Preview

Cis 207 Information Use Paper

Good Essays
Open Document
Open Document
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 207 Information Use Paper
Information Use
CIS/207

In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven. My current occupation is based completely around technology and it’s use and innovation. The company
…show more content…
There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc. As with everything computer related, there are times when the information systems have issues or fail. One of the reasons that we have two call centers is to have our call center serve as a backup for the main location. There are times when the main call center’s network goes down due to server issues while our area is still operable, and there are other times when our center goes down and they are still in operation. Unfortunately, at times there are still issues that shut down both locations simultaneously. With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords

You May Also Find These Documents Helpful

  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    * Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 166 Words
    • 1 Page

    Remote access can be made available to senior management and executives to help them access their work when not in the office. This can be done via VPN. VPNs can allow users needing remote access to securely access IT resources without being physically connected to the network. It is secured with encryption by tunneling through an internet connection. All that is needed is VPN software, appropriate protocols (i.e. IPSec), and encryption.…

    • 166 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Individual sales personnel connect to the system using a VPN which is great however they have to connect using their own individual internet connection typically in a home office. This puts them and the company at risk because again anyone could breach this internet connection. There needs to be multiple layers of security and firewalls protecting the information.…

    • 388 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 1 BIS221

    • 536 Words
    • 3 Pages

    At our company all of our computers can connect wireless to our database, also we can connect our phones to our wireless network in order to have faster access to the internet.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In society today it has become increasingly necessary to effectively use technologically advanced Information systems and software applications to run an organization. In our technologically advanced and dynamic society, organizations are being pushed to use and operate updated and advanced information systems and software applications to store information, process data and effectively manage day to day operations. In this paper the subject discussed will be how a CIS (computer information systems) can help an organization, what they are, and an example of a CIS and its uses in a retail environment.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Cis 207 Information

    • 889 Words
    • 4 Pages

    There are numerous types of information that are used in daily life. We see information all the time, in different formats and configurations. In today’s society, information rules everything that we do. Information can be in a form of simple text message, to a complicated computer language in which information technology engineers use to write different software for different functions. Different companies use information in different ways, depending on the type of business they are in. Some companies might use an internal email, which is set up for office use only between each employee. Information flows in and through my company in many ways. The company that I work for is a reprographics company called Cyber Copy. Our company deals with large black and white to color format printing, to small black and white to color format printing. Information flows in and out of my company during all working hours. With that being said, everything runs on information in order to function in a fast paste society.…

    • 889 Words
    • 4 Pages
    Good Essays