Preview

Mis589 Wk7 Mini-Cases

Good Essays
Open Document
Open Document
487 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mis589 Wk7 Mini-Cases
MINI-CASES
I. Belmont State Bank
Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment. 1. System and server may have delayed data because of update not in timely. 2. Business continuity can be interrupted by disruptions that are minor and temporary, but some may also result in the destruction of data. 3. Password are too short and seldom changed, it will be a vulnerability of entire system and lack of overload handling mechanism. 4. Messages transmission between all branches must be forwarded by central computer system, under this kind of situation; it is easy to concentrate on a centralized attack by latching and invading the server. Additionally, messages are forwarded by centralized server cost too much bandwidth. Malicious attacks will cause the bandwidth bottlenecks on the server-side and buffer overflow at the same time.

I. Computer Dynamics
Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in

You May Also Find These Documents Helpful

  • Better Essays

    Fin 516 Mini Case

    • 1678 Words
    • 7 Pages

    or fundamental potential for failure that is associated with the ongoing function of any type of business…

    • 1678 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Mis 589 Mini Case Week 4

    • 582 Words
    • 3 Pages

    Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the scenario presented for this assignment, four logical divisions exist for the company’s network: operations, engineering, marketing, and the call center. The company is expanding and needs to shuffle people off their home floors and onto other floors and even into other locations. By segregating the company network into four broadcast domains, the network administrator can prevent the network from becoming flooded with traffic so that bandwidth is not…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Predictable passwords could be an issue too. User passwords are probably one of the most vulnerable ways to have a security breach. It is mostly due to weak passwords. Weak passwords being a minimum or 8 characters and not requiring a number and/or a special character. Ensure you emplement “strickt” password complexity standards.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BAT1 Task 1

    • 1871 Words
    • 8 Pages

    c) There should be restrictions on the passwords created by users with regards to complexity, maximum and minimum duration of the password, history of the password etc. Login information should be changed once in three months to keep…

    • 1871 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Mis 589 11 & 12 Mini Cases

    • 1102 Words
    • 5 Pages

    Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Network Case Flows

    • 689 Words
    • 3 Pages

    The following is a series of case studies on Network Flows. Network flows can be representative of many types of systems. Whether the network is used to transmit data from computer to computer or server to server, transfer goods across the county, or deliver liquid flows to the desired location, networks must be studied to find the most efficient path for the given media to travel across. Locating the most efficient path for media allows systems to run at maximum efficiency without overloading any particular portion of the network, which would slow or even inhibit delivery to the desired destination.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    JP Morgan Chase

    • 1665 Words
    • 7 Pages

    5. With the advent of mobile banking, discuss how banks have protected the software that allows for online transaction to occur through automation.…

    • 1665 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    software vendor. However, patches are intended to be only temporary solutions until problems can be permanently repaired.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    mini cases

    • 832 Words
    • 3 Pages

    Kenny is a teenager who has experienced uncontrollable bodily and facial movements, various uncontrolled vocalizations, and other compulsions such as excessive hand washing and wringing. He has been treated with Clonidine, Haldol, pimozide and buspirone. This patient was diagnosed with Tourette’s Syndrome. Clonidine is a vasodilator that allows for blood to flow more easily to the brain. This lowers blood pressure and helps treat the tics the patient experiences(1). Haldol and Pimozide are antipsychotics that blocks dopamine receptors in the brain. This would help treat the compulsive behaviors (2). Buspirone is used to treat anxiety disorders. It binds to serotonin receptors in the brain. This would also help treat Kenny’s tics and behavioral issues.…

    • 832 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Network Design

    • 534 Words
    • 2 Pages

    In this paper I will be going over a network design proposal for a building on the UMUC campus in Adelphi, Maryland. I would plan to run a fiber optic network to ensure the fastest speeds possible and fiber optics are notorious for not having any signal loss compared to a Cat5e. Using a star topology throughout the building with the servers in each classroom connected to the server room on the respective floor. Equipment used to build the network will consist of servers, routers, hubs and computers. There will be a physical firewall installed on each server and an IDS (Snort) for the network as well as AVG firewall and virus scanner.…

    • 534 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mini Case R.K Maroon

    • 553 Words
    • 3 Pages

    price the deal assuming a second round in year 2 of $8,000,000 with a 40% return.…

    • 553 Words
    • 3 Pages
    Good Essays