...Company’s Phone System Company’s Phone System ITT Technical Institute Dearborn, MI Abstract We have decided to deploy Cisco Systems Inc. solutions for our telephony network. These solutions allow for teleconferencing, video conferencing, call forwarding, call waiting, multiple lines, voicemail, Do Not Disturb, call transferring and mobility with the Cisco IP Communicator. We have decided to use the Cisco DX600 phone for office use at each user’s desk. For a mobility solution, we have gone with the Cisco IP Communicator version 7.0.4. These solutions used together in conjunction with the Cisco Unified Call Manager will provide for a robust telephony network that will allow for communication for employees no matter their needs and situations. Company Phone System We will explain our phone network at a high level to show the why our phone network will be more than capable of fulfilling the company’s telecommunication needs. Desk phone The Cisco DX600 phone system is designed to allow employees the ability to communicate with peers and customers providing clear, crisp call quality coupled with the ability to participate in video conferencing at the comfort of their desk. Properties The Cisco DX600 provides the user with many different abilities to work in conjunction with their peers and customers. The Cisco DX600 comes equipped with a 7” display and resolution of 1024x600 (www.cisco.com1). To compliment this display it also has a 1080p High-definition internal...
Words: 1195 - Pages: 5
...Topic 1: The Input/Output Process 1) Definition Motherboard, CPU, RAM, Hard drive, Graphics Card, NIC Card, Power Supply, and ROM Drive 2) Application I/O processes is basically how the devices communicate so they can work together. For example when you plug in a USB device the computer has to find a driver. That driver is like a translator for the USB device so the computer understands what the USB device is doing. 3) Troubleshooting The most common issue is that either the driver is corrupted or the driver is the incorrect one. To fix this use the disk the printer came with and reinstall the driver or go to the products website and download the driver for that product and model. Topic 2: The OSI Model 1) Definition The OSI model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. 2) Application 3) Troubleshooting Topic 3: SOHO Broadband 1) Definition The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start looking...
Words: 992 - Pages: 4
...National Security Should Be More Important Enemy of the state depicts an evil NSA team conducting illegal surveillance on a labor lawyer Robert, who was supposed to have a videotape of a politically motivated murder. Robert’s life was peaceful and happy until he suddenly met his college friend Zavitz in a shop, who passed the videotape secretly to him. Ever since that moment, Robert’s life was turned upside down. A special team in NSA soon discovered that he might have the videotape, and then the team raided his house and planted surveillance devices in order to find the videotape. His every movement was tracked and every word was tapped, which destroyed Robert’s life: he was fired from his work, his bank accounts were frozen, his wife threw him out of home since photos about his meeting former girlfriend were sent to his wife. After stumbling around for a bit trying to figure out what's happening to him, Robert turned to Brill for help, who turns out be an ex-NSA agent and who was responsible for inventing some of the surveillance devices. Together, they fought the NSA using the same techniques used against them, and finally Robert got rid of all his accusation and went back to his peaceful life again. Although the plot of the movie might look like a little Hollywood style, the surveillance tools feathered in the movie, such as, phone wiretapping, Global Positioning System, voice and face recognition system, and some much advanced ones, are generally in use today. Apparently...
Words: 1714 - Pages: 7
...ashfaq 16020248 Junaid sirat Comparative law Edward Snowden. Born in North Carolina in 1983, Edward Snowden worked for the National Security Agency through subcontractor Booz Allen in the NSA's Oahu office. While working there, Snowden began noticing government programs involving the NSA spying on American citizens via phone calls and internet use. Before long, leaving his very comfortable life and $200,000 salary behind, in May 2013, Snowden began copying top-secret NSA documents while at work, building a record of practices that he found invasive and alarming. The documents contained enormous and pejorative information on the NSA's domestic surveillance practices, including spying on millions of American citizens under the name of programs such as PRISM. (Edward Snowden biography) Snowden later forwarded these documents to journalists, from where on June 5th Guardian newspaper released those secret documents about an American intelligence body (Foreign Intelligence Surveillance Court) demanding that Verizon release information on a daily basis gathered from its American customers activities. Also the Guardian and the Washington Times released Snowden's leaked information on PRISM, a NSA program that allows real-time information collection, in this case, solely information on American citizens. Snowden now lives in Russia. One of his lawyers, Anatoly Kucherena, gave an interview with CBS News. Kucherena said that Snowden would seek temporary asylum in Russia and possibly...
Words: 533 - Pages: 3
...Foreign Intelligence Surveillance Act (FISA), have defined a framework for legally securing a warrant for searches and tapping into phone lines of the American populace. Sometimes the government uses warrantless wiretapping without proper authorization and it exposes telecommunications companies to legal and financial ramifications. What I will argue in this paper is that warrantless wiretapping is unlawful and not ethical, as it harms citizens and violates their privacy. My position is that it is not violation of personal liberties and is immoral for the NSA to have access data when your average citizen is not a threat. Not completely following this law pertaining to wiretapping deviates from the natural check and balance system of the federal government. The failure to procure a warrant when wiretapping violates the Fourth Amendment of the Constitution, and provokes media criticism. The National Security Administration (NSA) and other government agencies are required to wiretap only with the direct written authority of the FISA-assembled courts through a signed warrant. In rare cases, however, such as an imminent terror plot, against the government should it be allowed to intervene. The law-abiding system of gathering warrants before wiretapping functioned well from 1978 until the 2000s, due in part to company policies that willingly followed the guidelines set by the Communications Assistance for Law Enforcement Act (CALEA). Letters to the FCC demonstrate that most companies...
Words: 1118 - Pages: 5
...Persuasion, Politics and Propaganda Teneal Rusnak COM/400 September 9, 2014 Margaret Garberina, Ph.D. Persuasion, Politics and Propaganda An issue that seems to raise some concerns in our society would be the National Security Agency (NSA) not only spying on people in our country but also other countries by wiretapping and keeping surveillance on certain people. There have been a number of different laws that have been instated that help to protect our privacy such as the Omnibus Crime Control and Safe Streets Acts of 1968 which acknowledged that there were extensive amounts of wiretapping that seemed to be going on without any sort of legal sanctions and without the consent of anyone involved. With this law it helped to protect innocent people and stated that wiretapping should only be allowed only when authorized by the court and should therefore remain under the supervision of the court throughout its duration. However, in 1968 our technology was not as advanced as it is now so this law went through many significant changes over the next forty plus years. By 1986 a new amendment had been written in response to the ever-changing technological advances. The 1968 law only protected individuals who communicated through telephone calls. The Electronic Communications Privacy Act of 1986 took it a step further to focus primarily on any email that would be transmitted as well as stored in any type of storage device. The biggest improvement came...
Words: 1843 - Pages: 8
...However, it is an important time for the government and other stakeholders to begin weighing the benefits and costs associated with the surveillance more carefully. In spite of the strong defense by intelligence officials in favor of the NSA programs, the officials fail to table any credible evidence in support of the benefits they suggest. In fact, some initial analysis of the programs indicates that the benefits are dubious. It is true that the United States is a target for terrorist and other malicious groups, state officials often use the threat as an excuse to conduct and promote the activities of the National Security Agency. It may be beneficial in the context of security, but the surveillance programs also jeopardize the activities and operations of other organizations and individuals within the United States. The impact of the activities of the NSA on other parties is a cause for an analysis of the economic effects realized within the economy of the United States by various parties. For the period that the National Security Agency has conducted its surveillance, through its programs, many nations lost trust in the intentions of the USA leading to a strain in economic relations in both private and government sectors. For many years the NSA has used data as a key to preventing attacks. However those practices...
Words: 1851 - Pages: 8
...The Ethics of the NSA Mass-Surveillance Program University Name Student Name Course Number/Name Professor Name Date Introduction One of the most explosive scandals of the 21st century was involved the National Security Agency (NSA), and the revelations that the agency had set up a robust, warrantless mass surveillance program in the years after the 9/11 attacks. Designed to pick up bits of intelligence that could be used in order to thwart future 9/11 attacks, critics of the program argued that not only was it unconstitutional given the lack of warrants obtained prior to engaging in the program, but that it was ineffective at stopping any kind of real terrorism. Supporters pushed back that the program was an essential tool for fighting terrorists who had become more advanced digitally, often using the internet in order to communicate with each other. Much of the discussion on the program related to the ethical appropriateness of the NSA’s activities. This paper will summarize the NSA’s surveillance program and discuss it from the perspective of utilitarianism and Kantian ethics; in addition, the paper will discuss the author’s personal viewpoint of the program. Summary of the Program The NSA spying program, named the “Terrorist Surveillance Program” by the New York Times, focused on monitoring the communications of between 500 and 1000 people within the United States with suspected ties to Al-Qaeda (Dunn, 2015). Many of these individuals were American citizens,...
Words: 1335 - Pages: 6
...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...
Words: 1691 - Pages: 7
...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...
Words: 2180 - Pages: 9
...Ethics in the Government and Public Sector in Electronic Surveillance “Can you hear me now, Yes I can even see you” Embry-Riddle Aeronautical University Abstract In todays society the number of computers, tablets, mobile devices will rise to about 65 billion devices connecting to the internet. That not counting vehicles, household applicances, gaming devices. However, with all of these deveices there is a significant benfit that will make our lives easier and one potential theat that invades our privacy called Geolocational Privacy and Surveillance (GPS). This sometimes hidden or masked feature is colleting our personal information, location and sometimes converstation. Laws have have enmpowered government and companies to collect databases of consumers without our consent. With ongoing technology where does the protection beging and the surveillance stop. Ethics in the Government and Public Sector in Electronic Surveillance In the movie Enemy of the State the lawyer played by Will Smith becomes a target by a corrupt politican who kills a congressman for his unwillingness to help with a new surveillance system with satellites. The politican with the help of National Security Aministration agents to destroy the lawyers life by manipulation thru the internet and surveillance. This movie was produced in 1998 and then the technological devices we have now were not that advanced. Little did we know that would become the norm of everyday life of those who possess...
Words: 1919 - Pages: 8
...Black Hats NSA Capstone Quality Management Plan ------------------------------------------------- Prepared By: Carl Calkins, Heath Shipley Date of Publication: 4/23/14 Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 4/23/14 | Carl CalkinsHeath Shipley | (Original document) | | | | | | | | | | | | | | | | | Table of Contents Purpose and Scope 1 Quality Plan Objectives 1 Deliverables Produced 1 Identify Metrics: 1 Test Checklist: 2 Results: 2 Purpose and Scope To have standards and plan in place to show how we are completing the project. To have guidelines to follow to insure a quality end product that will last and be easily used but the Users. Quality management encompasses a broad range of activities that support quality planning, assurance, and control. Quality management also cuts across a variety of project areas and disciplines – it touches on, utilizes, and affects key activities and deliverables, including, but not limited to, the following: Project Management Planning and Project Operations DED, Deliverable, and Work Product Reviews Independent Verification and Validation Requirements Specification Design Specification Software Development Environments (Development, Production, Testing, Training, etc.) Test Plan/Test Scripts/Test Summary Report Training Planning, Delivery, and Materials Implementation Planning, Execution, and...
Words: 314 - Pages: 2
...GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...NT2799 NSA CAPSTONE COURSE TEAM AGREEMENT & WORK PLAN [COMPANY NAME] [Date] I. TEAM AGREEMENT A. Individual Contribution This document should be a guide for individual tasking for the current team assignment. Through your chosen collaboration platforms and tools, each group member must individually enable your instructor to determine your level of involvement and contribution to the final team product. Individual team members who do not document their level of team involvement and contribution to the final team product may have their individual grade reduced, at the discretion of the instructor. Each group must seek and acknowledge their instructor’s preference on this point. B. Desirable team behaviors Examples of desirable behaviors are punctuality, effective "listening," no harmful "group think," systematic documentation of important team communications and decisions, etc. C. Submission of Final Document Team members will post all individual contributions to the team assignment in the team study group conference. Team members may find it helpful to use email to improve timeliness for review of deliverables. Your team should ensure that the final assignment that has been reviewed by all team members before submission to the instructor. Each member must upload the final paper in the dropbox under the assignment tab. D. Team Contact Information |Member Names |Telephone Numbers ...
Words: 703 - Pages: 3
...______________________________________________________________________________ Capstone Project III: Labs for High School NSA Capstone Project Charter ______________________________________________________________________________ Prepared By: Date of Publication: 03/29/2014 Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 03/29/14 | Nicholas Jones/ Jorge Lopez/ Robert Howell | Original Document | | | | | | | | | | | | | | | | | Table of Contents Project Description 3 Project Objectives 3 Project Scope 4 In Scope: 4 Out of Scope: 4 Deliverables Produced: 4 Stakeholders: 5 Requirements: 5 Acceptance Criteria:Project Estimated Effort/Cost/Duration 5 Estimated Cost: 6 Estimated Effort Hours: 6 Estimated Duration: 6 Project Assumptions 7 Project Risks 7 Project Constraints 8 Project Dependencies 8 Project Approach 8 Project Organization 9 Communication Plan: 9 Project Guidelines: 9 Project Approvals 10 Project Description The Technical Director for a local school district wants three functional labs for various high school students to use. The labs will be essential for supporting the education of the students. Because there will be various students and instructors using the lab, it will require access to email via client and mobile devices, as well as secure authentications. A user guide Web page will be necessary. Project Objectives This project will...
Words: 1298 - Pages: 6