...Week 1 Assignment 1 Michael Conley ITT Technical Institute Abstract This paper will be identifying, analyzing, and explaining five likely threat/vulnerabilities for the scenario given. I will go into detail on what you should do to lower the risk or vulnerability. The last thing I will talk about in this paper is what you should do to try and make it better and more secure. There are definitely some potential risks and vulnerabilities with the given scenario. The first one to point out would be that they are using Windows Vista. Another issue is the VPN connection with the laptops. Issue number three would be the servers. The fourth problem I foresee is back up. The final problem I see in the network is with the ISP. This is not a very old and outdated OS, since Microsoft is still supporting it, but there are more vulnerabilities with using Vista as opposed to Windows 7. Windows 7 is also more versatile, it is able to be run on more than just desktops unlike Vista. Windows 7 is able to be used on laptops, desktops, and netbooks which Vista cannot be used on all of those. Windows 7 puts all of the security notifications and other system problems in one place unlike Vista where you have to search through the control panel to find things. Windows 7 you just go to the action center. The likelihood of there being a serious security issue with windows Vista is low for right now. Once...
Words: 1019 - Pages: 5
...Associate Level Material Six Dimensions of Health Worksheet Part 1 For each of the following six dimensions of health, list at least one characteristic, activity, belief, or attitude that reflects that dimension in your life. Provide a brief explanation with each example. Refer to Ch. 1 in the text for explanations of these dimensions. Physical health: Exercise at least five days a week. Physical fitness has to be up to par to stay in the military. I usually watch my diet because I am not as young as I use to be. Social health: Right now I really do not have a social life. It might not be healthy but I guess I do it to protect myself. Having to move around a lot does not allow me to build the friendships that I am looking for. Intellectual health: Being in the military sometimes requires critical thinking to complete a mission. Many times it’s accomplishing a mission that you have already done. I usually refer back to those past missions and put together the pieces that I need to accomplish the new one. I take to account failures and successes of my past missions and use it for the current one. I also take in to account other people’s failures and successes. Environmental health: I try to surround myself with people I can learn from. At the beginning of my career I use to hang out with soldiers who were not looking to approve themselves and just got into trouble. Once my son was born, I knew the life had to change. I decided to work on bettering myself...
Words: 609 - Pages: 3
...IS4550 Unit 1 Assignment 1 Internet-use policy for ABC Credit Union Purpose The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service. A signed Acceptable Use Policy must be signed by each faculty and staff. Online Conduct The intent of this policy is to make clear certain uses, which are and are not appropriate. ABC Credit Union will not monitor or judge all the content of information transmitted over this service, but will investigate complaints of possible inappropriate use. ABC Credit Union may at any time make determinations that particular uses are or are not appropriate with or without notice to you, according to the following guidelines. You must respect the privacy of others; for example: you shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others, or represent themselves as another user unless explicitly authorized to do so by that user. You must respect the legal protection provided by copyright and license to programs and data. You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage...
Words: 1035 - Pages: 5
...Library Search Worksheet Use this worksheet to take notes about the articles you find when researching for Week 2 Assignment 1: University Library Search. Fill out each section of the tables for Article 1 and Article 2. You can also save a blank copy of this worksheet and use it to properly cite your sources when you write research papers for your future courses. Article 1: |Career Explored |Neurology Research | |Author | Raboel, P. H.1 peterraboel@hotmail.com | | |Bartek, J.1,2 | | |Andresen, M.1 | | |Bellander, B. M.2 | | |Romner, B.1 | |Year published | 2012 | |Title of article | Intracranial Pressure Monitoring: Invasive versus Non-Invasive Methods-A Review. | |Title of Publication/Journal/ | Critical Care Research &...
Words: 265 - Pages: 2
...What were the suggested next steps in your MyFoundationsLab Learning Path? According to the MyFoundationsLab Learning Path, the next step for me would be working on fragments. It shows that I have to work on my sentence skills. I also have to work on run-ons. I think that after I complete the MyFoundationsLab Learning Path, I will be a solid writer. Hopefully I can complete it with no problems at all. How do the skills apply to your academic life? I think that these skills will apply to my academic life because it will make me a better writer. In order to receive a good grade on my papers, I will have to write them correctly without any mistakes. These skills will also help my academic life because it will sharpen my professional writing skills and it will give me a structure on how to write a professional paper. How do the skills apply to your professional life? These skills will apply to my professional life in a lot of ways. Lets say I get a good job where I have to send letters to high-end businesses, then I have to write a professional sounding letter and not something a 15year old wrote. In any desk job you get most of the time they require some type of writing, so you have to sound as professional as you can be. Where you surprised by the results? Why or why not? To be honest I wasn’t really surprised because in my opinion I always thought I was decent writer. Yea there some areas I need improvement in, but I’m pretty sure that with time and practice...
Words: 304 - Pages: 2
...Name: Kelsey Dionne Chapter 1 Instructions Practice Problem 12, 15, 21, & 22 Due Week 1 Day 6 (Sunday) Follow the instructions below to submit your answers for Chapter 1 Practice Problem 12, 15, 21, & 22. 1. Save Chapter 1 Instructions to your computer. 2. Type your answers into the shaded boxes below. The boxes will expand as you type your answers. 3. Each shaded box is worth 1 point unless otherwise noted; thus, 28 points total for Chapter 1. 4. Resave this form to your computer with your answers filled-in. 5. Upload the saved form to the Assignment Files tab. Read each question in your text book and then type your answers for Chapter 1 Practice Problem 12, 15, 21, & 22 in the corresponding spaces below. 12a. equal-interval – a variable in which the numbers stand for approximately equal amounts of what is being measured. No matter if stress is being measured or if anger is being measured, numbers 1 and 2 are equal to 4 and 5. 12b. rank-order – A numeric variable in which the values are ranks, for example: class or place finished in a race. 1st, 2nd, or 3rd. 12c. nominal – A variable with values that are categories, also called the categorical varible. An example of a nominal variable would be variables like gender, or race. 12d. ratio scale – An equal-interval variable is measured on a ratio scale if it has an absolute zero point. Some scales start at the lowest number, other scales start at zero. 12e. ...
Words: 611 - Pages: 3
...Week 1 Assignment 1 My firm is a security service provider that started with only 4 employees in 2002 that services mostly state and federal agencies of various sizes. The firm’s annual gross sales are currently at 1.6 million U.S. dollars. When our firm first started, we focused on database performance tuning and security services for database applications. 4 years later, our firm improved to provide complete security services such as, penetration testing, policy creation, regulatory compliance assistance and assessments. Currently our firm looks to operate in a more secure manner by addressing security related issues of government and mid-sized organizations. We currently have our headquarters and only office in a different state from the RFP state. We are now up to 22 full-time employees. 8 Employees that will be working on the new prospective products and services are certified professionals. 5 have a CISSP certifications, 4 hold a CISM certification, 4 hold a GIAC and GSEC certifications and 6 hold other GIAC certifications. We have won four major contracts in the last four years for vulnerability assessments and penetration tests. We do not offer source code review to assess security and do not employ development security specialists. Positive Gaps: • Been in business for 5 consecutive years • Reported annual gross sales of more than one million dollars • Presented 4 references in last four years similar to requirements of this document. ...
Words: 290 - Pages: 2
...------------------------------------------------- IS404: Week 1 Assignment 1: Identification, Authentication, and Authorization Techniques At the Acme Distribution Center, your colleagues are the following employees: * Robert, the lead warehouse receiver * Jennifer, sales and accounts payable * Bradley, the warehouse general manager * LuEllen, the shipper * Buster, the shipper * Lloyd, the purchasing agent * Spare, for temporary help Using the following legend, provide the users with the appropriate rights and permissions: A = Assigned to the user F = Needed for primary function T = Temporary N = Never BP = By Position Assigned RO = Read Only Segregation of Duties Matrix | | (System User–Rights and Permissions) | Department | Jennifer | Buster | Bradley | Lloyd | LuEllen | Robert | Spare | Sam | Receiving | RO | RO | F | RO | RO | F | T | A | Shipping | A | F,BP | F | RO | F,BP | RO | T | A, BP | Sales | F | RO | RO | F | RO | RO | RO | A, BP | Accounts Payable | BP | N | N | RO | N | N | N | A, BP | After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions: * What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed? Jennifer’s access account was setup as assigned to the user for all departments which was incompatible because this was not the correct access she needed for...
Words: 369 - Pages: 2
...Myplace: The plalce for Diversity Antonio Sigala COMM/315 Mr. Brian Lempke Diversity is generally defined as acknowledging, understanding, accepting, valuing, and celebrating differences among people with respect to age, class, ethnicity, gender, physical and mental ability, race, sexual orientation, spiritual practice, and public assistance status (Esty, et al., 1995). There are the obvious characteristics such as gender, race, religious beliefs, social class, etc.; and of course there are those characteristics that are not so obvious such as mental ability, religious beliefs, physical ability among others. It is tough to decipher those hidden qualities on an individual without knowing much about that person. For my first example I have chosen Jenna, this was very tough for me as I let my personal bias get in the way of a rational choice when I came across the decision to match a picture to the description. I was wrong! Her Drive is eminent; her commitment to succeed is unprecedented. She was able to survive drug dependency (demonstrates drive and the will to succeed) and established herself as she once had after she graduated college. Mental toughness was very important as she went through hard times after losing her mother, these hidden characteristics cannot be detected by the naked eye and most of us base our judgment on our own personal bias and stereotypes. Kim was my second choice, She too has the drive to succeed, and she was the first one of her family...
Words: 993 - Pages: 4
...ld Family Bank Case Analysis Problems: Macro: 1) Lack of loyalty to the bank could affect the effectiveness of the bank. 2) The processes for setting pay rates are poor and needs to be reviewed. Micro: 1) The computer services department, although all employees work well together and have a strong team, are not loyal to the bank. 2) The computer services department feels that they are unappreciated by management. 3) The computer services department may be underpaid compared to employees with the same job skill at different companies. 4) The working conditions for check sorting employees is undesirable. Causes: 1) Compensation may not have been properly addressed with computer services employees. 2) Managers were not aware of how the computer services department felt about the pay situation and the emphasis on production rather than support units. Systems Affected: 1) Psychosocial: There is no loyalty to the bank from the employees in the computer services department. That affects productiveness as well as employee morale. They do not feel that their work is appreciated. 2) Managerial: Managers were unaware of how the computer department felt until H. Day examined the turnover, absenteeism, and productivity figures. Alternatives: 1) H. Day could do research on the pay rates of employees in similar positions at other companies to make sure that their employees are paid competitively with others. 2) H. Day could call a meeting between the computer services...
Words: 589 - Pages: 3
...The current plain old Telephone Service (POTS) that is currently being used by our company is based under six telephone land line components. The local loop can be any size of copper wire which allows telephones to be connected to one central office and back to this office. The central office is a local exchange which serves multiple customers in one certain location. Central office will support up to 10,000 customers in one three-digit prefix and can have more than one local exchange. Local Exchange Carriers (LEC) are local companies that provide their service in one local area and can serve multiple offices based on the population of that certain location. Point of Presence (POP) is described as long distance carrier who can meet up with another carrier to provide long distance telephone service to multiple locations. Long distance systems are multiple companies providing service within a certain local access and transport area. These connect through LECs to provide the long distance service. Fixed-Line Telephone systems are the oldest technology. Fixed-Line is telephones in which are connected through one singe line in an office. These are usually connected through a central office or a single exchange to provide the Fixed-Line Telephone service to its customer. There are also four Telecommunications Network Components that are great technologies that can be used. Cellular telephones are wireless telephones that can be taken with you anywhere you happen to go. Cellular telephones...
Words: 1255 - Pages: 6
...Motivational: Is a psychological feature that arouses an organism to act towards a desired goal and elicits, controls, and sustains certain goal-directed behaviors. It can be considered a driving force; a psychological one that compels or reinforces an action toward a desired goal. For example, hunger is a motivation that elicits a desire to eat. Motivation is the purpose or psychological cause of an action. Cognitive: Social cognition came to prominence with the rise of cognitive psychology in the late 1960s and early 1970s and is now the dominant model and approach in mainstream social psychology. Common to social cognition theories is the idea that information is represented in the brain as "cognitive elements" such as schemas, attributions, or stereotypes. A focus on how these cognitive elements are processed is often employed. Social cognition therefore applies and extends many themes, theories and paradigms from cognitive psychology, for example in reasoning(representativeness heuristic, base rate fallacy and confirmation bias), attention (automaticity and priming) and memory (schemas, primacy and recency). It is very likely that social psychology was always a lot more cognitive than mainstream psychology to begin with, as it traditionally discussed internal mental states such as beliefs and desires when mainstream psychology was dominated by behaviorism. Learning: a perspective that states that people learn within a social context. It is facilitated through concepts...
Words: 539 - Pages: 3
...SUMMARY OF A CASE INVOLVING 4TH AMENDMENT RIGHTS At about 6:08am, on October 4, 2009, Trisha Oliver, a resident of Cranston Rhode Island called 911 reporting that her six-year-old son, Marco Nieves, stopped breathing. Emergency authorities took Marco to Hasbro Children's Hospital, where he was found to be in full cardiac arrest. He later died after 11 hours attempt to save his life. At about 6:20am, Sgt. Michael Kite of the Cranston Police Department had arrived at the apartment, where he found Oliver, her boyfriend Michael Patino, and their 14-month-old daughter, Jazlyn Oliver grieving the loss of their loved one. Officer Kite noticed a few odd things about the apartment where Marco suffered his cardiac arrest. Among these things was a cell phone on the kitchen counter, a couple of stripped beds and linens on the floor, a trash can with, dark brown vomit in a toilet, and, crucially, a cell phone on the kitchen counter. Kite picked up the cell phone, and it was at that point—in the just-released opinion of a Rhode Island state court—that police proceeded to mangle a murder case and violate Patino's Fourth Amendment rights by viewing text messages without a warrant. Officer Kite viewed a text message on the phone, which was owned by Trisha Oliver, reading "Wat if I got 2 take him 2 da hospital wat do I say and dos marks on his neck omg." The message was sent from Oliver to Patino, although the sending of the message apparently failed. There were other messages on the phone "with...
Words: 1404 - Pages: 6
...10-K Ford Motor Company Bridgette Hare OMM622: Financial Decision-Making Instructor: John Kuhn July 28, 2014 10-K Ford Motor Company There are many forms and reports that need to be submitted to a range of people; the annual report is for shareholders and investors, tax documents to submit to the IRS, and a form 10-K for the SEC. The Form 10-K is specifically for providing comprehensive details of the company’s business and financial condition based upon audited financial statements that is given in addition to the annual report (Epstein, 2014). Though it is a part of the annual report, it provides four key parts that is used by the SEC to make sure that investors are receiving a legitimate picture of the organization’s business and financial condition (Epstein, 2014). The SEC or Securities and Exchange Commission was established in June 1934 to help investors get adequate information to make sound decision and make strong penalties to minimize the impact of unscrupulous or negligent market participants (Samuel, 2013). The Form 10-K is a formal yearly update that has updated financial statements and comprehensive details (Epstein, 2014). Business Operations, Financial Data, Information about Directors and Executives, and additional Exhibits are the four key parts that are supplied on the Form 10-K. The Business Operations part focuses on the basic business operations that includes new developments, unresolved comments from the SEC, and any key...
Words: 961 - Pages: 4
...RUNNING head: Ethical Decision Reflection 1 Ethical Decision Reflection HSM230 Professor Sharon Johnson –Fox Venita Washington Spears June 21, 2015 RUNNING head: Ethical Decision Reflection 2 The factors that came into play was I had to consider the survival of my clan when we so abruptly lost my father and mother, three weeks apart and a new element in my personal life took presence that was clearly necessary that I had to lead my family out of darkness to the light so to speak. Being the younger of two other siblings the pressure of their loss was mounting rapidly on the decision making factors that were now in place and the turmoil that was visible because of the loss as a family we were going through. The values that lead me in the direction were the morals and principles that I was raised cut and groomed with. Ethics and how one handled a situation was crucial and were also the deciding factors of what would take place next due to the fact I was the youngest of my siblings and trust me they were fighting for position and making it very difficult to say the least. My mother before she died left me with definite instructions which impacted my decision making factors and lead me in the correct direction to do the finalization of her wishes and demands, which made a distinct difference once it was implement and set into motion even from beyond Heavens gates which changed my family’s steamily a future to a new beginning. The outcome was phenomenal and...
Words: 311 - Pages: 2