Premium Essay

Unit 4 Assignment1

In:

Submitted By leewill2014
Words 474
Pages 2
Unit 4 Assignment 1: Enhance and Existing IT Security Policy Framework Richman Investments Remote Access Standards Purpose: This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources. Policy: Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access. Requirements: * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong

Similar Documents

Premium Essay

Technitian

...Achille Fred Unit 6 assignment1 video summary 4 Video 1.06 storage Devices. 2 – the clip talks about how a magnetic, optical and solid state storage devices work. The various interfaces devices such PATA/IDE, SATA,SCSI,USB, and FIREWIRE. It also discussed how recognizing and identifying cables and connectors, pin configurations, and speeds associated with each technology. 3- Topics presented are: * New hard drive installation * Hard drives 137 GB limit * 300 GB hard drive Scenario * Hard Drive interfaces PATA,SATA,SCSI,USB and FireWire. * PATA or parallel ATA * ATA 100 and ATA 133 * SATA or serial ATA * Floppy drives : 3 1/2” disk and 5 ¼”disk * Floppy Drives Formatting * Power Supply connections * Connections types: Molex and berg * Floppy Drive cables and connectors * CDs * Pits and Lands * Laser Reading * Types of CDs: CD-ROM, CD-R and CD-RW * DVDs -Multiple layers increase capacity * HD-DVD * Blu-Ray * CDs and DVDs * Power supply * Best Arrangement * Care and Handling * SCSI Devices * Three SCSI standards: SCSI -1 ,SCSI-2, SCSI-3 Achille Fred * SCSI Connector * Narrow SCSI * Wide SCSI * Internal or External SCSI * SCSI ID * IEEE 1394 or Fire Wire * Fire Wire and ilink * Isochronous Data Transmission * IEEE 1394A and IEEE 1394B * Solid State Removable * Compact flash * Flash Drives * Vault Drives ...

Words: 251 - Pages: 2

Free Essay

Asdf

...Unit 1 Assignment1 Chapter 1 1. Free software is any software that is not only free to obtain but also allows you to obtain the source code for that software. 4. GNU was meant to be a free operating system, however it only finished the system programs part of the operating system. Linux is what finished the kernel part of the operating system and is what is available today. Chapter 2 1. Installing an operating system such as fedora involves setting the BIOS to boot from the CD/DVD, making a selection from the welcome screen, then you must configure, after this it writes the operating system to the hard disk. Chapter 3 1. A live session is when you run Linux on a computer without installing Linux on the computer. 4. The /boot partition must be the first or one of the first partition on the hard disk. 8. When the system enters run level 5. Chapter 11 1. When in single user mode you can only log on the one terminal, when in multi user mode you can log on to any terminal that is set up for log in. 3. The letters stand for substitute user. You can give yourself privileges of any User whose password you know. You can also execute a command (other than a shell) as the specified user. To log in as Alex, you would first log in as root, and then give the command su Alex, or su – Alex to establish the same environment that Alex has when he logs in. 7. Do not use any dictionary words, use a mix of letters, numbers, and special...

Words: 276 - Pages: 2

Free Essay

Darpa Challenge

...Unit 1 Assignment1: DARPA Challenge 1. How would you define this problem? What are the major problem components, and what obstacles do you foresee? -Finding a way to operate through an unknown course with no interaction by the builders. Weather, equipment failure and unknown terrain changes could all become obstacles that will hinder the ability to finish the race on time. 2. How fast do you need to go to complete the course in the allotted time? -An average speed of 17.5 MPH would be acceptable. Top speed should be somewhere around 50 MPH if conditions are good enough to do so. 3. What is the fallacy of considering the above average speed – what do you need to consider? -Exceeding above a nice steady speed of 17.5 MPH places more risks with unknown weather and road conditions. You would need to consider the forecast for the day and road conditions to match. 4. What strategies can you use to avoid obstacles -Radar, GPS, cameras to detect obstacles around the vehicle and Ladar. 5. What are some disadvantages of the route information you receive, in terms of the vehicle driving the route? -Not knowing the distance between 1 GPS location and the other, and not knowing if the coordinates given are going in a straight path or curving off to one side or the other. 6. What strategies can you use to prepare your vehicle for the route once you receive the information? -If possible the best thing to do would be to try and pre-determine what path the vehicle is taking...

Words: 322 - Pages: 2

Free Essay

Unit 1 Assignment1: Integrated Circuit Technology

...3,500 pMOS | 1974 | 8080 | 6,000 NMOS | 1974 | 4040 | 3,000 pMOS | 1977 | 8085 | 6,500 | 1978 | 8086 | 29,000 | 1979 | 8088 | 29,000 NMOS HMOS | 1982 | 80186 | 55,000 | 1982 | 80188 | 29,000 | 1982 | 80286 | 134,000 | 1985 | 80386 | 275,000 | 1988 | 80386SX | - | 1988 | i960 | 250,000 | 1989 | 80486 | 1,180,000 | 1989 | i860 | 1,000,000 | 1993 | Pentium | 3.1 | 1995 | Pentium Pro | 5.5 | 1997 | Pentium II | 7.5 | 1999 | Pentium III | 9.5 | 2000 | Pentium 4 | 42 | 2001 | Itanium | 25 | 2002 | Itanium 2 | 410 | 2003 | Pentium M | 77 | 2005 | Pentium D | 115 | 2006 | Core Duo | 151 | 2006 | Core 2 | 291 | 2006 | Itanium "Montecito" | 1720 | 2008 | Atom | 47 | 2008 | Core i7 | 730 | *2010 | Itanium "Tukwila" | 2000 * | 2010 | Xeon "Nehalem-EX" | 2300 | 2010 | Intel "Westmere" | 1170 | 2011 | Intel "Sandy Bridge" | 995 | 2011 | Xeon E7 | 2600 | 2012 | Itanium "Poulson" | 3100 | 2013 | Intel "Haswell" | 1400 | UNIT 1 ASSIGNMENT1: Integrated Circuit Technology * Indicates the processor model and year when two billion transistors were placed on a single processor chip* Sources: http://en.wikipedia.org/wiki/Microprocessor_chronology http://en.wikipedia.org/wiki/Tukwila_%28processor%29 1. According to Computer Structure and Logic, Chapter 1: Introduction to Computers pg. 15, “The growth in the number of transistors used in integrated circuits is reasonable, because it does hold true to the...

Words: 306 - Pages: 2

Premium Essay

Hr Recruitment & Selection Assignment 1

...DIVISIONAL HR MANAGER ADMINISTRATIVE ASSISTANTS (4) Recruitment and Selection Proposal HUMAN RESOURCES Recruitment and Selection (HRM782) Assignment 1 TABLE OF CONTENTS Page 3: Introduction Page 4: Proposed Job Advertisement Page 5: Selection Report Page 6: Resume Characteristics Report Page 8: Endnotes Page 9: Bibliography INTRODUCTION Successful candidates for the position of HR Administrative Assistant must exhibit the following competencies (as stated in the job description): Core – Excellent interpersonal skills, flexibility and dependability Functional – Client Service Orientation Job-Specific – Knowledge of MS programs, keyboarding skills of 60 wpm and a minimum of one year administrative experience. In addition to the above core competencies, we also need to gear our screening techniques to ensure we select the recruits with the highest levels of general cognitive abilities and conscientiousness. These predictors have been proven to be the most successful at guaranteeing above average job performance, and therefore the most benefit to the company as a whole.( Catano, V.M., W.H. Wiesner, R.D. Hackett and L.L. Methot. (2010). Recruitment and Selection in Canada, 4th Edition. Toronto, Ontario, Canada: Nelson Education Ltd., p. 174. ) Included in this report is a clearly worded job advertisement, with an in-depth selection proposal. In order to ensure...

Words: 1444 - Pages: 6

Free Essay

Termpaper

...0.1: Estimate a logit using solver Product of probability Log likelihood Intercept Eduation coefficient Age coefficient 2.06641E-11 -24.60262143 -11.15550863 0.531907452 0.113507304 (2) M EE d = M E Ag e = βE d e X β (1 + e X β )2 β Ag e e X β (1 + e X β )2 = 1 N βE d (i ) e X βi Σ N 1 (1 + e X βi )2 = 1 N β Ag e(i ) e X βi Σ N 1 (1 + e X βi )2 1 Result: Table 0.2: Add caption Marginal Edu effect Marginal age effect 0.085732302 0.018294992 (3) Table 0.3: linear probability model Coefficients t Stat -1.541134276 0.097414096 0.020646694 Intercept EDUC AGE Std. Err. 0.429125046 0.025225082 0.005153578 -3.591340779 3.861794961 4.00628341 (4) H = −Σi p i (1 − p i )x i x i = X ΩX The diagonal of matrix Ω equal to p i (1 − p i ) The Hessian matrix   8.058949138 105.838015 300.4357025 H =  105.838015 1434.435526 3840.728111 300.4357025 3840.728111 12190.99391 (0.1) The variance-covariance matrix equals to the inverse of Hessian matrix Table 0.4: variance-covariance matrix Constant Constant Edu Age Edu Age 10.2699517 -0.511915922 -0.091816163 -0.511915922 0.029972725 0.003172894 -0.09182 0.003173 0.001345 2 (5) According to Student’s t distribution, under 49 freedom degree, the probabilities that these coefficients are 0s are less than 0.005. We can say these coefficients are significant under 99.5% confident level. Table 0.5: Add...

Words: 856 - Pages: 4

Premium Essay

Bus3022-Forecasting/Planning

...merchandise at a reasonable profit, treat your customers like human beings, and they will always come back for more". His model, still used today, was to build customer loyalty by providing exceptional service” (Pulido, I.) Supply Chain “Distribution operations are located in Maine and employed nearly 2,500 people during the peak business season in 2014. Over 15 million packages were shipped during 2014, with over one million packages going out during our busiest week. The hub of the L.L.Bean distribution operation is a one-million-square-foot, state-of-the-art facility with the capacity to hold 10 million units. Manufacturing facilities are located in Brunswick and Lewiston, Maine, where over 350 employees produce such iconic products as the Maine Hunting Shoe®, the L.L. Bean Boot and the Boat and Tote® Bag. Customer demand for the iconic L.L .Bean Boot remains high, with a unit demand of nearly 450,000 pairs in 2014” (LL Bean, 2015). As you can see, there is a heavy burden on LL Bean’s supply chain. LL Bean’s presence includes retail and outlet stores in the United States, Japan, and China, and sells worldwide via the internet, while continuing its catalog sales in over 160 countries. (Cooke, J., 2011) To manage this...

Words: 1211 - Pages: 5

Premium Essay

Mgb223 Business Concept

...MGB223 Entrepreneurship and Innovation Assignment1: Business Concept E.B. (Electronic cigarette Bluetooth) Student Name: Sunjae Hwang (Sun) Student Number: N8972231 Tutorial Time: Tuesday 16:00~17:00 Tutor Name: Dr Alireza Javanmardi Kashan Submit date: 27th March 2015 Words count: 1197 1.0 The Business Concept: the problem and solution 2.1 Background There are over one billion smokers who often faced with burden of health and cost (OrganizationWorld, 1997). This is caused as smoke of cigarette damages several organ systems not only smokers but also second hand smokers (Boyel et al., 2004). Therefore, many numbers of smokers try to quit on their own, while smoking is one of a difficult addictions to break (Hughes et al., 2004). While some of smokers quit other try to find a chance to quit or reducing the risk of smoking through the electric cigarette which is battery powered electronic nicotine delivery device (ENDD) (Zezima, 2009). However, the problem of using electronic cigarette is still the gesture of smoking. With this reason, some of electronic cigarette users even more increase amount of smoking. 2.2 Challenge The challenge of this area is that identifying smoking habits while smokers use the electronic cigarette through specific devise to recognize problems of them. If smokers received the reports of their bad habits while smoking the cigarette, they might control their amount or habits of smoking. One of the major problems is that smoking...

Words: 1773 - Pages: 8

Free Essay

Computer Networking

...5. Standards 1.6. Further Reading 1.7. Summary 1.8. Exercises 2. The Physical Layer 2.1. Equipment 2.1.1. Equipment Types 2.1.2. Connection Types 2.2. Transmission 2.2.1. Signal Types 2.2.2. Modulation 2.2.3. Digitization 2.2.4. Synchronization 2.2.5. Transmission Media 2.3. Multiplexing 2.3.1. Space Division Multiplexing (SDM) vi Communication Networks 6 10 1 2 2 4 7 7 8 9 9 10 10 11 11 12 12 13 14 15 16 18 19 19 19 20 20 21 22 23 24 27 28 Copyright © 2005 PragSoft 2.3.2. Frequency Division Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window Protocol 3.4. Data Link Layer Standards 3.4.1. BSC 3.4.2. HDLC 3.5. Further Reading 3.6. Summary 3.7. Exercises 4. The Network Layer 4.1. Network Services 4.2. Switching Methods 4.2.1. Circuit Switching 4.2.2. Packet Switching 4.3. Packet Handling 4.3.1. Packet Structure 4.3.2. Routing 4.3.3. Congestion Control 4.3.4. Error Handling 4.4. Internetworking 4.4.1. Network Sublayers...

Words: 60074 - Pages: 241