Preview

IT205 Week 4 Assignment

Good Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT205 Week 4 Assignment
Assignment: Information Use Paper
Student: Josey Wayne Hudson
Class: IT/205
Professor: Li Lo

The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.

I work for the government in IT, as a Part Timer. Every morning getting in my building I use My CAT card to enter the building, then I start my day. My occupation is information system, I will begin off with information system, and my obligations are figure out what the association needs in a system and PC framework before it is situated up. Additionally introduce all system equipment and programming that need overhaul and repairs before the each one comes in. additionally I keep up the system and PC framework security and guarantee that all framework is working accurately. I gather information keeping in mind the end goal to assess the system or framework execution and help improve the framework work and speedier. I set and add clients to a system and allocate and overhaul security authorizations on the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Agreed Ways of Working

    • 355 Words
    • 2 Pages

    You have a duty to keep service users safe by following policies, procedures and working within your job role. Just think of the chaos and danger if you all worked just as you liked! Each job title entails particular duties and responsibilities. Within each position there are routine tasks and activities and expectations.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    it 345 study guide final

    • 1027 Words
    • 5 Pages

    A linear barcode encodes data on the x axis (bottom) so it doesn’t matter where on the y axis the bar code is scanned, the data will always be the same…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    1. Active directory is controlled from an Active Directory server. The server is accessed by an administrator and then the changes that are made on the AD infrastructure is replicated to all workstations and users that login. AD exists in one location and replicated or issues out the permissions, rules, and roles out to the objects it is managing.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    BTEC ICT Unit 2 P1

    • 944 Words
    • 4 Pages

    A processor is also known as a CPU which stands for central processing unit, is how a computer/laptop functions and this is like the brain of the computer the better the processor is, the faster a computer works…

    • 944 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    1.7 Store and retrieve presentation files effectively, in line with local guidelines and conventions where available…

    • 1708 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Ict Unit 4 P1

    • 367 Words
    • 2 Pages

    External environmental factors contribute to the need for change. Some of these factors are legislative and some are financial…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition.…

    • 3587 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    For each source, write an evaluation (150 words maximum) of its relationship to your chosen theme.…

    • 808 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Retele de Calculatoare

    • 1246 Words
    • 5 Pages

    Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network resources from hackers. It is a problem because of unauthorized use and can be resolved by increasing the security encryption levels.…

    • 1246 Words
    • 5 Pages
    Good Essays