...permissions on the network of a medium sized company in the local area. Prior to beginning the preparation of the presentation I was approached by a senior company official and informed that an employee recently stole data from the company. The senior official also explained that the company does not have permissions or resource segregation set up on the network. Further, there are numerous file servers in the network that have full control permissions set for the “everyone” group. First and foremost it is imperative that everyone know and understand the importance of setting permissions on data contained on the company network. These permissions extend from computers and hard drives down to individual files. Each and every user on the network must be assigned specific permissions that pertain to their job. In order to safeguard sensitive data, it is necessary to ensure only those employees with a “need to know” will have access to certain data to perform their job. If an employee’s job is primarily data input, they will not need to access data pertaining to a customer’s personal information. By creating groups of users in the network it is possible to simply and easily control the access to certain information on the network. There are just a few basic user groups that are used on a network. The groups are set up and controlled by the network administrators. (Admins) The groups are Administrators; they have the highest level of access on the network. They are responsible...
Words: 1020 - Pages: 5
...Table of content * Proposed change in reporting structure. * A list of relevant information which will aid in the decision making. * Identification of internal and external sources of information. * List of key stockholders is identified. * Suggest or recommend additional approach one take to widen the network for communication. * Channels of communication. * Gaps identified within the current communication process. Part A…. * Evidence of discussion made on the types of decisions needed to address proposed change in reporting structure. The Morning Star MNC bank currently has Training and Development Department for each country and department management are responsible to recommend their staff for training. The T&D Department reporting system is Training A The bank current structure is lack of Regional Head of Training and Development as a reason current structure is not link with each country so that each country performs alone and they have no idea how other countries branches are performing. The bank is lack good communication with each country. So that the reason same customer has different experience when they dealing with other branches. Deposit department tellers are assisting in deposit and withdrawers by bank’s customers, some team of tellers are doing the supervision. The supervisors have to report to managers. In the Mortgage loans department, Loan officers are customers to help process loan application. And also the credit...
Words: 2290 - Pages: 10
...Lab 2: Application of the Top-Down Network Design Methodology Lab Report 1. What are the business goals? (10 points) The business goals are to revise an existing network to accommodate a growing campus as well as to support online learning. 2. What are the business constraints? (10 points) Money is a business constraint as the funding is revenue from a property tax and previously approved bond issue, the funds must be spent in a fiscally prudent manner while still delivering the required network improvements. In addition to financial constraints, other business constraints include the hiring of new personnel to support the expanding network and the implementation of the changes to the network. 3. What are the technical goals? (10 points) The technical goals for the setup are: - To connect all of the buildings to the new IT wing of the administration building - Provide controlled wireless access for the students in each classroom - Provide open wireless access for students and locals in the areas outside of each building - Provide high speed wired connection to each faculty office - Provide a centralized online backup of all data designed for backup - And replace the PBX based telephone system with a VOIP based system. 4. What are the technical constraints? (10 points) It is anticipated that within the next few years, a new building will be added to the campus 15 miles away running along a city-owned hiking trail that runs along an...
Words: 684 - Pages: 3
...BUSINESS CASE ANALYSIS TEAM 2 3. PROBLEM DEFINITION 2 3.1 Problem Statement 2 3.2 Organisational Impact 2 3.3 Technology Migration 2 3.3.1 Hardware and Software Procurement 2 3.3.2 Systems 2 3.3.3 Development 2 3.3.4 Migration/Roll-out 2 3.3.5 Training 2 4. PROJECT OVERVIEW 2 4.1 Project Description 3 4.2 Goals and Objectives 3 4.3 Project Benefits 3 4.4 Project Constraints 3 4.5 Risk Management 3 4.6 Project Milestones 3 5. STRATEGIC ALIGNMENT 3 6. COST BENEFIT ANALYSIS 3 7. ALTERNATIVE ANALYSIS 3 8. APPROVALS 3 1. EXECUTIVE SUMMARY This business case summaries how we will address the present business, benefits of this project, and justifications and recommendations of the project. It also provides detailed project goals, performance measures, assumptions, constraints, and alternative options. 2.1 Issue Beacon Vale Community Frail Care Centre is a semi-private NGO, which means they are not fully funded by the government and they need further assistance from the public e.g. via donation and fundraising from businesses and the community. Lack of awareness from the public is the biggest constraint that hinders the organization from receiving funding from the public. Improving their website and giving them a presence in social networks is an important step to solve this problem and will contribute to key objectives, to ensure that their clients have a “home away from home” atmosphere and environment as well as to be at peace...
Words: 1834 - Pages: 8
...Phases of Attack from a Hacker There are five phases that a hacker will go thru when trying to attack your system. Each one is different and requires different ways to limit the hacker’s ability to gain information about your system. The first phase is reconnaissance, this can be passive or active. One of the things that a hacker might try is social engineering to gain information on the system. The best way to combat this, is by training and more training of the employees on the various ways that a hacker will attempt to get information. There is also dumpster diving, the only way to combat this is to make sure that the information that is being of disposed is of such a nature that it is useless to them. Information that they could use to gain access to the system, should be destroyed in such a way that it cannot be reconstructed in any way. Also a hacker could try sniffing the network, this is where system hardening will assist in preventing the hacker from gaining information. The second phase is scanning, in this phase the hacker will try to scan the network to see what information he can obtain to assist him in determining what weakness exist. This scanning he can find out such information as to what type of OS is being used, the version of the OS, and many other things about the network. To help prevent him from getting this information, system hardening is the best defense. This will include but not limited to disabling all ports but those that are needed, turning...
Words: 366 - Pages: 2
...FUNCTIONS OF IT: 1. Technical support in SAP, RAMCO, DOTNET, JAVA, SQL 2. Functional support in SAP, RAMCO Before 2002, we have stand alones for supporting modules and in the year 2002, we came with RAMCO.RAMCO is an integrated software, and we have integration among each and every modules. This is the main reason, we came from stand alones to RAMCO. Upto 2009, we worked with RAMCO and later move on to SAP.The SAP ERP application is an integrated EnterpriseResourcePlanning (ERP) software manufactured by SAP AG that targets business software requirements of midsize and large organizations in all industries and sectors. It allows for open communication within and between all company functions. In today’s competitive market, individuals who possess essential business and technological skill enjoy a significant advantage over their peers. This is particularly true if your expertise includes SAP software. The SAP Certification provides that competitive edge. When you are sap certified, you join a distinguished community of experts recognized globally. Today more than 14,000 consultants and users worldwide are part of this exclusive community.In SAP we have the following modules: * Sales and Distribution (SD) * Production and Planning (PP) * Plant Maintenance (PM) * Material Management (MM) * Finance & Costing (FI CO) * Human Resources (HR) * Sap Basis * SALES AND DISTRIBUTION SAP SD refers to the sales and distribution module which is aimed...
Words: 1935 - Pages: 8
...There are five phases that a hacker will go thru when trying to attack your system. Each one is different and requires different ways to limit the hacker’s ability to gain information about your system. The first phase is reconnaissance, this can be passive or active. One of the things that a hacker might try is social engineering to gain information on the system. The best way to combat this, is by training and more training of the employees on the various ways that a hacker will attempt to get information. There is also dumpster diving, the only way to combat this is to make sure that the information that is being of disposed is of such a nature that it is useless to them. Information that they could use to gain access to the system, should be destroyed in such a way that it cannot be reconstructed in any way. Also a hacker could try sniffing the network, this is where system hardening will assist in preventing the hacker from gaining information. The second phase is scanning, in this phase the hacker will try to scan the network to see what information he can obtain to assist him in determining what weakness exist. This scanning he can find out such information as to what type of OS is being used, the version of the OS, and many other things about the network. To help prevent him from getting this information, system hardening is the best defense. This will include but not limited to disabling all ports but those that are needed, turning off certain ICMP features which...
Words: 399 - Pages: 2
...Server Configuration Installation of operating system * Install Windows Server 2008 R2 to both the Adelaide server and Mt Gambier server. * The Adelaide server is to be named IT101ADLSrv01 and Mt Gambier is IT101MTGSrv01 Install and configure AD DS * Domain name: ITtraining101.com * Adelaide is to be configured as the writable domain controller whilst Mt Gambier is to be configured as a read-only domain controller. Adelaide AD DS configuration Mt Gambier AD DS configuration DHCP * Install DHCP role on both servers. * Create a scope on the Adelaide server of 10.70.52.51 – 10.70.52.150. DNS * Install and configure DNS role on both servers. * Create a forward lookup zone on IT101ADLSrv01 server named ITtraining101zone.com. Sites * This is to be done on the IT101ADLSrv01 server * The sites to be created are IT101ADLSite and IT101MTGSite. * A site link named IT101ADL_IT101MTGSiteLink is to be created between them with a replication schedule of 30 minutes. * Create a subnet for each site HDD configuration * Setup RAID 5 on 3 hard drives. * This RAID drive is to be assigned the letter E:// and called UserData. * Create 3 folders- Management Admin Training * Two more folders, userdata and userprofiles will be created on the E: drive. OUs/Users/Groups The OUs that were created were: Top Level OU | OUs | Staff | Admin | | ICTstaff | | Lecturers | | Management | Students...
Words: 725 - Pages: 3
...System Administrator Description: Computer networking jobs involve designing, setting up, and maintaining a network. Requirements: Although most users today have their own home networks, setting up, troubleshooting, and maintaining a corporate network can be a much more complicated task. Often, networking jobs also require a good understanding of how a network works, and in some cases how all the underlying protocols and structure of how networks work. Recommendations: There are numerous network and network related certifications available today, such as the CCNA, MCSE, etc. Often depending on the level of certification and the job you are applying for, the certifications will be more than enough to quality you for most network jobs. Some of the higher networking positions, especially in the development of network hardware or programming side, may also require past experience in networking or a degree. Difficulty: (MEDIUM - HIGH) Depending upon the job specifications and the complexity of the network usually determines the difficulty of this job. Networking Security expert Description: Test and find vulnerabilities in a system, hardware device, or software program. Requirements: This position is for someone who has a strong familiarity with how software, hardware, and networks work and how to exploit them. Often, you need to have a good understanding of how the overall system works as well as good programming skills. Recommendations: Keep up-to-date with all security...
Words: 1124 - Pages: 5
...Introduction System administrators, also known as chief information officer (CIO) are people who are responsible of setting up and maintaining systems. The duties of one ranges from installing, supporting, and maintaining servers or computer systems, user accounts management, ensure the availability of peripherals and services, performance tuning and monitoring, managing file systems, software installation and updates, preparing contingency, backup and recovery plans, policy enforcements, as well as security measurements implementation. (cyberciti.biz, 2008) Problems Identification As a software house, program scripts and codes, and documentations are core business assets. Storing them in a publically assessable server jeopardizes the resources by putting them at risk of being cyber-attack victims, hence the integrity and confidentiality are questionable. The company also lacks proper management and administration of their systems and resources in place, some are underutilized, such as the disk space utilization of their services like databases, mail services, active directory, and so on, the administrative account is known by most of their...
Words: 2994 - Pages: 12
...HIV/AIDS IN LOUISIANA 2010 While the Federal government’s investment in treatment and research is helping people with HIV/AIDS live longer and more productive lives, HIV continues to spread at a staggering national rate. The latest incidence data from the Centers for Disease Control and Prevention (CDC) estimates nationally there were 48,100 new HIV infections in 2009. The graph below depicts the HIV/AIDS epidemic in Louisiana through 2010 according the Louisiana Department of Health and Hospitals. Note that the following HIV/AIDS statistics only represent a portion of the epidemic in the U.S.—those cases that have been both confirmed through testing and reported. Reported AIDS Casesi Number Currently Living with HIV (not AIDS) Number Currently Living with HIV/AIDS Number Currently Living with AIDS Cumulative AIDS Cases 25000 20,923 20,143 20000 18,308 17,387 16,277 15,323 15000 10000 8,684 7,593 9,379 10,035 8,273 8,008 5000 0 2007 2008 2009 2010 1 Last Updated: July 21, 2011 Demographic Trendsii The HIV/AIDS epidemic disproportionately affects those at risk from social factors such as disparity and discrimination. The following demographic numbers are from the Louisiana Department of Health and Hospitals as of December 31, 2010. PERSONS LIVING WITH HIV/AIDS BY GENDER, 2010 Female 30% Male 70% PERSONS LIVING WITH HIV/AIDS BY RACE / ETHNICITY, 2010 Black, Not Hispanic White, Not Hispanic ...
Words: 2678 - Pages: 11
...5 Department Shared Folders 6 Network Configuration 6 Thumb Drives 7 Email Account 7 Account Management 7 Wireless Network 8 Security Policy Part 2 8 Missing 9 Incomplete 9 Inaccurate 10 Ill advised 10 References 12 Abstract This paper is based on two companies and their security policies. Some companies have a security policy that is complete and some companies have a security policy that is incomplete. The company that has a complete security policy will be able to activate that policy when a security violation occurs. The users and network administrator will know exactly what to do to mitigate the incident. The policy should have a corrective action section that will guide the people involved on how to handle the incident. Then there are those companies that have an incomplete plan so when a security violation occurs the whole company is in an up roar because they do not know what to do. These companies will have to mitigate the incident as they go and when this happens the process is not complete leaving things left undone. The best practice for every company is to have a complete and accurate security plan that is reviewed annually. The Security Policy Security Policy Part 1 I work for a hospital so network security is very important when it comes to keeping patient data safe. Ten things that are subject to compromise are: computers, switches, personal drives, patient database, department shared drives, network configuration, authorized thumb...
Words: 2464 - Pages: 10
...Fastreact Training Package Tutor’s Guide Fast React Systems Limited. Evolution House, Stephenson’s Way, The Wyvern, Derby DE21 6LY www.fastreact.co.uk Fast React Asia 11 Floor, 253 Asoke, Sukhumvit 21 Road Klongtoey-Nua, Wattana, Bangkok 10110 Telephone 662-664-3326 Fax: 662-664-3325 ISSS #19, Pallavan Street, Ambal Nagar Ekkattuthangal, Chennai-600 097 th FASTREACT TR AINING COURSE – TUTOR GUIDE General Information The Fastreact Training Package comes with a pre-configured ‘admin’ account. To start the Training Package launch the application FRTPv4.exe which should be setup as a shortcut from the desktop to the server folder where all the program and database files have been installed. Getting Started When logging into the training course for the first time the user name and password is the same for both: admin. User names and passwords are not case sensitive. It is a good idea to change the password to something that only you know. To amend the ‘admin’ user’s password: Ø Ø Ø Ø On the ‘Account management’ tab ensure that the username ‘admin’ is shown in the drop down box for ‘Login name’ Enter a new password in the ‘Password’ field Enter the new password again in the ‘Confirm password’ field Click the Password button Please make a note of this password as it may only be cleared by Fast React Systems Ltd or their appointed agents. Administrative functions: The administrative functions within this training course provide the ability to: Ø Ø Ø Ø Ø Create and...
Words: 3367 - Pages: 14
...the state department’s computers and eventually they were able to convince someone to give them access to the white house’s non classified systems where sensitive information like the presidents non-published schedule and other information. The state department had been battling the hackers for months on trying to keep the hackers out but with no success at doing so. The systems were taken off line in an attempt to purge the mal-ware that was installed that gave the access to the systems and for new security measures to be put into place to help prevent future attacks on the systems. (Prokupecz, 2015) The attack was done by using a phishing scam. The way this works is first someone sends a message to a user, in this case it was by an email, trying to convince the user that they are someone from inside their work place, representing an event from the work place, or represents themselves as a trusted source. They then get the user to click on a web link that takes them to a fake website. Once at the site the hacker then downloads a malware virus that does several things. The first it can record information that is inputted or stored on the system like user names and passwords to bank account records. The second this malware can install a back door to the system giving the hacker access to the system as if they were an admin on the network. The third is...
Words: 891 - Pages: 4
...WITH ST AEROSPACE SYSTEMS PREPARED BY: ZHANG ZHIRONG 054535B06 CE Table of Contents Page Abstract Acknowledgement List of Figures i ii iii Chapter One: Introduction 1.1 Background 1.2 Purpose 1.3 Scope 1 Chapter Two: Approved Certified Holder Test System 2.1 Background, Purpose and Scope 2.2 Admin Menu Items 2.2.1 Login Page 2.2.2 Admin.’s Menu 2.3 Admin operations 2.3.1 Assign Examinee Paper 2.3.2 Generate Report 2.3.3 Set Questions 2.3.4 Set Paper Type 2.3.5 View Examinee answer archive 2.4 Examinee operations 2.4.1 Confirm Particulars 2.4.2 Take Test 2.4.3 View Results 2.5 Security 2 2.5.1 Direct Question Bank Access 2.5.2 Linked tables 2.5.3 User application Chapter Three: Incident Reporting System 3.1 Background, Purpose and Scope 3.2 Menus 3.3 Handling Forms 3.3.1 Enable Data Entry 3.3.2 Refreshing Forms 19 Chapter Four: Library Loans System 4.1 Background, Purpose and Scope 4.2 New Loan Record 4.2.1 Using Sub Forms 4.2.2 Borrower Friendly Design 4.2.3 Clean Records 4.3 Return of Manual 4.3.1 Design Methods 24 Chapter Five: Roster Database System 5.1 Background, Purpose and Scope 5.2 Report Viewing Methods 5.2.1 Order by 5.2.2 Group by 5.2.3 Search by 29 5.3 Keeping track of Last Update Chapter Six: Approved Certified Holder Database System 6.1 Background, Purpose and Scope 6.2 Manipulating Records 6.3.1 Deleting Single Record 6.3.2 Detecting overdue and prompting 35 Chapter Seven: Swift Database System 7.1 Background...
Words: 7431 - Pages: 30