Preview

Metrionic System Case Study Solution

Powerful Essays
Open Document
Open Document
1471 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Metrionic System Case Study Solution
A. Introduction and Summary
Karl Henderson is a senior manager at Metrionic Systems. Henderson has won numerous awards for his outstanding performance and has a very respected reputation. Henderson has been put in charge of a project to develop an advanced network-security device. There has recently been an outbreak of security breaches which is resulting in high demand for a more advanced security system. If a more advanced system is not created successfully there will be many things at stake. These things include businesses that are hacked because the security is not advanced enough, the owners of those companies, and the jobs of the team members that were supposed to create a high-quality device. To be able to create an advanced network-security
…show more content…
A solution to the problem is for Henderson to send out a mass email saying there will be a conference call. He should let his team members know that the call will be happening at 5:00am his time. He should wait for responses from all of his teammates saying which day would work best for them. Although some people might have to be on the conference call at early in the morning or late at night, it is only once a week for five months so they should be able to make it work. No one has to be on the phone earlier than 5:00am or later than 10:00pm. While this might sometimes be inconvenient for some members, the conference calls will allow everyone to stay updated on the devices’ progress, give any input, or ask any questions to the whole group. The conference call with everyone would eliminate any confusion the team members have and ensure the device is made on time with suitable quality. This will allow Henderson to efficiently communicate with the …show more content…
The last possible solution would be for Henderson to send out a mass email to everyone stating what the job of each member of the team will be. This will help the other members of the team to know the role of each person, so they will know who to go to if there they have a question about a specific topic. Mass emails sometimes cause confusion because there are so many emails coming from different people, but mass emailing helps to keep all members of the group informed the progress of the device while also making them aware of the struggles others are having. The mass email will make it so that no one has to be on a conference call at an odd time in the day, making it easier on some team

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Week 1 Assignment

    • 598 Words
    • 3 Pages

    Time being of essence here this mode of communication would be the best and fastest. It will be easier to get feedback as well as keep track of all the meetings.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Satisfactory Essays

    Mgt 521 Week 1

    • 457 Words
    • 2 Pages

    To communicate the information effectively from the Vice President of Communications to the team, an appropriate channel would be a face-to-face conversation. The client is new to the company and in a meeting the team will be able to discuss the parameters, deadlines, and the client. The meeting ensures the team is aware of the client’s criteria. “Face to face conversation scores the highest in channel richness because it transmits the most information” (Robbins & Judge, 2011). The appropriate channel to communicate back to the vice president can be an electronic email. The e-mail can use bullet points to sum up the team meeting, direction and goals. The vice president will be able to send check in emails at different points during the follow-up on the strategy. “E-mail messages can be quickly written, edited and stored” (Robbins & Judge, 2011). Due to a one week timeline, time spent arranging a face to face meeting would take precious time out of the short deadline.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Manufacturing performs an information systems security analysis over its physical and network security. Several elements of the IT system require revisions, such as restrictions to physical access to vital IT systems and upgrades to outdated systems within the network.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case in Point

    • 397 Words
    • 2 Pages

    The team agreed to make contact via team meetings, text and/or email on Sunday afternoon. Also agreed to have the parts assigned to each team member for Team “D” Forum no later than Monday.…

    • 397 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Promote people’s expectations with authentic concern Engage suggestions from the team Don 'ts • Create Separations of individuals  Try forcing people to change  Conceal unwarranted information about changes  Promise what you can’t achieve • Estimated resources requirements • Time table for new completed schedule • Identify what risk or changes maybe needed (Bourque, 2000) Incorporating Teams into Daily Healthcare Communication Schedule…

    • 416 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays