...Project Part 1 The top three security threats that Aim Higher College faces are the following: Mobile devices connecting to the network, Social Media, and Compromised routers intercepting sensitive information. These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware every time they are used on the campus...
Words: 543 - Pages: 3
...Project Part 1 : Multilayered Security Plan The safety and security of information owned by Richman Investments is extremely important and needs to monitored constantly. Through the following outline I hope to enhance the companies security, update systems and applications and ensure the integrity of the information stored on the network. The outlined areas will be monitored and reported monthly to senior management and will be updated as needed. The following outline will touch on each domain and will include security measures needed for those domains. 1.0 User Domain 2.1 Mobile storage disabled 2.2 Admittance to work area and computer with badge only. No visitors permitted 2.3 Multi-layered authentication with username/password and either token or biometrics 2.4 Training of new hires or quarterly training of current employees on security awareness 2.5 Security software with scanning capabilities to ensure no malware or virus intrusion is allowed. 2.0 Workstation 3.6 Hardware inventory taken quarterly to asses needs for new equipment or updates. 3.7 Software database examined to asses need for updates or antivirus renewal. 3.8 Different departments will be assessed groups in active directory to prevent authorization conflicts or confusion 3.9 Admittance to workstations will only be permitted with proper credentials, badge or token. 3.0 Lan 4.10 All cabinets and server rooms will be locked...
Words: 656 - Pages: 3
...Security Threats Project Part 1: Current Security Threats The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Media * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential...
Words: 326 - Pages: 2
...Project Part 1 Multi-Layered Security Plan User Domain: * Conduct security awareness training, display security awareness posters, insert reminders in banner greetings, and send email reminders to employees. * Restrict access for users to only those systems, applications, and data needed to perform their job. * Enable content filtering and antivirus scanning for email attachments. * Disable internal CD drives and USB ports. So that users cannot insert personal files such as photos, music and videos. Workstation Domain * Enable password protection on workstation for access. * Enable auto screen lockout for inactive times. * Define strict access control policies, standards, procedures, and guidelines. * Use content filtering and antivirus scanning at internet entry and exit. * Enable workstation auto-scans for all new files and automatic file quarantine for unknown file types. LAN Domain * Make sure wiring closets, data centers, and computers rooms are secure. * Do not allow anyone access without proper ID. * Define strict software vulnerability window policy requiring quick software patching. * Implement encryption between workstation and WAP to maintain confidentiality. * Implement LAN server configuration standards, procedures and guidelines. LAN-to-Wan Domain * Disable ping. Probing and port scanning on all exterior devices within the LAN-to-WAN Domain. * Apply strict security monitoring controls for intrusion detection and prevention...
Words: 450 - Pages: 2
...Linda Brooks Business Economics GM 545 May 2013 term lbrooks002@att.net I researched gasoline prices in the Kansas City, MO area from 2006 to 2013 along with the number of cars and trucks sold in the area to see how the gasoline prices may have affected supply and demand in that market since they are complementary goods. The price of gasoline can change for many reasons, including natural disasters, refinery problems, political unrest, war, the price of crude oil and wholesale gas, and trade disagreements between countries, to name a few. For simplicity sake, I am focusing on the 2 most drastic points I found. The highest point was in July 2008, when the price of gas reached close to $6 a gallon, and the lowest point was in the winter months of 2008, when the price fell to less than $1.50 per gallon. When the price of gas gets high enough, some may curb their consumption, but gas has an inelastic demand so most people will still find a way to pay for the gas they normally use. In July of 2008 when gas prices were at their highest, auto and truck sales were steady with the sales done in the prior months of 2008. In August the sales for both went up, they fell in September, raised some in October, and plummeted during November and rose again slightly in December. Truck sales in December had the largest increase and overall new car sales had the largest decrease. All of this proves to me that gas does in...
Words: 743 - Pages: 3
...LinkedIn seem to be a very nice professional social site where you can meet a lot of people in your field. It is set up a lot like Facebook without all of the drama. The article shows how to set up a page and gives you pointers on what you should and should not include on the page. I find this will be a very helpful tool. Networking within Your Professional Association is full of good reasons to network with similar professionals. The article gives you pointers on different ways to network with one another. Also lets you feel comfort knowing that the people that you are networking with want to help in any wat they can because one day they may be there looking for the help. I plan on paying more attention to my linkedIn account in the near future and try to make the most of the opportunities that can come from that. I have learned it is very important to have a profile picture on your page. As well as someone with a good amount of expertise in your corner helping you with all of the details The two Professional Networking strategies that I am going to used is LinkedIn as well as I would like to join a group of people in a club of some sort to meet people in person and actually rub elbows with people in the industry. References Power A. LinkedIn: Facebook for professionals?. British Journal Of Midwifery [serial online]. March 2015;23(3):196-198. Available from: CINAHL Plus with Full Text, Ipswich, MA. Accessed June 28, 2015 Kaweckyj N. Networking within your professional...
Words: 298 - Pages: 2
...Course Project Part 1 Task 1: Assessing loan options for AirJet Best Parts, Inc. (1) EAR of National First Bank loan is 10.25%. APR = 3.25 (Prime Rate) + 6.75 M = 2 (Compounded semiannually) Formula: EAR = (1+APR/M)^M – 1 Solution: 0.1025 = (1+.10/2)^2 – 1 EAR of the Regions Best Bank loan is 13.99%. APR = 13.17 M = 12 (Compounded monthly) Formula: EAR = (1+APR/M)^M – 1 Solution: 0.1399 = (1+.1317/12)^12 – 1 (2) I recommend using National First Bank because the APR and the EAR are lower than Regions Best, which will result in paying back less interest over the course of the loan. (3) The monthly payment amount of the loan is $147,357.20. I agree with this decision because APR and EAR would be lower than National First resulting in paying back less interest over the duration of the loan. I got this answer with the following information and formula in Excel: PV= $6,950,000 r= 8.6% =PMT(rate,nper,PV,FV) m= 5 (years) Task 2: Evaluating Competitor’s Stock (1) The competitor I chose is Raytheon and the rate of return assuming the dividend growth rate is 5% would be 7.57%. Raytheon’s latest dividend amount was obtained from Yahoo Finance and used with the following formula. g = 5% R = ? D1 = 2.2 (dividend amount) P0 = $85.28 (stock price) Formula: R = D1/P0 + g Solution: R = 2.2/85.28 + .05 = .0757 = 7.58% (2) Current share price of Air Jet Best Parts, Inc. is $23.06. Rate of return is...
Words: 585 - Pages: 3
...Project Part 1 Matthew Gist ITT Microeconomics ES2550 Roger Lignugaris April 19, 2015 Project Part 1 A. Does the United States have a comparative advantage in wingdings? Explain. It is cheaper to import wingdings than it is to produce them. If the US had a comparative advantage in wingdings, we would export them. Comparative advantage is that the countries with a comparative advantage in a certain good will specialize in and export that good. B. Discuss the effect of the tariff on the number of imports. The tariff decreases the import from 20 at the world price to 6 after the tariff. The price increases from $6 to $8 for someone to buy a wingding in the US, which means the quantity demanded domestically is now 18 and the quantity supplied domestically is 12, which is only a shortage of 6 units that needs to be supplied. C. How did the imposition of the tariff change consumer surplus? The tariff decreased consumer surplus by the area with height 8-6 and base y = 26 and base z= 18. The area of this can be calculated by splitting the area into a rectangle and a triangle. The rectangle has an area of (8-6)x18=36 and the triangle has an area of (1/2)x(26-18)x2=8. Adding the two the consumer surplus went down by 44. D. How did the imposition of the tariff change producer surplus? Producer surplus increased after the tariff, by the area with height 8-6 and base y=6 and base z=12. The area of a trapezoid is just [(b1+b2)/2]xh, which is [(6+12)/2]x(8-6)=[18/2]x2=18...
Words: 396 - Pages: 2
...ES2550 Microeconomics - OL2-MAR1813 | Project Part 1 | | [Author name] [Date] | Barnes & Noble books which Estimated Elasticity is -4.00 which I believe is elastic because it has a value greater than 1 decrease in quantity demanded is proportionally greater than the increase in price. Coca-Cola which Estimated Elasticity is -1.22 I believe is elastic because it has a greater then 1 Cigarettes which Estimated Elasticity is -0.25 I believe is inelastic because it has less than 1 in absolute value. Beer which Estimated Elasticity is -0.23 I believe is inelastic because it has less than 1 in absolute value. Gasoline which Estimated Elasticity is -0.06 I believe is inelastic because it has less than 1 in absolute value. Explain the implications of those classifications on tax revenue collections when the per-unit tax increases as opposed to decreases. Tax revenue collections will be in the following order: First is Gasoline then Beer next is Cigarettes then Coca cola lastly Books The more the elasticity the less the revenue collected. Using those classifications, make some assumptions regarding tax incidence. For instance, will buyers or sellers pay a larger portion of the tax per unit? Explain. Alike the weight on buyers’ tax accepted by them is more for goods that have inelastic demand. Based on the elasticity classifications their effect on tax revenue, and tax incidence, which goods would the government prefer to tax? The Government tax goods with...
Words: 390 - Pages: 2
...BUSN379 Course Project Part 1 Task 1: Assessing loan options for AirJet Best Parts, Inc. 1. Regions Best (1+ .1317/12)^12 -1 =0.14 EAR = 14% National First (1+ (6.75+3.25)/2)^2 -1 =.1025 EAR = 10.25% 2. Based on my calculations I would choose the National First loan because the EAR is only 10.25%. The EAR for the Regions Best loan is 14%. The ideal EAR for the company would be the smallest rate. 3. (1+8.6/12)^12 -1 = 8.95%. Monthly payment 8.95% of $6,950,000 = $622,025. By taking a smaller amount loan will save them money that they will need to pay back in the end. If they don’t borrow enough they may end up closing because they ran out of money to get their feet off the ground. It all comes down to saving money now and taking that chance of starting quickly, or spending money now to get the factory set up and make money later. Task 2: Evaluating Competitor’s Stock 1. Lockheed Martin Corporation as of May 12, 2012 Price: 85.21 Dividend: 4.00 Rate of Return 4*(1+.05)/85.21 + .05 =.1204 =12.04% 2. Current Share Price Rate of Return = 12.04% 1.50*(1+.01) / (.1204-.01) =$13.72 3. Preferred Stock Price 1.5 / .1204 =$12.46 I would assume that the stockholder would want the current price to be higher than the preferred price because that would mean the stock is doing better than projected to be...
Words: 521 - Pages: 3
...Lead Economist Laura From: Alex Anderson Subject: Project Part 1 After some research, I have come to a series of conclusions that I will explain in the document. To understand what type of economy the United States has, first we must consider the three types of economic outlines. These are central, market, and mixed economies. By taking a closer look at how each type of economy operates, and looking at examples of each, we can come to an understanding of what best fits the model of the United States. First, we will take a closer look at a central economy. This type of economy has its grounding in government rulings. At first description this sounds as though it would fit properly for the United States government as the government regulates taxes and tariffs on trade. However, in the case of a central economy system, the government makes all the economic decisions, preventing people (individuals or firms) from being able to affect the current market within the bounds of the system. This also has a very high chance to have a black market for many different good due to high government control. For example, if a certain good (milk) were to be set a low price, those who produce the milk may save some of it to sell to a black market for a better price on their good. Likewise, this control can be used in conjunction with knowledge of the average budget to fix prices so only people working for the highest power parts of the government can have excess capital to spend on...
Words: 652 - Pages: 3
...Project Part 1 Multi-Layered Security Plan Outline The following outline is to document the general security solutions for Richman investments, for all locations including head-quarters, for the safety of data and information that belongs to Richman Investments. This plan will be updated and submitted, every month by the networking division, to senior management along with a security plan for the month. 1. User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. ...
Words: 779 - Pages: 4
...IS 3220 IT Infrastructure Security Project Part 1: Network Survey Project Part 2: Network Design Project Part 3: Network Security Plan ITT Technical Institute 8/4/15 Project Part 1: Network Survey Network Design and Plan Executive Summary: We have been engaged in business for some time, and have been very successful, however we need to re-examine our network configuration and infrastructure and identify that our network defenses are still reliable, before we make any changes. We need to take a hard look at our current configuration of host, services and our protocols within our organization. Data from a large number of penetration tests in recent years show most corporate networks share common vulnerabilities. Many of these problems could be mitigated by appropriate education in “hacker thinking” for technical staff. We will take a look at our security on routers and switches to make sure there are no leakages of data traffic. OBJECTIVE We have identified that we have loss some major accounts to competitors whose bids have been accurately just under our bid offers by exact amounts. We also believe due to shared reporting and public Web site functions that our Web servers have been compromised and our RFP documents have been leaked to competitors which enabled them to under bid us. We want to mitigate Web threats in the future; we realize the web is a mission critical business tool. We want to purchase new products and services, that will give us an edge and better...
Words: 3355 - Pages: 14
...PART 1 The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access. All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy. Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to...
Words: 353 - Pages: 2
...G. Angel Bautista Professor Abernathy IT 255 20Apr2012 Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network. We can start with the Application layer. The Application layer provides the interface to the user. First the end user should be subjected to a background check to ensure against any potential malicious or questionable acts in the users past. Then the end user should be properly trained in the use of the computer and the proper protocols to access the network. Updates should be made frequently to keep the user up to date. When the user is in the network, make sure that any unnecessary devices, USB ports and any back doors are disabled. You also want to make sure that all files and emails and downloadable attachments are all thoroughly scanned prior to downloading. Finally, be sure to ensure content filtering, and restrict the end user to only what pertains to their primary function. The Presentation layer is responsible for encoding and decoding data that is passed from the application layer to another station on the internetwork. You must first ensure that...
Words: 810 - Pages: 4