Premium Essay

Assignment 2-2 Cyber Security

In: Computers and Technology

Submitted By johu1989
Words 670
Pages 3
Course CS 3118
Professor: Milan Samplewala
Date: September/ 11/2015
Interest of Active Directory (AD)
Ken 7 Windows Limited software has provided you with innovation for organizational employee setup by roles. The software provides six roles you can choose from in order to identify your candidates. Making your operation more secure and efficient to manage your operation and protect restricted data. There is an extensive advantage to Active Directory that will be explain in detail to further questions you have provided our team to answer. We can see your operation has been split into groups of accounting, planning, and purchasing. We would like to add Active Directory to your operation making your business more secure and easier to manage.
Creating users with Active Directory
While creating existing users for your operation, we will begin the process by entering your Active Directory. User will be created in a file with multiples candidates and groups. User will be setup in an organized fashion as explained in this is example,
• Name of File: Shopfoor
• Users name: SFUser
• Users Last: 01
• Users Log In: SFUser01

Once creating the user through Active Directory, they will be provided with specific instructions to create a password. Lengths, Maximum letters, and more categories that will make the password complex enough to avoid vulnerabilities. These are the six basic roles that the (ERP) software will be proving you to identify candidates for your operation.

• Administrators- Maintain ERP data and system operation.
• Planners- Run planning software and generate requirements reports.
• Shop Floor users- Enter operational data (receiving, shipping, and products progress during manufacturing).
• Managers-Manage department personnel.
• Purchasing users- Generate purchasing documents based on planning requirements.
• Accounting users- Maintain…...

Similar Documents

Premium Essay

Module 2, Written Assignment 2

...Running head: MODULE 2 – WRITTEN ASSIGNMENT 2 Module 2 – Written Assignment 2 Thomas Edison State College   Module 2 – Written Assignment 2 This paper describes why search engines and databases produce different types of queried results. Two (2) separate search tools were used and this paper attempts to explain why there are differences in search results obtained from each search tool and evaluate the quality of their search results.   Module 2 – Written Assignment 2 Searching for information via the Internet will always produce invariable results. This notion can be exaggerated depending upon the tools one uses to query for information. That is not to say that the Internet cannot be used as a valuable research tool. On the contrary, studies have been conducted to support the use of Internet-based research in many fields, including the medical field (Ahern, 2005). While the Internet search engine can be a powerful tool for research, it should be noted that not all search engine tools are created equal. Different Internet search engines will in fact return different results. Therefore, great care must be taken to ensure that the appropriate search engine is chosen for the job. Some of the different types of search engines include: Crawlers, Directories, Meta, Hybrid and Specialty. Search query options enable users to refine their searches in an attempt to find more relevant information. These particular options vary according to the search......

Words: 904 - Pages: 4

Free Essay

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Premium Essay

Assignment 2

...BUSM 21975 Global Warehousing and Inventory Management Assignment #2 Do your research in the teams of up to 3 people. Analyse and comment on: 1. The advantages and disadvantages of the warehouse location 2. Analyze advantages and disadvantages of the physical layout of the warehouse. Warehouse layout is also important in achieve greater efficiencies. Minimizing travel time between picking locations can greatly improve productivity. However, to achieve this increase in efficiency, companies must develop processes to regularly monitor picking travel times and storage locations. Without the proper layout and design of your distribution center, no matter the square footage, you will be facing capacity issues, decrease in productivity, and storage inadequacies. The layout helps to utilize all the potential storage space. The vertical space as well as individual cubic is fully utilized which result in increase in capacity storage. With a great layout of the warehouse, inventory can be store organized, in order which can increase the accurately of collecting the data. Thus, Minimizing congestion and interference with smooth flow. (Jeffrey,B. Sept9, 2013. Warehouse layout and Design principle) Disadvantages: one of the disadvantages of physical warehouse layout is fixed. The warehouse design is fixed so during peak seasons. When design the warehouse layout, designer can not predict exactly the demand in the future. As the result, the warehouse can not maximize or......

Words: 438 - Pages: 2

Premium Essay

Assignment 2 Linux Security

...Linux Security Technology Security of a system is important in our today’s use of the internet. That is why Linux with its many layers that are always evolving in security to protect against all kinds of hackers or othe types of attacks . SELinux, Chroot Jail, IPTables, Mandatory Access Control and Discrestionary Access Control, just to name a few. SELinux is an access control implementation for the Linux kernel. Take for instants that you are the administrator and you define rules in user space and if the Linux kernel has been added with SELinux support, then those rules will be followed by the kernel. SELinux is a NSA Security-Enhanced Linux, in which the mandatory access control is flexible. The structure of SELinux supports against all kinds of mandatory access control policies. Some of which are Role-Based Access Control and Multi-Level Security. It was designed by NSA for the purpose of protecting a server against malicious daemons, by telling the daemons what they can and can’t do. This type of technology was created by Secure Computing Corporation, but was supported by the U.S. National Security Agency. In 1992, the thought for a more intense security system was needed and a project called Distributed Trusted Match was created. Some good solutions evolved from this, some of which were a part of the Fluke operating system. Which then became the Flux and finally led to the creation of the Flask architecture. Eventually it was combined with the Linux kernel,......

Words: 873 - Pages: 4

Premium Essay

Assignment 2

...Draft Assignment 2: Ethics and Corporate Responsibility in the Workplace and the World Stakeholders:- The Stakeholders in this case are:- 1. PharmaCARE 2. PAC 3. The People and Government of Colberia 4. Executives of the PharmaCARE 5. PharmaCARE Clients Worldwide 6. FDA 7. OSHA 8. MR Alen Jones 9. CompCARE and Employees 10. Doctors and Hospitals who were dealing with CompCARE 11. Donna, Tom and Ayesha 12. Wellco The Ethics of PharmaCARE in Colberia:- Now days it has become a critical measure for companies (small and Large) to abide by ethical standards, which are designed to protect the well-being of society they are operating in and marketing with. In doing so companies, especially big corporations like PharmaCARE, are expected to have certain type of ethical standards as well as embrace and implement (CSR) corporate social responsibility policies and strategies in every aspect of their operation and beyond. According to David Vogel the definition of CSR is ‘practices that improve the workplace and benefit society in ways that go above and beyond what companies are legally required to do’ (Alexander (Sascha) K. Nussbaum). In light of this we can observe that the operational activities of PharmaCARE in Colberia were in fact completely contrary to the company’s claim of caring about the world. In spite of exploiting the people and the indigenous healers of the country, the fact that they did not have a tiny bit of......

Words: 1098 - Pages: 5

Premium Essay

Assignment 2

................27 III. ECONOMICS OF TWO-SIDED MARKETS...................................................................................31 A. What Makes Two-Sided Markets Different.......................................................................31 1. Network Effects ............................................................................................................32 2. Multiproduct Firms .......................................................................................................32 B. Profit-Maximizing Pricing in Two-Sided Markets ............................................................34 1. Monopoly Two-Sided Firm ..........................................................................................34 2. Competing Two-Sided Firms........................................................................................37 C. Business Models in Two-Sided Markets ...........................................................................38 1. Getting Both Sides on Board ........................................................................................39 2. Pricing Strategies and Balancing Interests....................................................................40 3. Multihoming..................................................................................................................42 D. Two-Sided Markets and Social Welfare ............................................................................44 IV. ANTITRUST......

Words: 34916 - Pages: 140

Premium Essay

Assignment 2

...Abstract The business environment have become more volatile due to economic crises and changing markets. Samsung, a leading conglomerate of Korea, is not an exception. Samsung is undergoing many issues related to human resources, and will not survive if it chooses to stay passive to the upcoming business environmental volatility. In this report, Samsung’s current policies and issues related to human resources are examined and discussed. The topics concerned are job retaining, job satisfaction, job security, global recruitment, job relevance, motivation, and employee rights. The purpose of this report is to focus on finding recommendations about what Samsung should do on each according situation, with ideas and concepts backed up from journal article references and textbook. Ultimately, Samsung may be able to handle its human resources and issues related with more efficiency and effectiveness by accepting recommendations suggested on this report,. Keywords: Recommendations for Human Resources Strategy, Efficiency, Effectiveness. Foundation of Samsung and its Current Strategies on Human Resource The Samsung Group, which was founded in 1938, is a leading global conglomerate composed of numerous businesses, including electronics, construction, chemical, financial industries and etc. Samsung has economic values over 318 trillion Korean won, with 64 domestic and 311 foreign affiliated companies. Samsung focuses on human rights, technology, social contribution, and......

Words: 843 - Pages: 4

Premium Essay

Assignment 2

...Silvia Chapa Dr. Karani 2-20-2014 Assignment 2 1. On a scale of 1 to 10, I would rate Smarty Pants and Donorschoose both a 10 in their efforts to build credibility and trust. Both organizations used the eight techniques for engendering credibility, legitimacy, and trust. The fact that Smarty Pants advocates for brain health in children impresses me. It is great to see an organization put forth the effort to supply a vitamin that benefits children in receiving their correct micronutrients to support brain health. As stated in the textbook, “All children benefit from appropriate daily supplements of three micronutrients that support brain health – Omega 3, DHA, and Vitamin D. Until now, these three micronutrients could be bought separately, but were not available in a single table.” Smarty Pants was able to put all three micronutrients plus more in a single table for children. Thus, Smarty Pants having pediatricians approve helps their case and builds trust with their consumers. As for Donorschoose, I am impressed with how they display their live feedback in real time. This shows that the organization has nothing to hide and is willing to let the world view what everyone is thinks about them. This allows people who are interested in donating a perspective of what other people in the world have experienced with the organization or what they feel towards them, allowing more than only the bias opinion of people who are strictly working for the organization or......

Words: 1026 - Pages: 5

Premium Essay

Assignment 2

...Assignment 2 HSA 515 Marlo Alcala July 19, 2011 Professor Forbes Assignment Two Scenario: You are the Chief Executive Officer at a small non-profit community hospital. In January the area was hit by a large snow storm while you were vacationing in the Bahamas. Many of the hospital staff who provided patient care called out from work on the 3-11 and 11-7 shifts. Despite efforts from the nurse managers to get relief staff, only one nurse agreed to come in. As a result, the patient units were understaffed and health care personnel on day shift were required to remain on their assigned unit until they were relieved from duty. During the course of this occurrence several patients sustained minor injuries from falls out of bed and one patient was given the incorrect medication, resulting in death. The nurse on duty left the hospital to buy dinner at the corner Wendy’s Restaurant. After one year, the families of these patients sued the hospital on behalf of their deceased relatives, and you are one of the parties mentioned in the suit. The hospital refused liability, stating that: the patients who sustained a fall were awake, oriented and experienced no limitation in mobility; the patient who was given the incorrect medication died not from staff negligence, but from an unidentified allergic reaction to a food substance and had no history of allergies. Question 1 Identify and explain at least three legal considerations. I was the CEO of a non-profit hospital when we......

Words: 1400 - Pages: 6

Free Essay

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Premium Essay

Assignment 2

...This worksheet is to be typewritten, saved as a pdf., and uploaded to Canvas under the “Assignment 2: personal diet analysis” assignment. In addition to this worksheet, you are to upload the following to Canvas as part of your assignment: the exact same "Food Groups & Calories Report" that you turned in for Assignment 1, uploaded as a pdf; the exact same "Nutrients Report” that you turned in for Assignment 1, uploaded as a pdf; the exact same "Physical Activity Report(s)" that you turned in for Assignment 1, uploaded as a pdf. For this first question, you will need a copy of your "Food Groups & Calories Report" from your three-day food recall that you entered into SuperTracker. This is the exact same report you turned in for Assignment 1. Question #1: Using the Food Groups & Calories report, fill out this table | Food group | How many servings you actually ate: | How many servings you were supposed to eat: | How do you compare? | Grains | 9 ½ ounces | 10 ounces | above X within below | Fruits | 1 cup | 2 ½ cups | above within X below | Vegetables | 1 ½ cup | 4 cups | above within X below | Dairy | 3 ¾ cups | 3 cups | above X within below | Protein Foods | 22 ½ ounces | 7 ounces | X above within below | Question #2: How does inadequate fruit & vegetable consumption impact both our short-term & long-term health? (Check out Chapter 2 in your 2ed & 3ed textbook for more information). Answer in complete sentences. There are both...

Words: 2090 - Pages: 9

Premium Essay

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Premium Essay

Assignment 2

...Assignment 2: Harnessing Information Management, the Data, and Infrastructure Due Week 4 and worth 120 points In Assignment 1, you investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected in Assignment 1. Use the Internet or Strayer Library to explore the relationship between information management and data storage techniques. Write a four to six (4-6) page paper in which you: Ascertain the importance of information management for the company or industry that you have chosen. Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice versa. Suggest at least two (2) data storage methods regarding database, data warehouse, and / or date mart for your chosen company or industry. Provide a rationale for your response. Determine the optimal data storage method between the methods that you suggested in Question 3. Provide a rationale for your response. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.......

Words: 336 - Pages: 2

Free Essay

Beth a Grillo - It540 Management of Information Security - Assignment - Unit 2

...Unit 2 Assignment: Security Policy Implementation Beth A. Grillo, MHA, CPC-A July 19th, 2016 IT540-01: Management of Information Security Dr. Kenneth Flick Kaplan University Table of Contents Unit Two Assignment: Security Policy Implementation 3 Part 1: Step 29 3 Part 1: Step 36 3 Part 3: Step 33 4 Part 3: Significance of Strict Password Policy 5 Reference 6 Unit Two Assignment: Security Policy Implementation Part 1: Step 29 Part 1: Step 36 Part 3: Step 33 Part 3: Significance of Strict Password Policy When attempting to protect company information it is important to utilize strict password policies. According to a Guest Contributor on TechRepublic (2006), the need for “an effective password policy is to prevent passwords from being guessed or cracked”. According to Coconut Daily (2013), “Weak passwords are extremely vulnerable to cracking techniques such as a brute force attack, in which a cracker uses an automated tool to try every single possible password or key until the correct one is found. Brute force techniques are extremely effective at cracking short passwords or passwords in a limited search space (such as those based off a dictionary word)”. For example, when working in a medical practice the information being protected is patient personal information. The password policy needs to be strict according to the HIPAA laws. The personal information within the patient’s medical record requires strict password protection. If the...

Words: 297 - Pages: 2

Premium Essay

Assignment 2

...assignment 2 Exercise 4 Sample values: 1.3, 7.0, 3.6, 4.1, and 5.0 a) [pic] [pic] [pic] [pic] ( The sample mean is 4.2 b) [pic] (1.3-4.2) + (7.0-4.2) + (3.6-4.2) + (4.1-4.2) + (5.0-4.2) = 0 -2.9 + 2.8 + -0.6 + -0.1 + 0.8 = 0 0 = 0 Exercise 8 Incoming calls per day 14 24 19 31 36 26 17 a) µ = [pic] µ = [pic] µ = [pic] µ = 23.86 b) The above answer is a parameter Exercise 14 [pic] Where [pic] is the weighted mean [pic] Where [pic] is the number of books [pic] Where [pic] is the cost of the books [pic] ( The weighted mean price of a book is $1.50 Exercise 18 15 15 31 33 39 41 54 a) [pic] [pic] [pic] (The median is located at the 4th value, ie. 33 ( The median number of oil changes is 33 b) The mode is 15 because it is the only value that appears more than once. Exercise 20 6 8 8 8 10 11 12 14 17 17 a) [pic] [pic] [pic] , The median is located between the 5th and 6th values [pic] ( The median age of people in the arcade is 10.5 years b) The mode is 8 years of age at the arcade because it appears the most times in the set of values. Exercise 30 [pic] Where X is the value at the end of the period, and Y is the value at the beginning of the period. [pic] [pic] [pic] [pic] ( The geometric mean annual increase for the period of 1978 and 1988 was 2.3% Exercise 42 a) µ = [pic] µ = [pic] µ...

Words: 340 - Pages: 2