Free Essay

Technology Project

In:

Submitted By Mirmart45
Words 3060
Pages 13
NET 210 WAN TECHNOLOGY PROJECT
ANALYSIS ON HOW TO SECURE
REMOTE ACCESS FOR
ENTERPRISE NETWORK
SYSTEM
Submitted to: Jacky Chao Min
By: MARTHE M. NSABA 300682552

TABLE OF CONTENTS

INTRODUCTION | 3 - 6 | PROTECTION OF CPE DEVICES | 7 - 9 | SECURE REMOTE ACCESS THROUGH DIFFERENT AUTHENTICATION | 10 - 15 | SECURE REMOTE ACCESS FOR MOBILE UTILIZATION | 16 - 17 | BIBIOGRAPHY | 18 |

INTRODUCTION

In this developing environment, we note that varying business utilise different kinds of networks according to the business structures and policies, so managing access to all those networks can be complicated and security threatening. It is a key objective that for an enterprise to operate efficiently, its accessibility should be unlimited and this is when remote access is introduced. As the volume of enterprise information and data is increasing exponentially, it is an expectation that this data is easily accessed and shared among each other.
To enable this, smarter network access called Remote access was introduced to deliver various degrees of data efficiently through mobile devices, applications and machines in order to stimulate productivity.
There are three main types of remote access, namely Basic, Advances and Enterprise. In this paper, we will focus on Enterprise Remote access.

Some of the advantages of Enterprise Remote access are;
Increased high availability required for different and high volume application
Remote access maintains and controls the high usage of the network. It also consistently delivers and transfers large volumes of data across the enterprise organization. When multiple remote access servers are deployed in clusters, they provide scalability and also increase the capacity of bandwidth throughput amongst high number of users.
Load balancing is also deployed within the clusters therefore incase a cluster fails, the users can remotely access through a different server internally through virtual IP address connection therefore increasing availability.
Efficiently delivers high volumes of data in a cost effective manner
As a remote access has multi-site deployment, it allows multiple accesses from client locations therefore any remote client can access regardless of location therefore reducing cost and intra-net bandwidth through routing client traffic to remote access server closest to their location.
Effectively provide secure access for client devices
For example applying a strong-line clientele authentication such as One-time password instead of standard password authentication
Simplify network management
Remote access helps match network requirements to business needs. It can easily be managed by an entity tool called Remote Access Management console that can run on one of the remote servers. Also provides a simplified architecture by permitting network administration to apply remote access to only active directory sites.
In addition, shared settings can be deployed across servers on multi-entry point therefore enabling remote access network to be managed through any server within the cluster or remotely access through Remote Server Administration Tools. Another simple way is just to utilise the Remote Access Management Console tool to monitor the multi-site deployment.
Different roles and features are enlisted in an enterprise remote access network.
We will discuss the major roles.
First role is the Remote Access Server Role: this role comprises of RRAS (Routing and Remote Access Services) which are managed by the Remote Access Management Console. This role can easily be installed and uninstalled using the server Management tool. It was previously under the NPAS (Network Policy and Access Services) server role but now can be accessed through Remote Access Console.
It depends on two major features namely IIS feature (Internet Information Services) which handles configuration of the network location server and default web settings. And secondly is the Group Policy Management Console Feature that manages group cluster server policies and is mandatorily required to be installed for server role services.
Second role is the Remote Access Management Tools feature which is installed by default on the Access server as the Remote Access Server role is installed and it is deployed to support the Remote Management Console user interface.
It can optionally be installed sans the Remote Access Server Role and be used for remote access management on running CPE.
The Remote Access Management Tools consist of two main features; Graphical User Interface & Command Line and PowerShell module for respective operating system.

Minor features include; * Group Policy Management Console * RAS Connection Manager Administration Kit (CMAK) * Graphical Management Tools and Infrastructure

PROTECTION OF CPE DEVICES

CPE devices are telecommunicating equipment that is located at either home or business area of employees and customers. CPE devices may include telephone handsets, routers, digital subscriber line, or any other customized devices.
Customer Premise Equipment originally generally used to be owned by service providers but recently leasing or purchasing arrangements are used so therefore heightens reason to secure CPE devices.
As remote access opens up the enterprise’s network to threats & problems due to many employees and workers who remotely access the network, securing the enterprise network is a difficult task.
Therefore it is key attribute to make sure that this excess is highly secure and protected from hackers or other threats.
Most enterprises employ experts or use expert services to get a compilation of tips on how to secure remote network access according to their businesses.
The general guideline followed in securing Customer Processing Equipment is for the network manager to define an encryption policy such as remote access VPN policy that includes a configuration of a triple A server (Authentication, Authorization & Accounting). The policy is then applied to the CPE devices through deployment of Remote Access Policy configuration.
One important step to note is before deploying any policy configuration, it is a necessity to populate with the target and applicable CPE devices in the network by connecting designated initial configuration and organization structure and location that defines each CPE device.
CPE devices are located at each end of the VPN tunnel and they are created by assigning each target device to a specific site. Most important is that in every network, at least one public and one private interface must be defined on every CPE device.
Making sure employees who are set up and working from home can remotely access network with maximum security. In this paper, we will use IPsec VPN solutions methodology as a case study. They provide a complex and pricey deployment which is designed to offer site-site network access and keep up with the demands of today’s enterprise remote access. As internet is the major means of communication and access, more web-based and enabled devices are being used therefore more limitations in security.
One feature used is a FirePass Controller that comprises of various and many tools that enable a secure web-based access to intranet and extranet and web-based applications. This feature is also efficient as it works with any current operating system.
With its web-application tool, FirePass Controller device provides access to intranet resources and restrict access as well. It also manages CPE cookies and strategically maps internal to external links so that the sensitive an internal configuration is secured. It does so by integrating single login to control the remote browser. In cases of email web-based applications, the FirePass Controller enables access to SMTP (Simple Mail Transfer Protocol) and other email servers to receive, send attach files along with providing strong secure remote access to internal network from any site.
Another challenge in protecting CPE devices is regarding IP configuration without limiting remote device support. This can be enabled by installing client software that secures transactions and corporate resources so that they can only be accessed by a limited number of systems. However this limits access to public resources and also through mobile devices and also increases implementation costs due to the reason that every employee requires a thoroughly maintained CPE device for travel.
Another example of a commonly used security is 802.1 x authentications where by layer 2 and layer 3 securities are provided for CPE devices. Each CPE device is classified as either trusted or non-trusted based on Standard 802.1x authentication status. So when a CPE device is deployed the router initiates an 802.1x exchange and user credentials are asked for and then passed on to the router which is used to get authentication from respectful server. Once the authentication is received, then the access device is considered as a trusted device and provided access. However if the CPE device fails authentication, it is then considered as a non-trusted CPE device and given less or no privileges and access to only the internet.
So we see the more we protect the remote access network, the more we limit user access and also the more the number of remote users increase. So most enterprise networks apply extranet & extranet deployment as well as web-based and email applications to improve on proficiency and productivity of the organization. And to maximize these applications, they should be made easily accessible to remote users and also restricted and secure access to be ensured to only authorized users only to protect CPE devices.

SECURE REMOTE ACCESS THROUGH DIFFERENT AUTHENTICATION

Authentication is a fundamental step required in order to secure remote access. Its schematic is to provide security and protection against client & server impersonation as well as replay attacks.
Client impersonation
This is when an intruder waits for a connection to be authenticated and then disconnects the user and takes over the authenticated connection
Server impersonation
This is when the intruder uses his computer to appear as the remote access server and receives the remote access client credentials for verification therefore acquiring all sensitive information and traffic.
Replay attack
This is when an intruder captures packets of a successful connection and resends so as to obtain an authentication.

Generally there are a variety of different authentication options regarding remote access to corporate intranet. Here we will earn to secure internet with remote access VPN as well as secure options without VPN.
The first challenge faced is to reduce the amount of network entry points for malicious activity and its VPN solution is to consolidate access into a singular, granular scalable security gateway.
The next main challenge is to gain high levels of efficiency and consistency within remote access management and this is solved by proper definition of access policies for utilization from the central platform.
Another challenge is supporting remote access from managed and non-managed devices such as clientless access from laptops, PCs and mobile apps for smart phones and tablets. We discuss this in the other subtopics.
Limited remote access and accountability of shared sensitive information is a challenge faced as well but VPN solves it by providing network level connectivity with end-to end security.
Final challenge faced is to allocate resources to remote access needs of employers, partners, guests and customers and this is solved by fully partitioning virtual portals for multi-client environment.

First authentication we will discuss is PPP (Point to Point Protocol) which supports two authentications namely PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). During PPP negotiation, LCP (Link Control Protocol) negotiation, Authentication and NCP (Network Control Protocol) negotiation is involved. It states that if both sides disagree on parameters then a disconnection occurs. But if there is a link establishment, the authentication protocol is utilised during LCP negotiation and this has to be successful before NCP negotiation occurs.
In PAP authentication, a two-way handshake takes place whereby the username and password are sent across in clear text therefore PAP isn’t ideal in protection.
The preferred authentication will then be PPP CHAP whereby it periodically verifies the remote connection through a three-way handshake. After PPP link establishment, the host node sends out a ‘CHAL’ (challenge message) to the remote node which in turn responds with one-way hash-function calculated value. On receipt, the host then verifies with its own expected hash value calculation and there is a match then the authentication is acknowledged otherwise there is a disconnection.
Therefore both sides authenticate each other interdependently but in cases whereby the routers are of different types such a connection between a cisco & non-cisco router, the ‘ppp authentication chap callin command’ must be used as the access server will only perform authentication if the remote node device called for it so here, authentication is done only if incoming calls are initiated.
One important fact to remember is when performing a connection to a device of a different ISP (Internet Service Provider) or administration then it is mandatory to configure an authentication username different from the hostname. In this event, the hostname isn’t available as well as the password and username credentials assigned by the ISP so the ‘ppp chap hostname’ command is issued to specify the alternate username used for authentication.
This is very useful for cases when there are multiple devices dialing into a central site and all sharing the same secret password and username causing difficulty in managing it: so if the remote devices use a different hostname this can be avoided.
One example of PPP CHAP authentication is the MS-CHAP which is the most secure encryption algorithm by Windows NT. MS-CHAP works along with the RAS server encryption setting and will negotiate a PPP connection using an encryption algorithm.
DES is an example of an encryption algorithm used by RAS server and is also supported by Windows NT. MD5 CHAP is one of the major used encryption methods which is very efficient for small user-environment. The MD5 key account information is created and stored in the RAS server registry and is enables the MD5-CHAP authentication. Therefore MD5-CHAP requires MD5 key in order for any negotiation to occur.

Another Authentication framework we will discuss is AAA which is broke into three major security functions.
Firstly Authentication, whereby user credentials such as password, username, acknowledgments and encryption are identified. This identifies a user before being accepted into the network on all interfaces by default.
Second A stands for Authorization which is the method followed in access control procedure i.e. one-time authorization, account authorization and IP support. It functions by listing attributes that describes what the user can access to, resources and limitations. These methods must be defined through AAA and can be configured by deploying in different interfaces.

The last A defines Accounting which handles collection of sensitive information such as user accounts, configuration and number of packets & bytes. Accounting monitors user access and their consumed resources and provides network access server & user activity reports.
AAA is beneficial in four main ways: Scalability, Flexibility, Standardisation and Multiple backup systems. AAA in summary that defines the type of authentication in forms of method lists and applies them to specific interfaces.
Method lists are sequential lists that are used to authenticate a user and can be designated to enable more than one security protocol in cases of failure. So multiple method lists are configured so if the first doesn’t work, then the next method list is selected until successful application therefore reducing chances of authentication failure.
You must have AAA in your system before you are able to use it. You can do so by entering the command ‘aaa new-model’ in the global configuration mode. And if you decide that AAA is not required, you can disable it by entering ‘no aaa new-model’ in global configuration mode.

AAA authentication can be used in different login methods such as enable password, using Kerberos, line passwords, local passwords, and group radius & name.
PPP authentication can be configured using AAA which the optimal solution whereby AAA facilitates various authentication methods on different serial interfaces that run on point to point protocol.
The method lists created will authenticate via PPP and can be applied in the PPP authentication line configuration command.

SECURE REMOTE ACCESS FOR MOBILE UTILIZATION

In the enterprise mobile devices are becoming more and more essential business tools and therefore ensuring security in their utilization has become a key factor in corporate industry.
As we see with all the exposure to threats in mobility network, secure remote access is required to be enforced in order to prevent chances of malicious activity.
Mobile users utilize clientless browser-based connectivity on mobile applications from smart phones and tablets. So anti-virus software should be installed and configured within the OS (Operating Systems) application so as the mobile users remotely access networks: this scans the device for malware as well.
The OS frequently updates and provides Identification of each user according to authentication and authorises access to network resources. So once the connection is verified then all traffic between clients and enterprise network is secured and audited over SSL (Secure Socket Layer).
Different solutions are used when it comes to securing remotes access for mobile users, an example is the CheckPoint RAS ( Remote Access Solutions) which utilizes the most secure & comprehensive solution to connect two end points so that information is shared securely with ease of management. It also integrates point to point security software with the Remote Connectivity Mobile Access Software Blade which provides a central managed, simple and secure VPN connectivity for mobile devices.

It offers customization with either IPsec or SSL VPN and connects to both web-based and non-web based application.
The FirePass controller discussed in earlier section also provides mobile device support through permitting secure access from mobile cell phones to applications such as email and also formats email servers such as SMTP to fit the mobile screen and also view attachments such as Word/ Excel documents.

REFERENCES

Fleizach, C. (2002). Remote Access Solutions. Checkpoint.com. Retrieved November 15, 2013 from http://www.checkpoint.com/solutions/remote-access/

Beaver, K. (March, 2012). How to secure remote network access. Searchsecurity.com. Retrieved November 06, 2013 from http://searchsecurity.techtarget.com/tutorial/Managing-remote-employees-How-to-secure-remote-network-access

Information Technology. (2008). Mobile services. Pitt.educ. Retrieved November 21, 2013, from http://technology.pitt.edu/mobile-services.html

Garderhagen, B. (November, 2005). Remote Access Solutions. Arraynetworks.com. Retrieved November 06, 2013, from http://www.arraynetworks.com/solutions-remote-access.html

Microsoft. (February 29, 2012). Deploying Remote Access Server. Technet.com. Retrieved November 06, 2013 from http://technet.microsoft.com/en-us/library/hh831520.aspx

Cisco. (2003). Remote Access VPN Services. Cisco.com. Retrieved November 13, 2013 from http://www.cisco.com/en/US/docs/net_mgmt/ip_solution_center/3.2_security_management_suite/security/user/guide/ipsec2.html

Similar Documents

Premium Essay

The Manhattan Project: The Duality Of Technology

...Since time immemorial, mankind has created objects and methods to make their lives easier. We commonly refer to these innovations as technology. From the first wooden spear created by the caveman to the latest augmented reality of today’s Silicon Valley, these innovations have been technology. Since technology has been adopted, there have been naysayers that have always spouted the same lines of “This technology is going to ruin us” and “This technology is evil”. In this essay, we will show the duality of technology by the destructive nature of it, the beneficial nature, and the choices mankind makes when it puts these technologies into practice. In 1945, at 5:29:45 a.m., the Manhattan Project came to an explosive end as the first atom bomb...

Words: 982 - Pages: 4

Premium Essay

Improving Project Performance on Technology Projects

...Improving Project Performance on Information Technology Projects Many causes of project failure can be traced to faulty thinking; which leads to poor project planning, inadequate execution, flawed decision making, poor communication, and billions of wasted dollars each year. Nevermind that any major information technology (IT) takes an average of 24 months from start to finish, the high cost of IT and the associated resources make it imperative that we get these projects right the first time. Funding cutbacks, global markets/teams, mandatory investments and riskier business opportunities also add to the reasons why improving project performance on high cost IT investments is vital to the success (or failure) of any organization. Many years ago, I worked for the once highly successful financial organization, Global Best. Global Best employed more than 20,000 employees globally. During my 5 year tenure, I project managed or team-led no less than 30 different projects, each worth multi-millions to the company and its client base. Project performance ranged from ‘very good’ to ‘plain bad’—with the majority of projects falling into the plain bad category. Project management was something you focused on if you had the time; and project performance was of no real importance as long as a product was ultimately delivered. Today, low quality, poor performing projects are hardly tolerated although still not a thing of the past. The 21st century project manager has a well-understood...

Words: 269 - Pages: 2

Premium Essay

Quality Project Management for Technology

...Staffordshire University & APIIT-UCTI Masters Level Case Study Date Assigned : Fri, 05-Mar-2010 Date Due : Wed, 02-Jun-2010 (before 7pm) Lecturer : Dhason Padmakumar ________________________________________________________________________ 1. Your Task • The Chief Executive officer of your organization has instructed you to create a Project Management Procedural Handbook in preparation for a series of possible software development projects that your organization is about to undertake. The handbook will be used as a guide/template for the management of projects. It should be approximately 2500 words long • The content of the handbook should be of: ▪ Practical use to you and your workplace colleagues. ▪ Ensure that your organisation’s projects are conducted with the most appropriate tools and methods to the highest possible standards. ▪ Demonstrate academic rigour based around the structure of this module and the further research that you perform. 2. The Handbook Itself • It follows that the Handbook must be of a professional standard. • To help you achieve this a suggested template has been attached as a guide for the Handbook structure. Please feel free to add or remove sections for your own handbook scenario. • You must ensure that you identify and reference the work of others. Therefore, provide...

Words: 1378 - Pages: 6

Premium Essay

The Impact of Project Portfolio Management on Information Technology Projects

...The Impact of Project Portfolio Management on Information Technology Projects Sergio Ricardo Calderini London Business School Regent’s Park, London NW1 4SA, United Kingdom e-mail: scalderini.mba2004@london.edu Bert De Reyck London Business School Regent’s Park, London NW1 4SA, United Kingdom Tel. +44 20 7706 6884; Fax. +44 20 7724 7875; e-mail: bdereyck@london.edu Yael Grushka-Cockayne London Business School Regent’s Park, London NW1 4SA, United Kingdom Tel. +44 20 7262 5050; Fax. +44 20 7724 7875; e-mail: ygrushka.phd2003@london.edu Martin Lockett Ashridge Berkhamsted, Hertfordshire, HP4 1NS, United Kingdom Tel. +44 1442 841025; e-mail: martin@mlockett.com Marcio Moura London Business School Regent’s Park, London NW1 4SA, United Kingdom e-mail: mmoura.mba2004@london.edu Andrew Sloper CVC The Customer Value Company 48 St Mary's Road, Long Ditton, Surrey KT6 5EY, United Kingdom Tel. +44 7768 861920; e-mail: andrew.sloper@customervalue.co.uk  February 2005  Ashridge Business School UK - http://www.ashridge.org.uk The Impact of Project Portfolio Management on Information Technology Projects Abstract The ever-increasing penetration of projects as a way to organise work in many organisations necessitates effective management of multiple projects. This has resulted in a greater interest in the processes of project portfolio management (PPM), with more and more software tools being developed to assist and automate the process....

Words: 8228 - Pages: 33

Premium Essay

The Role of Effective Communication in Information Technology Projects

...role of effective communication in the managing of Information technology projects Project Management III (IS3A) – Communication Assignment 2 Bradley Isaacs (197019226) Dr Pineteh August 2010 The role of effective communication in the managing of Information technology projects Project Management III (IS3A) – Communication Assignment 2 Bradley Isaacs (197019226) Dr Pineteh August 2010 ------------------------------------------------- Table of contents Abstract 3 Introduction 3 Management of conflict 5 Management of meetings 6 Dissemination of project briefs 8 Team dynamics 10 Conclusion 11 Reference list 12 Abstract Communication forms the communal aspect of managing information technology projects. The effectiveness of this facet can be the determinative factor for many project successes therefore a failure to communicate effective is often the greatest threat to the positive outcome of the project. This paper identifies and discusses aspects that play a pivotal role when communicating in an information technology project environment. Key aspects discussed include the implications for team dynamics, management of conflict and dissemination of project briefs. The management of meeting and how this can promote team dynamics in a project team. Introduction From the beginning of an information technology project, up to the completion thereof, various important roles are being...

Words: 2673 - Pages: 11

Premium Essay

The Role of Effective Communication in Managing Information Technology Projects

...Paper title The role of effective communication in managing Information Technology projects Specific instructions Write academic paper in which you discuss the role of effective communication in managing IT projects. * The paper should be well-researched and conceptualised, drawing on arguments in published books and academic articles. * It should critically discuss the role of effective communication from a broad perspective, paying attention to the implications for team dynamics, management of conflict, dissemination of project briefs, management of meeting, collection and management of information etc. * The paper should cite at least three published books and three journal articles. These sources must be cited in-text and a complete reference list provided at the end of the paper. * It should be written in very formal academic English, with no contractions, clichés, slang, abbreviations, emotive and/or gender insensitive words. * Your arguments and/or claims must be logical and well-developed using sufficient examples and supporting data from your research. You might consider using sub-headings to enhance readability. * Paper should have an abstract of 200words and a methodology section. It should also have a declaration and a content page. * The entire paper should not exceed 12 pages and it should be carefully edited for style and language. * It should be typed in Arial font size 12 with sub-headings in 14. It should be in 1.5 line...

Words: 283 - Pages: 2

Premium Essay

Information Technology Evaluation and Implementation - Project Risks

...Information Technology Evaluation and Implementation Project Risks Project risk involves understanding potential problems that might occur on the project and how they might impede project success. According to Fuller et.al (2008), “Project risk is an uncertain event or condition that, if it occurs, has a positive or a negative effect on a project objective.” There are many sources of risk that a project may come upon during the project whether it was foreseen or not. Some of the more common sources of risk are those that often overlooked in most projects; lack of determining the project scope, unforeseen costs estimates, unrealistic timelines, and lack of leadership overview. Risk management is the main solution to protect against risks. The goal of project risk management is to minimize potential risks while maximizing potential opportunities. Risk management can be broken into six categories; Risk management planning, risk identification, qualitative risk analysis, quantitative risk analysis, risk response planning, and risk monitoring and control. * Risk management planning is deciding how to best approach and plan the risk management activities for the project * Risk identification determines which risks are likely to affect a project and documenting their characteristics * Qualitative risk analysis characterizes and analyzes risks and then prioritizes their effects to project objectives * Quantitative risk analysis is measuring the...

Words: 321 - Pages: 2

Premium Essay

Which Skills Are Most Important for an Information Technology Project Manager

...DQ 1: SKILLS Researches and studies conducted have shown that despite millions of dollars spent on IT projects yearly, many failed because of lack of proper and effective project management practice. Like all other projects, the emphasis and goal is to successfully deliver information technology projects within budget and time schedule. The information technology project manager therefore has the primary responsibility to bring together and manage the human and material resources required to accomplish this objective and bring the project to a successful closure. Giving the complexity of most IT projects and the fact that many end users (customers) do not possess the technical knowhow to effectively communicate their needs for the software programmer to transform such requirements into a working program further complicate the job of an IT project manager. Hence, beside the hard skills (technical skills) that an IT project manager must possess, he/she must also possess the soft skills such as, good interpersonal skills, charisma, eloquence of speech, persuasiveness, team spirit, proactive, good listener, effective communicator, etc. required to manage all this complexities and as well as the change requirements of end users. Brewer J. L. (2005) considered relationship management has an important skill set that a project manager should possess while managing projects. A project team usually will comprise of people drawn from different academic and socio-cultural background with...

Words: 788 - Pages: 4

Premium Essay

Associated Technologies Case Study (Project Mgt)

...study Q1 Project Crashing   Due to the internal demand and unexpected cope up situation for the external uncertainties there are possibilities of speed up the scheduling time for projects. For instance due to high prioritize resource commitment for the another simultaneously running critical project or situation where seasonal weather effect come to the play in time. Mostly this kind of expedition occurs from the non critical activities where the slack is available. Having done the crash, it would result better utilization of recourses but the rule of thumb is there should not be any major impact on the project scope.   In simple terms, this refers to the compression of the original project schedule in order to minimize the total time of the project. This has to be done after very careful study since it might crack the whole project till up to the abandons. Moreover detail analysis and total acceptability of the stakeholders has to be met and this has to be done at the least additional cost. The regain value should be derived from the benefit gain over the additional cost; which has to be realized in positive node with respect to the aggregate impact on the organization. Q2 What are the steps involving in Project Crashing?   First, the marginal cost has to be calculated in relation with the project crash for each activity. Crash Cost Per Time Period or Margin Cost= Marginal Cost = (change in cost)/(change in time) =  (Crash cost - Normal cost)/(Normal time - Crash...

Words: 809 - Pages: 4

Free Essay

Technology in Education Project

...Microsoft Power Point While I have used Microsoft Power Point in a previous class, I do not have a solid grasp of using the program to the fullest potential. With my lack of expertise with this program in mind, I chose to use this program to develop a product for use in a classroom. Microsoft Power Point is program if used to the fullest potential, could bring the learning experience to life for the children that would otherwise not understand the course material. Microsoft Power Point is a program that can enable a teacher to prepare a presentation that could introduce students to information that they need to learn. The information can be formatted in nearly endless ways. With such a wide range of possibilities, the teacher can use this to keep the presentations new and interesting each throughout each presentation and from presentation to presentation. The presentations have the ability to contain videos, which a teacher could install. These videos would allow students to see the information in an additional way other than in text form. Since many students are visual learners, this could be a great value in an educational environment. Inside the presentations, the teacher has the ability to install links to supporting websites, files, or other types of information that supplement the classroom material. Having this ability makes organizing information to be presented to the students more organized. Teaching Product With Microsoft Power Point, I created a presentation...

Words: 759 - Pages: 4

Free Essay

Course Project: Applied Information Technology Project

...Course Project: Applied Information Technology Project MIS 535 – Managerial Applications of Information Technology Prof. Richard Dixon Table of Contents 1. Abstract 2. Brief Company Background 3. Discussion of business problems 4. High Level solution 5. Benefits of solving the problem 6. Business/Technical approach 7. Business process changes 8. Technology or business practices used to augment the solution 9. Conclusions and overall recommendations 10. High-level implementation plan 11. Summary of project Abstract Brief Company Background The organization that will be the topic of my discussion in my final project paper is Cook County Health and Hospital System (CCHHS) in Cook County, Illinois. The Cook County Health and Hospitals System is the safety net for health care in Chicago, suburban Cook County, and unincorporated Cook County boundaries. There are three hospitals in the Cook County Health and Hospital System. John H. Stroger Hospital is the main hospital in the system, which is located in the Illinois Medical District on the Near West Side in Chicago. Stroger Hospital serves as the primary public provider for medical services for Cook County. The other two hospitals are, Provident Hospital is located on Chicago’s south side, and Oak Forest Hospital is located in the south suburb of Oak Forest. Not only is there three hospitals in the system, but also 16 Ambulatory and Community Health Care Clinics. My role...

Words: 873 - Pages: 4

Free Essay

Applied Information Technology Project

...Video Teleconferencing, also known as VTC, is a telecommunication technology that allows different locations the ability to have a two-way video and audio communication simultaneously. This allows business meetings to take place in the privacy of their own office or home no matter where they are located in the World. VTC is becoming popular choice for meetings, and colleges, the military utilizes VTC in classrooms and families of deployed service members can communicated from overseas with one another. There are advantages and disadvantages to VTC. In order to understand the advantages and disadvantages, one must first understand how the technology system operates. VTC uses a digital compression of both video and audio in real time. Ones and zeroes are used in digital technology and are subdivided into what is called label packets. These packets are then transmitted through the digital network where they are converted between analog and digital format. In order to convert the signals a Coder/Decoder or CODEC is used. Some items that are required consist of video camera, computer, microphones, monitors, webcam, speakers, internet or landline, television, or projector. The computer is “a data processing unit that ties together the other components, does the compressing and decompressing, and initiates and maintains the data linkage via the network.” (Videoconferencing) Later in the paper, I will go into more detail of the VTC structure. Advantages to VTC consist of economic...

Words: 630 - Pages: 3

Free Essay

Information Technology. Project Management

...EXERCISE 15.1 The following is a list of objects found in one of the authors' kitchens: teapot, mug, soup bowl, plate, spoon, table knife, cook's knife, fork, saucepan, frying pan, kettle, casserole, fish slice, tin opener, baking tray, scales, mixing bowl, glasses, jugs, corkscrew, rolling pin, ladle, egg cup, chopping board. Produce a taxonomy using the TDH notation of these objects. Does it obey the TAKD uniqueness rule? Compare your answer with someone else's. (Note: the authors had great difficulty with items like the corkscrew, which did not fit easily into any generic category - perhaps you did better.) answer As the authors had already produced a partial taxonomy, we interviewed two domain experts (cooks). They were asked to describe how they would group and classify the kitchen items. They were explicitly told (and reminded) that they could have multiple classifications and put the same item into several categories. The authors then cast their answers into TDH notation. One of the subjects was a doctor and used to medical taxonomies of disease. Despite stressing the looseness of the classifications, he insisted on a complete taxonomic tree (Figure Ex15.1.1). kitchen object XOR |__ preparation XOR | |__ pre-preparation XOR | | |__ opening | | | tin opener, cork screw | | |__ measuring | | scales, (measuring) jug | |__ 'proper' preparation XOR | |__ active | | rolling pin,...

Words: 570 - Pages: 3

Premium Essay

Netw583 Strategic Management of Technology

...NETW583 Strategic Management of Technology Term Project Instructions A key part of this class is the Term Project – developing a comprehensive written strategic plan for a technology driven organization. The project is intended to provide students with the opportunity to integrate skills and knowledge developed in this course. The project has a value of 200 points or 20% of the overall course grade. This document will provide you with additional information about the requirements as a supplement to the brief description on the course site. General Comments The project is organized consistent with the Terminal Course Objectives. This format allows students to apply what they have learned and serves to reinforce the concepts. The Term Project has 6 sections each of which should cover a specific Terminal Course Objectives 1. Strategy (TCO F) 2. Core Competencies (TCO C) 3. Industry Dynamics (TCO A) 4. Technology Sourcing and Internal Innovation (TCO D) 5. Product Development Strategy (TCO E) 6. Strategy to protect innovations (TCO B) Each section of the project should be approximately 2-3 double spaced pages in length. Only the final paper, which is due on the Sunday ending week 7, will be graded. Each plan grade is made up of 3 components and weighted as follows: • Content (70%): how well the plan meets the objective of each section, which is organized by Terminal Course Objective. Care should be taken to ensure that your ideas are carefully considered and supported by...

Words: 1290 - Pages: 6

Premium Essay

Information Technology Term Paper

...Business Systems Plan Phase 5 Individual Project 2013 Information Technology Management Table of Contents Business System Planning (Week 1) Introduction 4 Identify how the following critical success factors will be addressed by case study 5 Governance 5 Business plan alignment 6 Process improvement 6 Resource optimization 6 Operating excellence 7 Identify how the following critical success factors will be addressed by case study 7 Business management issues 7 Strategic and competitive issues 7 Planning and implementation concerns 8 Operational items 8 Identify how the variables defined by Strassmann's Model will be measured 8 Efficiency 8 Effectiveness 8 Competitivness 8 Profitability 8 Strategic Information Systems Assessment (Week 2) Create an analysis of strengths, weaknesses, opportunities and threats for case study 9 Case study continued 9 SWOT analysis of case study 10 SWOT analysis continued 11 12 13 Create an assessment of the forces that are presently governing competition for case study 14 Using Wiseman’s Framework of Strategy Development define the strategic thrusts and advantages 15 Information Systems Business Case (Week 3) Critical success factors for IT Manager 16 Continued. 17 General stratgy for IT goals and objectives of the case study. 18 General strategy on how IT department will support the goals and objectives of the case study 19 Information Technology Strategy Statement (Week 4) Business...

Words: 6788 - Pages: 28