Preview

Global Finance

Good Essays
Open Document
Open Document
3344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Global Finance
Global Finance, Inc. is an international organization with expansions in many states. In every state, the company has a number of sites and each site has several workers and customers. Offices are interconnected to each other and to the host organization. As an international organization, Global Finance, Inc. requires a robust network that can support its daily operations, a secure network system and efficient network management strategies. Normally, network choices rely on the company budget, network coverage, and internal and external regulations. Effective network security requires constant upgrades and close monitoring to ensure possible loopholes are sealed in time.
Executive Summery Global Finance, Inc. network is constructed by sets of routers and switches. The network switches and routers are designed with unique typologies including different sizes of meshes. The network adopted packet switching and circuit technologies. Packet switches are effective transfer paths and sharing carriers. The network system allows sharing with clients and other management teams. There are also virtual circuits connected to the main path to serve various needs. Additionally, the network has circuit system, which facilitates data transfer only when needed. Global Finance, Inc. has employed Integrated Services Digital Network (ISDN), which only transfer data when initiated (Acharya, Lasse, Thomas & Matthew, 2011). Apart from Wide Area Network (WAN) and Local Area Network (LAN) connections, Global Finance, Inc. has utilized other forms of connections such as different internet ISPs, private networks and telephone connections. The design has also incorporated Virtual Private Network (VPN) for in public switched networks (PSTN) to enhance information privacy and security. Global Finance, Inc. developed an encrypted network system as a security measure against its data (Dana & Arkin, 2010). The expansion of Global Finance, Inc. has created openings for new threats, risks and



References: Acharya, V., Lasse H., Thomas P., & Matthew R. (2011). Measuring Systemic Risk, Working paper. New York: New York University. Lelyveld, I., & Liedorp, F. (2006). Interbank contagion in the Dutch banking sector: a sensitivity analysis. International Journal of Central Banking 2, 99–133. Dana P., & Arkin, W. (2010). "A hidden world, growing beyond control". The Washington Post

You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    International Finance

    • 5228 Words
    • 21 Pages

    1. Suppose that the Brazilian real depreciates by 40% against the U.S. dollar. By how much will the dollar appreciate against the real?…

    • 5228 Words
    • 21 Pages
    Good Essays
  • Good Essays

    Fnce 601 Study Notes

    • 501 Words
    • 3 Pages

    • Isolation of the organization's private network from the Internet by using a firewall and proxy server.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    International Finance

    • 1854 Words
    • 8 Pages

    a. The dollar is presently weak and is expected to strengthen over time. These expectations affect the tendency of U.S investors to invest in foreign securities because the value of U.S dollar decrease will lead to the U.S company get less profit and earn less money. Consequently, U.S companies will pay fewer dividends for investors who invest in these companies. So, investors will tend to invest in foreign securities where they can get higher dividend. On the other hand, a weak currency can reduce unemployment but maybe it can lead to high inflation, and simultaneously it may reduce U.S imports and boost U.S exports or buy more goods than it sells abroad (imports exceed exports). Another thing, in the long run, trade deficits may be expected to contribute to a weaker dollar, as the economy adjusts to create the surpluses needed to repay foreign investors. However, in the short run, the relationship between the trade deficit and the dollar is weak, and the value of the dollar is determined largely by investor preferences for U.S. dollar assets.…

    • 1854 Words
    • 8 Pages
    Good Essays
  • Best Essays

    Linsz, D. M. (2010) Basel Committee on Banking Supervision, Consultative Document “Strengthening the Resilient of Banking Sector”. [Online]. Available at: http://www.bis.org/publ/bcbs165/boac.pdf (Accessed: 28 December 2011)…

    • 2937 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    6. Gerdrup, K.R. (2005) Norges Bank’s role in the event of liquidity crises in the financial sector. Economic Bulletin…

    • 2155 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    International Finance

    • 861 Words
    • 4 Pages

    The above currencies are showed in the indirect quotations reflects the average rates of exchange rate. The Bangladeshi taka and Australian dollar are here showed against the US dollar to measure the currency appreciation or depreciation of USD against the foreign currency.…

    • 861 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Businesses now need to connect and stay connected to partners and prospective partners to achieve the desired effects that will make all their transactions successful. LAN, (Local Area Networks), VPN (virtual private networks) and of course the new trending wireless networks are some of the principle ways that businesses are communicating with their customers, vendors and partners. The security problems with the internet (LAN, VPN and wireless) with regards to viruses, spyware, malware, and worms are a significant problem for employers, business owners and individuals. There have been attacks on networks all over the world and this had and will continue to impact businesses everywhere. Employers and employees need to know how to implement safety measures against these attacks.…

    • 6123 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    technology. Then, the practice of network security is explored via practical applications that have been…

    • 33887 Words
    • 216 Pages
    Powerful Essays
  • Good Essays

    International Finance

    • 1067 Words
    • 4 Pages

    ii. The higher the inflation in United States will lead to a higher price of U.S. products. Therefore, U.S. consumers will buy more Canadian goods. The demand for Canadian dollars will appreciate and increase in U.S. because U.S. inflation rate become high. The supply of Canadian dollars for sale should decrease, because the values of Canadian dollars increase and nobody want to sell it. The equilibrium value of Canadian dollars will appreciation because the demand is increases. The reason of demand increase is the rate of U.S. inflation becomes high relative to inflation of Canadian.…

    • 1067 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Dcn Notes

    • 2702 Words
    • 11 Pages

    IntroductionThe term “computer network’’ means a collection of autonomous computers interconnected by a single technology. Two computers are said to be interconnected if they are able to exchange information. The connection need not be via a copper wire; fiber optics, microwaves, infrared, and communication satellites can also be used. Networks come in many sizes, shapes and forms. Uses of Computer Networks 1. Business Applications 2. Home Applications 3. Mobile Users 4. Social Issues Example NetworksThere are different kinds of networks, large and small, well known and less well known. They have different goals, scales, and technologies.The InternetThe Internet is not a network at all, but a vast collection of different networks that use certain common protocols and provide certain common services.The ARPANETThe story begins in the late 1950s. At the height of the Cold War, the DoD wanted a command-and-control network that could survive a nuclear war. At that time, all military communications used the public telephone network, which was considered vulnerable. NSFNETBy the late 1970s, NSF (the U.S. National Science Foundation) saw the enormous impact the ARPANET was having on university research, allowing scientists across the country to share data and collaborate on research projects. However, to get on the ARPANET, a university had to have a research contract with the DoD, which many did not have.Internet UsageTraditionally (meaning 1970 to about 1990), the Internet and its predecessors had four main applications: 1. E-mail. 2. News. 3. Remote login. 4. File transfer.…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Network Threats

    • 924 Words
    • 4 Pages

    The main objective of the research paper is to illustrate most common network threats and provide solution to protect users from threats, hackers and ensures that the data travelling across the networks is safe.…

    • 924 Words
    • 4 Pages
    Good Essays