Premium Essay

Vulnerablities

In:

Submitted By whitfield52
Words 552
Pages 3
Huntsville Plant Project

Course - PM586
Professor William
1/27/2012

Huntsville Plant Project
The Huntsville Plant Project deadline of June, 30, 2012 set by the board of directors will not meet the deadline. According to my finding, it will not meet the deadline because one of my resources, Manufacturing Engineers is over allocated. The option of reschedule task resources next available time might be open to ensure this deadline is met. When placed in a situation as this there are several things that should be kept in mind to ensure the project will be ready to meet its deadline on time. One suggestion I considered is to meet with all the project team members to ensure that they are aware of the projects objectives and their own role in the project. In doing this it will elevate any misunderstandings and uncertainties so that any of the other tasks will not be over allocated as the manufacturing engineers are. With this in mind each team member will monitor the task usage and the number of hours for work on the scheduled details. Another option is to hire more resources to reduce the time that the manufacturing engineers were allocated. These resources would be well trained in handling the equipment to make sure there is no time delay in finishing the task that was assigned. In a situation like this I would have to reevaluate all tasks of this project.
Key tools such as risk management, scope management, proactive communication and issue management should be utilized to ensure that a project deadline is met. Careful consideration and observation of these key tools is a measure that should be implemented to prevent a project from being delayed. Risk management process of identifying and lower risks will greatly improve the projects chances of meeting deadline. Proactive communication performed regularly and accurately among project team members

Similar Documents

Premium Essay

Windows of Vulnerablity

...In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch. The Window of vulnerability would be close to two weeks of time where their system can breached again and my recommendation if I were the administrator to remedy this gap of time I would attempt to have around the clock staff working on this in order to prevent further breaches of security until the (WoV) Window...

Words: 393 - Pages: 2

Free Essay

Window of Vulnerablity

...window of vulnerability ITT tech | Window of Vulnerability | Review of unauthorized access to SMB server. | | Cory Reiss | 4/1/2014 | This is the Window of Vulnerability For a patch to a newly discovered exploit residing in manufacturer software. | The security breach was detected by the server software manufacturer and a patch is currently being worked on. This vulnerability affects the SMB server giving access to an unauthorized user. The estimated time for the patch to be completed is three days with 7 additional days required for testing and executing the patch. There has been no documented timeline on when the security exploit was established, discovered, or executed. From discovery of the breach yesterday to final completion of fix there is a window of vulnerability consisting of 11 days. From the information presented the exploit only affects the SMB server. If the unauthorized user is able to run an interactive shell this should not be taken likely. Recommended procedure should be to block access on ports defined or suspend the server if possible. Access to SMB can put all of your files at risk and an aftermarket firewall blocking all IP ranges not specified in the workgroup should lower and impede the effectiveness of the exploit. Scans should be run to assess the possibility of injected code or malware. Someone skilled in security forensics should be deployed to assess the files affected or viewed. This can also give you a direction to search for...

Words: 260 - Pages: 2

Premium Essay

Vulnerability

...Article on Vulnerablity Nur 440 August 22, 2011 Vulnerability Article As cited by De, and Anderson (2008), according to Aday (2001), “vulnerable populations are those at risk for poor physical, psychological, or social health. Anyone can be vulnerable at any given point in time as a result of life circumstances or response to illness or events” (p. 3). This particular article will look at the groups who are vulnerable to influenza. As stated by Hutchins, Truman, Merlin, and Redd (2009) “the US national strategy for pandemic influenza preparedness and response assigns roles to governments, businesses, civic and community-based organizations, individuals, and families” (para. 1). Looking at the group that would have a greater risk there are many barriers. One of the barriers is ensuring that all levels from government, right down to the individual act efficiently and swiftly with the plan of action. Others may be transportation, lack of insurance, lack of knowledge, and the list goes on. There are many vulnerable groups when looking at containing or minimizing an outbreak of influenza. Some of the top groups are newborn’s/infants, poverty/poor class of society (no insurance), and the elderly (>65 years-old). A person then can break the groups down even more and say; anyone within these groups that are compromised with other health problems may be at an even greater risk. With influenza very easily contracted from person to person along with looking at these groups...

Words: 427 - Pages: 2

Free Essay

Riordan Manufacturing

...Acquirement of systems For acquiring the new systems for Riordan Manufacturing, all systems will be purchased through CDW.com, who are an online, all information systems seller. The first part of the purchase will be the IBM BladeCenter HS23 7875-Xeon E5-2640 2.5 ghz. blade server. These servers were chosen for their reputable manufacturer and durability with a price of $2,872.99 per unit. The next part of the purchase will be the HP Smart Client t5335z outfitted with Microsoft Office 2010. This unit was chose because it is the most economical of all workstations. This unit meets all the requirements that employees need to handle a work load and keep the work progressing. The cost of each HP Smart Client is $174.99 per unit. There is also going to be the purchase of firewall units, the Cisco Small Business RV220W Wireless-N Network Security Firewall. These will add security to the information systems with a price $268.99 per unit. The servers will need to run on their own operating software, which is sold separately from the server. The choice is Windows Server 2012 Remote Desktop Services for the price of $8,019.99, and each workstation will have Microsoft Office 2010 Professional Edition with open license agreement. With the open license agreement, system administrators have the right to deploy the software over the company with an annual renewal price of $279.99. Also there will be anti-virus software, Norton Ghost Solution Suite Server for $59.99, license allows...

Words: 833 - Pages: 4

Premium Essay

Gender Disparities In Crime Victimization Research

...and acquaintances are more likely to victimize women (Madriz).” Fourth, “these stereotypical images reinforces the “horror story syndrome” by representing images of women being tortured, mutilated, or raped as if they were commonplace, when the reality is that (in statistical terms) these are rare occurrences.” Another explanation of why fear of crime is exceptionally high in women is seen in the research performed by, William Smith, Marie Torstensson and Kerstin Johansson. The researchers discuss previous research of Sparks (1982) who concludes that “women may be more ‘ecologically vulnerable’ than men in that women perceive more risk in their own living areas and also are more fearful in response to specific contexts than are men.” Vulnerablity is defined in another study, ‘Doing Gender’ in Fear of Crime: The Impact of Gender Identity on Reportd Levels of Fear of Crime in Adolescents and Young Adults, by Deiderik Cops and Stefaan Pleysier, as “the perception of exposure to danger, a loss of control over the situation and a perceived inadequate capacity to resists the direct and indirect consequences of victimization.” Women may not only be more fearful than men, but also perceive more danger than men. Warr’s (1984) research, for example found an interaction effect of gender and risk: women are more sensitive to perceived risk than men, such that equal doses of risk result in greater fear among women than men. The tendency among women to perceive risk, as well as their sensitivity...

Words: 1614 - Pages: 7

Premium Essay

Fossil Fuels

...Fossil Fuel Dependency and Americans Deanna C. Rodeo SOC 120 September 30, 2012 Nada Feldman When the first Industrial Revolution came about in the late18th century, it started in the United Kingdom, and then spread through Europe, North America, and eventually everywhere. Nobody could have known the unseen consequences that the new found technology would use. The Industrial Revolution allowed us to change the way manufacturing, agriculture, mining, transportation and technology were all handled. When the replacement of organic fuels (that were based on wood), changed to the use of fossil fuels (based on coal) during the second Industrial Revolution, no one could have known the devastating effects it would have later. What they did not know was that with the continual use of fossil fuels we would endanger nature, the wildlife that lives in it, and our environment that we live in as well. They also failed to think that we would ever run out and now that our society is built around the use of fossil fuels, we need to come together to devise a plan that will keep our engines running, and the lights on for our children and our grandchildren. Fossil fuels are a non-renewable resource that can take millions of years to form, and the reserves are being used faster than new ones are having time to formulate. Fossil fuels that we mainly rely on would include; coal, natural gas, and most importantly, petroleum. With that said, this paper is going to talk about how our society...

Words: 2028 - Pages: 9

Premium Essay

Fossil Fuel Dependency & Americans

...Fossil Fuel Dependency and Americans SOC 120 The first Industrial Revolution began in the late 18th century; it began in the United Kingdom, and eventually spread through Europe and into the United States. It was never imagined that it could cause issues. The Industrial Revolution gave us the ability to change agriculture, manufacturing, transportation, technology, mining and how they were taken care of. When we replaced organic fuels, to the use of fossil fuels in the second Industrial Revolution, no one could have ever guessed the effects it would have on us in the future. What was left unknown was that the continual use of fossil fuels would cause danger to nature, wildlife, and the environment that we live in. What was also not thought about was what happens if we run out of these fuels? At this time a plan should be advised that will keep our engines going and other power working for our future. A little information about fossil fuels is that they are a non-renewable resource that can take millions of years to form. Currently what is happening is the assets are being used faster than expected and we are unable to produce new fuel fast enough. The fossil fuels that we depend on the most include; coal, natural gas, and petroleum. Throughout this paper we are going to discuss how our society would benefit from moving away from fossil fuels into cleaner resource energies which are beneficial to our earth, and our being. “Our food industry is a major factor into the usage...

Words: 1937 - Pages: 8

Free Essay

Marmashastra

...MARMA SHASTRA AYURVEDA BIOENERGETICS MARMA SHASTRA Ayurveda Bio-Energetics Written and Compiled by Michael James Hamilton, LAC Copyright © 2007; Michael James Hamilton, LAC 2nd Edition Copyright © 2011 All rights reserved. Reproduction of any kind without prior written permission of the compiler is prohibited. MARMASHASTRA ©2011 by Michael Hamilton, LAC. www.lotusspace.com ACKNOWLEDGEMENTS I give gratitude to Dr. Suhas Kshirsagar and Dr. Thomas Yarema for their teachings; to my mother for her guidance; my readers for the hope to expand this knowledge; the ultimate reality for always being there even when I do not always realize it. dew rise clouds fall rain wash pain all MAHALO i MARMASHASTRA ©2011 by Michael Hamilton, LAC. www.lotusspace.com This work presents the human bio-energy model (anthropocosm: cosmic human being) as profoundly observed in Ayurvedic medicine. According to ancient Vedic texts (and later through Tantric and Taoist traditions), the energetic, or subtle, body is the foundation of the food, or coarse body, and the bridge between the physical and causal realms. Therefore, the structure of the subtle energetic body provides an intended means for human spiritual development, or evolution (which enables humanity to fulfill its purpose as a conduit between heaven and earth, hence transforming into an entity more subtle, and original). The text’s primary purpose is to present oriental bio-energetic theory, and second, to bridge...

Words: 33500 - Pages: 134

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212