This website uses cookies to ensure you have the best experience. Learn more

Unit 1 Assignment 1 Is3110

361 words - 2 pages

For YieldMore Executives,
We here in your IT department have recently audited our infrastructure for our company’s network. Upon the review we did find several threats and vulnerabilities. First off is the fact we do not have a backup system in place for any natural disaster to our headquarters. This is an exploit found in the systems and application domain that can cripple our whole company. A second system found in one of the production center could be able to be installed in case of said ...view middle of the document...

This area is on the remote access domain and needs to be looked at on a constant basis.
The third issue would be in the user domain. Any terminated or disgruntled employee can load issues to our system and need to be expelled from our system as soon as they are gone from the company.
A fourth issue would be password safety. We must assume that passwords are not secure since most of our labor is found outside of our three building units. A policy to have the user change his or her password on a frequent basis will in fact keep this risk down but it is not full proof. This is another issue with the user domain that needs attention on a regular basis.
Lastly and a major issue is the lack of a firewall in our production centers. They are subject to any attack from an external source. This is a risk toward our system and application domain and needs to address ASAP. Adding firewalls to a building should be examined and thought of since we are going to have at least one backup located in the centers as stated in previous risk areas stated above.

Other Papers Like Unit 1 Assignment 1 Is3110

Business Unit 2 Assignment 1

4430 words - 18 pages Recruiting and retaining the right people Edexcel BTEC L3 Business Studies Unit 2 Business Resources I have gained an internship at my school, and I will spend 6 weeks supporting the human resources department. Currently the most experienced member of the human resources department, is away on long term sick leave. The school is looking to make sure I can help maintain its ability to recruit the right staff and control their financial and non

Unit 2. Assignment 1. Dhcp Troubleshooting

287 words - 2 pages Unit 2. Assignment 1. DHCP Troubleshooting Dear Junior Admin: My first question would be what have you done to this point about the issue? What OS are the computers running that have not picked up the new DHCP scope? Start by checking the DHCP setting and configurations are they all correctly configured? Try renewing the IP addresses on the workstations that have not picked up the scope it maybe do to the IP lease agreement. The

Unit 3. Assignment 1. Network Topology Paper

396 words - 2 pages Unit 3. Assignment 1. Network Topology Paper Hierarchical layout defines how the network topology is structured physically and logically. In physical topology all devices and components are placed in various locations depending on the layout. Logical topology is the flow of data throughout the layout. There are many variations of network topologies that can be implemented. The most common network topologies are star, bus, and ring. Star

Unit 1

804 words - 4 pages Focus Paper – Unit 1 Assessing My Personal Leadership Readiness GB600-04N Leadership Strategies for a Changing World September 2015 Professor Dr. James Wood Assessing My Personal Leadership Readiness Introduction When I hear the word "leadership", the first thing that come to mind are the mighty men and women who have held or hold several grand titles and positions such an Executive or CEO of a company, a business owner, The

Week 1 Assignment 1

1019 words - 5 pages Week 1 Assignment 1 Michael Conley ITT Technical Institute Abstract This paper will be identifying, analyzing, and explaining five likely threat/vulnerabilities for the scenario given. I will go into detail on what you should do to lower the risk or vulnerability. The last thing I will talk about in this paper is what you should do to try and make it better and more secure

Pt2520 Unit 5 Assignment 1,Unit 5 Research Paper 1 And Quiz 4

1792 words - 8 pages Lab 5.1 Unit 5 Assignment 1 1) Choosing a database management system requires a great deal of analysis. TRUE 2) When choosing a database management system, you should consider system compatibility and hardware requirements. TRUE 3) Only insert and update statements are part of a database transaction. FALSE 4) Physical design is independent of any particular database management system. FALSE 5) A data type is a column specification that

Unit 2 Assignment 1: Strengths And Challenges Reflection Letter

285 words - 2 pages Unit 2 Assignment 1: Strengths and Challenges Reflection Letter Course Objectives and learning Outcomes • Define terms and concepts related to strategies for technical professionals. • Communicate information using Microsoft Office productivity tools and email. Assignment Requirements This assignment coordinates with Unit 2 Lab 1: Introductory Word Lab. Create and send a letter to your instructor executed in MS Word that discusses

Unit 1 Reasearch

306 words - 2 pages Unit 1 Research 1 1. SQL was initially developed at IBM by Donald D. Chamberlin and Raymond F. Boyce in the early 1970s. This initial version was called SEQUEL which stands for Structured English Query Language, was designed to manipulate and retrieve data stored in System R which was a database management system, developed in the 1970’s by IBM. Eventually SEQUEL was changed to SQL because, SEQUEL was a trademark of the Hawker-Siddeley

Nt1430 Unit 1

579 words - 3 pages Stacie Rollins Wednesday, December 17, 2014 (Nt 1430.U1.GA1) Week 1 Unit 1 Chapter Exercises Chapter 1: 1. What is Free Software? List 3 Characteristics. The code is available free of cost- no charge for the software, source, documentation, or support. 3 Characteristics would be that you are free to study it, redistribute it, and modify it. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux

Unit 1 P1

328 words - 2 pages Unit 1 P1 Type of Business: Asda Stores Limited, commonly known as ASDA, is the second largest retail store and a national public limited company. Founded in 1949. Furthermore as Asda is a profitable business it is also in the private sector. Welcare is a local charitable, non-profit organization. They earn no profit out of their work however do accept forms of donations and fundraisers. The charity was set up by a church over 100 years

Gs1140 Unit 1 Research Paper 1

658 words - 3 pages Unit 1 Research Paper 1: Paradigm Shift Introduction In the past, virtual reality technology was thought of by many as a gimmick, and the hope for it to become a mainstream technology was discarded as products did not work as how the public envisioned. However, the proper technology is now available to make virtual reality just that: a reality. The entertainment industry is on the verge of a monumental paradigm shift that will completely

Related Essays

Unit 1 Assignment 1

272 words - 2 pages Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a

Is3230 Unit 1 Assignment 1

642 words - 3 pages ITT TECHNICAL INSITITUTE Access Security / IS3230T Unit 1 Assignment 1.1 Identification, Authentication, and Authorization Techniques. Access Security / IS3230T There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a

Nt1210 T Unit 1 Assignment 1

352 words - 2 pages Chapter Review Activities for Chapter 1 1. C. Represents one Binary digit. 2. D. Kilobyte. 3. C. 64 bits per quadruple word. 4. A. Used for short-term memory E. Is installed onto the motherboard. 5. A. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. C. Character Set. 7. D. The Binary equivalent of Decimal 123456789. 8. A. An actuator arm. 9. B. Provides a convenient way to name a set

Unit 3 Assignment 1

731 words - 3 pages Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with