Preview

just random

Satisfactory Essays
Open Document
Open Document
295 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
just random
Department of Accounting & Information Systems

Course Code: MIST304 Semester: Spring First Semester 2013/14
Start Date: 23rd April, 2014 Submission: 26th May 2014
Course Instructor:
Assessment Instrument (specify): Group Project
This instrument assesses the following Course Learning Outcomes (CLO):
CLOs: Maximum 20 Marks. This constitutes 20 % of the total course grade
Course Learning Outcomes (CLO)
Question # covered in Assessment*
Student score
4. Work effectively in teams..

Team Project
Designing a Corporate Network: Company XYZ has over 400 employees in four different offices across the globe. The company has branches in Paris, Tokyo, and New York and its headquarters are in Los Angeles. Design a network that connects the four offices of XYZ by wide area links. The company has users in three different departments, each of which has different security and resource requirements. However, each of the physical offices has some users from each department. The financial department maintains personal and financial information that only authorized financial department employees may access. Other users should not be able to access this information. The human resources (HR) department maintains records of the employees in the company. Each employee should be able to view his or her personal information but not the information of any other employee. Those who work in the HR department should be able to access the relevant employee data necessary for them to do their job. The marketing department maintains a database of products and marketing campaign information. All employees of the company should have access to this information, but no one outside of the company should have this right. Submit a written report that includes responses to the following questions: •What type of network

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. Medium-sized business of 500 employees that uses subnets to divide its departments, but some of subnets must be able to communicate with each other…

    • 256 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Company A is an organization with a moderate amount of employees that occupies three locations within one city. The three locations are connected via fast network connections and the IT/IS Administration is centralized with the helpdesk. Employees have the ability to utilize computers and printers within their department, but are not allowed to use these devices located in other departments. In addition, HR information is restricted to that department as well as the executive offices, which have access to all locations and data.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    GD Random

    • 16907 Words
    • 24 Pages

    Harold "Noonie G" Ward is one man who can intimately relate with the violence at both the…

    • 16907 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    One security options that can be used is the Privacy or confidentiality. Using this will help keep information confidently from others or outsiders unless you are authorized. This will keep employees from finding things such as SSN (social security numbers), personal home address, and/or documents that may be considered sensitive. Having this as a security option is an all-around good idea. I would implement this on all of the networks/domains that I would manage.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords provide a level of authentication for employees and is what allows these employees to gain access to a company computer or the ability to log in to a company server or other resource. Each employee should be given a unique username that is different from every other employee, and each employee should create a complex password that is associated with their username. The employee should never give out their password to…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    random

    • 871 Words
    • 3 Pages

    Hitler and Franco had some stuff in common. They were both supported by anti-communist groups. And both wanted a simple thing like unity. They wanted to bring justice to there countries. And they both had something to do with Britain like Hitler wanted a war against them and Franco feared them. And they were allies.…

    • 871 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of procedures that apply equally to all employees. The company goal is to provide a fair workplace for everyone, while at the same time protect the organizations professional reputation. The privacy policies are all in compliance with state, federal, and international laws.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Random

    • 481 Words
    • 2 Pages

    DEFINE LOYALTY: (DEFINE: Bear true faith and allegiance to the US constitution: to “bear true faith and allegiance to the United States constitution, the Army, and other soldiers” - (HQDA - FM 22-100, 1999) is a particularly difficult Army value for corporate America to fully embrace because it requires a primary allegiance to a group other than corporations’ acknowledged focus ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The loyalty of your people is a gift they give you when, and only when, you deserve it—when you train them well, treat them fairly, and live by the concepts you talk about. Remember Soldiers fight for each other—loyalty is that commitment. Loyalty extends to all members of all components of the Army. Both the reserve component—Army National Guard and Army Reserve—and Army civilians all play an increasingly active role in the Army’s mission.  Loyalty – to “bear true faith and allegiance to the United States constitution, the Army, and other soldiers” - (HQDA - FM 22-100, 1999) is a particularly difficult Army value for corporate America to fully embrace because it requires a primary allegiance to a group other than corporations’ acknowledged focus: the stockholder, employee, and the corporation. Conventional contracting experience attests that, with few exceptions, financial decisions ultimately force the contractor to choose corporate allegiance over loyalty to the Army. Another factor that impacts the loyalty of a contractor to the government is the length of the contractual relationship. Unlike the long-term relationships enjoyed by defense materiel contractors, Sustaining Base contractors provide common services that are competed regularly, resulting in shorter-term relationships. Knowing this, service contractors are less likely to invest resources to demonstrate their loyalties. The coexistence of conflicting loyalties is divisive to the Army and readily apparent to the soldiers and families that are supported.…

    • 481 Words
    • 2 Pages
    Good Essays