * Chpt 7: Activity & Systematic Trtmnt, (a, d, e, h) * Chpt 8: Monoprotic Acid-Base Equil., * Chpt 9: Polyprotic Acid-Base Equil. (a, d, e, g, h) * Develop quantitative literacy enabling comprehensione and evaluationf of info in broad contexts. * Chpt 3: Experimental Error, Chpt 4: Statistics (f) * Chpt 5: Quality Assurance and Calibration Methods (c) * Understand methodsg/principlesh of scientific discovery and their application * Sxn 0-2: The Analytical Chemist’s Job (g, h) * Sxn 0-3: General Stages in a Chemical Analysis (g, h) * Chpt 2: Tools of the Trade (g) * Carrying out laboratory analyses (g, h) ...

Words: 4091 - Pages: 17

Free Essay

The Birth and Evolution of Transistors and Impact on the Transport Industry

...Electronics rely heavily on electronic switching and amplification to generate and capture the various signals which allow them to operate. A controllable valve that allows a small signal to control a much larger signal does this, and could be related to a controllable valve used in the control of water flow. This was once done by a device known as vacuum tube but was later brought down to a much lower production scale for a variety of industrial, economical and business related reasons. Bell Laboratories, the research arm of telecommunications company American Telephone and Telegraph’s (AT&T) director Mervin Kelly put together the first team of researchers and scientists placed on the task of research and development of a solid state-semiconductor later called a transistor that would supersede vacuum tubes and provide numerous advantages. The success of this development would prove to change the computing, electronics and telecommunications systems altogether. Up until the invention of the transistor a vacuum tube was used in the control, amplification and generation of electrical signals. Vacuum tubes are tubes usually made from glass and designed in an airtight manner as to keep the flow of “cathode rays” from external disturbance as they pass from each terminal and laid the foundation for numerous technical innovations, such as the light bulb discovered by Thomas Edison (fig. 1). Joseph John Thomson further made a vacuum tube and placed a third terminal to attain a grasp...

Words: 1787 - Pages: 8

Premium Essay

Information Centre

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy...

Words: 484 - Pages: 2

Premium Essay

Rules

...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13. No...

Words: 413 - Pages: 2

Free Essay

Test

...Major Milestones of the Telecommunications Industry 1837 Samuel Morse invents the telegraph - The information age began with the telegraph, which was invented by Samuel F.B. Morse in 1837. This was the first instrument to transform information into electrical form and transmit it reliably over long distances. The earliest form of electrical communication, the original Morse telegraph of 1837 did not use a key and sounder. Instead it was a device designed to print patterns at a distance. 1858 Transoceanic telegraph cable is laid – The transoceanic telegraph cable is an undersea cable running under the Atlantic Ocean used for telegraph communications. The first communications occurred August 16, 1858, reducing the communication time between North America and Europe from ten days, the time it took to deliver a message by ship, to a matter of minutes. 1876 Alexander Graham Bell invents the telephone - The telegraph was followed by Alexander Graham Bell's invention of the telephone in 1876. The magneto-telephone was one of the first telephones on which both transmission and reception were done with the same instrument. 1885 - Incorporation of the American Telephone and Telegraph company (AT&T). After its incorporation in 1885, the American Telephone and Telegraph company dominated the telecommunications market. 1888 - Heinrich Hertz discovers the electromagnetic wave 1895 - Marconi begins experimenting with wireless telegraph 1901 Guglielmo Marconi invented the radio—the...

Words: 727 - Pages: 3

Free Essay

Aspodij

...fornia, start-up, Shockley Semiconduc tor Laboratory. Shockley had been part of the Bell Labs team that invented the transistor. He had quit his job and come west to start his own company, telling people his goal was to make a million dollars. Everyone thought he was crazy. Shockley knew he wasn't. Unlike a lot of the people at Bell Labs, he knew the transistor was going to be big. Shockley had an idea about how to make transistors c heaply. He wa s going to f abric a te them out of si li con. He had come to this valley, south of San Francisco, to start production. He felt like hewas on the cusp of history, in the right place at the right time. All that he needed was the right people. Shockleywas leaving nothingto c hance. Tod a y's in ter vi ew wa s J i m Gibb ons . Hewa s a young guy, earl y twenti es . He already had a Stanford Ph.D. He had s tudied a t Cambridgetoo - on a Fulbri ght sc holars hip he'dwon. Gibbons was si tting in front of hi m ri ght now, in Shockley's Quonset hut of fice. Shockley picked up his s topwa tch. In Augus t 1957 William Shockleywas recrui ting s taff for hisPalo Alto, Cali fornia, start-up, Shockley Semiconduc tor Laboratory. Shockley had been part of the Bell Labs team that invented the transistor. He had quit his job and come west to start his...

Words: 447 - Pages: 2

Free Essay

It113 Project Scope

...the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables * The networking of the MK Institute of Higher Learning. * Placing needed hardware. * Wiring the hardware and network. * Interconnecting distribution rooms. * 3 wings, each consisting of 8 classrooms = 16 drops, one computer lab = 44, and one distribution room. * Wireless central lobby allowing 100+ users simultaneously. * Fully functional Networking...

Words: 607 - Pages: 3

Free Essay

Bell and Tech

...Alcatel-Lucent is a global telecommunications corporation located in Paris, France. It has, under its wing, Bell Laboratories aka Bell Labs. They were previously known as AT&T Bell Laboratories and Bell Telephone Laboratories is now the research and development subsidiary of the French-owned Alcatel-Lucent. Over the past eight decades, Bell Labs R&D gave birth to new technologies and seminal scientific discoveries. (Alcatel Lucent, para 1) Elisha Grey and Enos N. Barton formed Western Electric Company in 1869. Both of them started a small manufacturing firm based in Cleveland, Ohio which was to become the largest electrical manufacturing company in America. In 1881, Alexander Graham Bell, an extraordinary leader of American Telephone & Telegraph (AT&T), purchased a controlling interest in Western Electric and made it the exclusive developer and manufacturer of all equipments for the Bell telephone companies. Now, the Bell system has provided much telephone services and support to America and Canada in the 1877 to 1984. It was then led by AT&T. In 1898, Compagnie Générale d'Electricité (CGE) was born, founded by a French engineer named Pierre Azaria. It was involved in business with several industries in Germany. Mainly it dabbled in electricity, transportation, electronics and telecommunications. CGE then rose up the ranks and became a leader in digital communications and would be known as well to produce train à grande vitesse – high speed trains in France. In...

Words: 2450 - Pages: 10

Free Essay

Math

...Richard and Juliette Massey. He is a graduate of the public schools of St. Louis, Missouri and attended high school in University City, a suburb of St. Louis. After receiving a Harvard Book Award and a National Achievement Scholarship at University City High School, he entered Princeton University in 1973. There, he encountered his first real introduction to research mathematics in an honor calculus course taught by the late Ralph Fox. He wrote his undergraduate senior thesis, titled "Galois Connections on Local Fields,'' in algebraic number theory, under the direction of the late Bernard Dwork, and graduated from Princeton in 1977 with an A.B. in Mathematics (Magna Cum Laude, Phi Beta Kappa, and Sigma Xi). That same year he was awarded a Bell Labs Cooperative Research Fellowship for minorities to attend graduate school in the department of mathematics at Stanford University. In 1981, he received his Ph.D. degree from Stanford and his thesis, titled "Non-Stationary Queues,'' was directed by Joseph Keller. Dr. William Massey's parents, Juliette and Richard Massey Sr. were both educators; she was from Chattanooga, Tennessee and he was from Charlotte, North Carolina. They met at Lincoln University in Jefferson City, Missouri which became his birthplace. Professor Massey's initial fascination with numbers started when his mother would let him play with plastic numbers and cut up old calendars. His family moved to Saint Louis, Missouri when he was four. There he came of age educationally...

Words: 1118 - Pages: 5

Free Essay

Transmittal Letter

...college of business were our focal point. Surveys were given to students with questions regarding financial hardships caused by laptop requirement and their opinions of the policy among others. Faculty was interviewed on their thoughts and how the policy helped with the classroom. Administration helped with the reasoning behind implementing the policy and some hints to phase outs of the computer labs located in the college of business. We found that students believed that the policy is not effective, but should be enforced. For faculty, some believe that the policy is helpful for learning and welcome laptops in the classroom while others feel that laptops can be a distraction to everyone. The administration implemented the policy because they want students to have the ability to work anywhere at any time with the specialized tools/software needed for courses taken. They also feel laptops are necessary for non-traditional students who may be full time professionals and have the option to complete courses online. Rumors that the laptop requirement was put into place because of possible computer lab phase outs are false, null, and void. To improve the effectiveness of the laptop requirement in the college of business, we recommend the following: * Making sure students/faculty are aware of the laptop requirement * Enforcing consequences for those who don’t have a laptop Thank you for welcoming our concerns and suggestions through this project. We learned a great deal and hope...

Words: 314 - Pages: 2

Free Essay

Student

...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...

Words: 1158 - Pages: 5

Premium Essay

3d Technology

...| | Home | 3D Internet | i3D Advantage | SilverStream | Partners | News | Contact | | SLCN.TV We offer 8 channels of content filmed in Second Life. Weekly live shows include fashion, business, sports, shopping and lifestyle. More information at www.slcn.tv | | empulse GmbH, Cologne, Germany Our Mission is to help our clients to be more successful. We focus on the application of modern internet concepts and technologies to realize outstanding business capabilities for medium to large companies. We offer high quality and result oriented consulting, project management and delivery services to build-up business capabilities as a combination of the right strategy, processes, people and technology.We have successfully completed over 50 projects in tourism, logistics, automotive, financial services and other business domains - the two managing directors alone have 30 years of professional services and IT experience. www.empulse.de | | SL Exchange The premier Second Life®-integrated commerce website featuring real-time shopping, real estate listings, and full-fledged currency exchange. Our core services include the Marketplace, an Auction Block, Real Estate Listings, and a Currency Exchange. To complete your SL Exchange experience, we provide a Forum for discussions and technical help, as well as Member Blogs for those who like to take a peek behind the scenes. www.slexchange.com | | Joysco Studio Joysco is a derivative word derive from the joy of collaboration...

Words: 482 - Pages: 2