...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access...
Words: 364 - Pages: 2
...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this element...
Words: 283 - Pages: 2
...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video chapter...
Words: 322 - Pages: 2
...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance https://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly defined...
Words: 577 - Pages: 3
...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not dependent...
Words: 294 - Pages: 2
...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access...
Words: 364 - Pages: 2
...Nowadays, many people are doing online dating. Seeing so many advertisements promoting online dating are going through the roof now. For example, seeing eHarmony.com as they have a commercial saying that they have now reached 5 million members, that is an amazing number to have for online dating. This company is definitely making its profit, but also is a huge proven fact that a lot of people nowadays are using this online dating thing. Most people are afraid of doing such things, simply because they don’t want to get made fun of, or the lack of confidence. The author says that it can be a bit scary with its “straight to the point” type approach, because pretty much all of anyone’s personal information is on their site. But there are also many different websites that others could connect, for example Facebook. Over the years, Facebook has definitely grown into the “it” thing in today’s age. People are also connecting through this site also, meeting new faces and even old ones from years ago. The upside to online dating is not having that face-to-face interaction. Some people just don’t have that confidence to approach someone and say “I like you. I’d like to get to know you.” Some people may get embarrassed or again, just lack self-confidence. With online dating, people can type out messages and think about what they wrote. I’m in between about online dating, because I like the face-to-face interaction. Simply because you can tell if the person is telling you the truth through...
Words: 273 - Pages: 2
...Remote Access Control Policy 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investments. 2. General access to the Internet for recreational use by immediate household members is discouraged through the Investment Dial-In Network. The Richman Investments employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investments employee bears responsibility for the consequences should the access be misused. 3. Access to the Richman Investments Trusted Network will only be allowed from Trusted Users and other special ITS administered subnets. 4. Remote or outside Trusted Users (defined below) may gain access to Trusted hosts in one of two ways: a. The outside Trusted user will initiate a connection and authenticate to the Richman Investments VPN endpoint (see VPN_Policy). Username and password pairs will be distributed to Third Parties upon receipt of a valid Third Party Connection Agreement. Currently supporting Windows 8 with Microsoft SQL Server 2014. Network Infrastructure and Control Systems will make client software available upon request. b. The Richman Investments...
Words: 362 - Pages: 2
...Assignment Requirements 1. Look up other database-naming conventions. Is there one that makes the most sense to you? Explain why. 2. Look for Entity Relation Diagrams. What other ways of diagramming entities and relations did you find? Describe any similarities and differences between them. Solutions 1. A naming convention is important when working with databases in order to provide a clear structure and format; especially in team environments. By using these conventions the database can be understood by anyone applying these conventions; thus increasing maintainability. These are not rules but guidelines that can be adapted to any working environment. All names should be in camelcase with the first letter in lower case. Separate name parts by using camel case and NOT underscores or spaces. This provides better readability and you will not have to use quotes when doing SQL statements. Prefixes or namespaces are the ONLY parts of names that should be separated by underscores. This defines a clear separation between names and areas. Do not use numbers in names. This is poor design, indicating divided table structures. Do not use dot (.) separator between names, remember use camel casing. This way you will avoid problems when doing SQL statements as fields are accessed using dot notation. It goes without saying, do not use reserved database words in any name. Always try to use names that make sense and are descriptive of their purpose. Avoid abbreviations whenever possible...
Words: 625 - Pages: 3
...There are six established exceptions to the fourth amendment. The first exception is the search incident to lawful arrest. It states that if someone is lawfully arrested the police can search the person and the surrounding area. The second exception to the amendment is the plain view exception, which states that if an officer see’s something in plain view that is breaking the law that can seize whatever is breaking the law and places you under arrest. Like if your growing marijuana plants in your backyard and an officer looks over your fence and see’s it he can seize the plants and put you under arrest. The third exception is consent, which is given by a person reasonably believed by an officer to have authority. So, if a suspect’s "significant other" provides police with a key to the suspect’s apartment, and police reasonably believe that she lives there. The fourth exception is stop and frisk, the evidence necessary for “reasonable suspicion” here is something beyond mere suspicion, but is less than the level required for probable cause. The fifth exception is the automotive exception. A warrant is not required to search vehicles if police have probable cause to believe the vehicle contains evidence of a crime, the instrumentalities of crime, contraband, or the fruits of a crime. The sixth and final exception is emergencies or hot pursuit. Evidence that can be easily moved, destroyed or otherwise made to disappear before a warrant can be issued may be seized without a warrant...
Words: 290 - Pages: 2
...Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with the variables a, b, and c. d. Adds 2 to a and stores the result in b e. Multiplies b times 4 and stores the result in a f. Divides a by 3.14 and stores the result in b g. Subtracts 8 from b and stores the result in a ii. b = a + 2 iii. a = b * 4 iv. b = a / 3.14 v. a = b - 8 4. Assume the variables result, w, x, y, and z are all Integers, and that w=5, x=4, y=8, and z=2. What value will be stored in result in each of the following statements? h. Set result= x+y i. Set result= z*2 j. Set result=y/x k. Set result=y-z vi. result = x++ - y; vii. Answer -4 viii. result = 4 – 8 = -4 ix. result = ++w + y; x. Answer xi. w = w + 1 = 5 + 1 = 6 xii. result = 6 + 8 = 14 5. Write a pseudo code statement that declares the variable cost so it can hold real numbers. * Declare Real price= 0.00 * Display "the original price." * Input item original...
Words: 731 - Pages: 3
...The Hierarchical Star Topology consists of all the computers in a specific network being connected to a single main point, like a server or hub, which in turn, would be located in an equipment room or centralize location. With the Star topology, hubs are used to facilitate the topology. The drawback to this is, there is about a 20%- 30% waste in unused ports and a company is paying for more ports that is can or will use. Another drawback to this topology is the entire network is reliant on the hub. If it were to fail, the entire network becomes inoperable. In addition to that, there is also potentially a problem if one of the workstations goes down. It can cause interference in the Star topology and cause the entire network to fail. The Star topology, in its basic design, doesn't account for redundancy or diversity, which can make this design very dangerous for business applications. Some of the advantages of the Star topology is it gives a much better signal because all the information isn't shared to every device. You can also add and subtract new devices to the network by simply plugging into or unplugging a device from the hub and monitoring the network is simplified because everything is centralized. The Bus Topology is the simplest network topology. Ethernet is an common example of Bus topology. Once a main network line is laid, all peripherals on the network talk on the same line and listen for each other's communication. One drawback to this topology is at each...
Words: 585 - Pages: 3
...Article Critiques Assignment Three Killer, S.C., Svendson, I.S., and Gleeson, M. (2015). The influence of hydration status during prolonged endurance exercise on salivary antimicrobial proteins. European Journal of Applied Physiology, 115, 1887-1895. The secretion of mucus is the initial biological defense system against bacteria and other pathogens in the mouth and respiratory system (Gleeson and Pyne, 2000 as cited in Killer, Svendson, and Gleeson, 2015). Salivary secretory IgA (SIgA) in a deficit has been shown to be associated with high frequency of illness (Kiler, Svendson, and Gleeson, 2015). Despite this association, research has recently taken a turn towards analyzing antimicrobial proteins (AMPs) and has continued to gain momentum. There are two very prevalent AMPs in the mucus, salivary lysozyme (SLys) and salivary lactoferrin (SLac), both of which have an important presence in protecting the immune system. This is an important note regarding athletes, as training involves longer and more intense bouts of exercise...
Words: 2369 - Pages: 10
...Authorization- Richman Investment has to define specific rules to dedicate who has access to which of the computers and its resources. The suggestion that I suggest is that Richman Investments implements a group policy. A group policy would allow an administrator the privilege to assign different access controls to different group users. The administrator could then assign different individuals to one or multiple groups. The permissions of the user is dictated by the administrator. Identification- Richman Investments must assign a unique identifier that compliments each user. This way they can keep track of who has access to what systems and data, the most commonly has used is a user identification number and password. Authentication- “In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification.” (Technology, 2014)The best way for this company is to use a knowledge based system that includes PIN, pass phrase, or password along with a ownership authentication which includes but is not limited to a key, badge, token, or smart card. Using a combination of will provide the most adequate form of security. Accountability- Richman Investments has to hold all users responsible for what they do or not do on their systems. They must makes sure log systems can detect, prevent, and/or monitor the system due to all the laws that have...
Words: 282 - Pages: 2
...Marthe Francois NURSE4420 Unit 3 Assignment 1 I believe that customer satisfaction is an important aspect of a good quality company. For example, when a client comes to your company and you don’t satisfy the client well enough, he can give you a bad review to his peers and friends. His friends could have a lot of influence and when your company gets bad reviews, you start to lose profit and clients in general. If your clients are very satisfied with you, they can recommend you to their friends and they can give you more customers so that your company or organization can grow economically and socially. Assignment 2 One way that certain groups are tested on for benchmarking performance is efficiency in their task that their job gives them. Efficiency is important in my organization as it can either save a person’s life or kill them. They are tested to see if they can handle the anxiety and workload of the environment while doing multiple things at once. FDU and the Henry P. Becton School of Nursing & Allied Health use the...
Words: 558 - Pages: 3