Preview

Is4796 Unit 1 Assignment

Satisfactory Essays
Open Document
Open Document
370 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is4796 Unit 1 Assignment
Ronnie Roland
Unit 1 Assignment 1 Review of Firm’s Qualifications
IS4799
My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.
RLR Inc. has clients of various sizes; most are state and federal government agencies that must show compliance with specific security-related regulations. Our company has eight employees who main focus

You May Also Find These Documents Helpful

  • Good Essays

    Ec1330 Unit 1 Assignment

    • 478 Words
    • 2 Pages

    After working on the EC130 Title Equipped Console, we went back to our second assignment: creating a new helicopter (H125) tailboom jig.…

    • 478 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Johnson Company is a small business that provides networking components and services. They are in need of new methods of communication for reaching out to new customers, standing out from other businesses, meeting existing customer needs, and keeping customers informed of news and updates. The Johnson Company still uses analog phone lines and still takes customer orders by hand. Their only current method of advertising is an ad in the yellow pages. They have reached out to our IT consulting firm to help them update their current business processes and communications…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    SCR Case Study 1

    • 821 Words
    • 5 Pages

    Three IT professionals founded the company. They wanted to create a new kind of IT firm. This vision seems to be very client oriented.…

    • 821 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Focus specifically on guard services and high-level consulting audits, while outsourcing or referring to vendors for security equipment and system needs (ADT)…

    • 2342 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 271 Words
    • 4 Pages

    What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?…

    • 271 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nf1 Unit 1 Assignment

    • 115 Words
    • 1 Page

    How are things going at Banner Heath? Did you have another crazy Halloween party like last year? Oh, by the way, did you get extra work from the security incident?…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT542 Assignment Unit1 1

    • 421 Words
    • 3 Pages

    a. This screenshot demonstrate that the only port left open is the remote desktop port tcp 3389. All other open ports are been removed from Window 2003.…

    • 421 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook):…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 3 Assignment

    • 603 Words
    • 3 Pages

    Based off my MWA three assignment, I realize that I do have some areas in my research skills, writing, group work, and from making decisions I need to improve on. First, I can improve in my archival research by becoming familiar with the CSU Archives and the information I can receive from them. For example, I never experienced researching on someone or something using newsletters and newspapers. When I had to use these resources to research, it was very difficult for me to transition into gathering information from that source. The more I became familiar with the resources, I was able to adapt and gather the information. Now that I experienced this, I can begin to use the archival research techniques to research on someone or something else in the future.…

    • 603 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Be Our Guest

    • 4477 Words
    • 18 Pages

    Second, the company’s leaders have been successful in networking to primary and secondary clients. This has aided in growing a business that is…

    • 4477 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    ISE549 Assignment

    • 340 Words
    • 2 Pages

    List the functional areas of a business; i.e.., finance, R&D, Manufacturing, marketing, and rate each one with respect to the amount of industry specific knowledge that will be required for Claire to do the job effectively (what the company lacks currently) vs. what she possesses. What does Claire need to know about the technology? (You might set up a table to show your assessments.)…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lg Cns Data Management

    • 1764 Words
    • 8 Pages

    • Employees – 500+ • Cross-technology experience in .NET, J2EE, ORACLE & Data management • ISO 9001, CMM Level 5 certifications • Industry focus & expertise: MRO, Electrical & Electronics, Healthcare, Retail, Automotive • Customers: Worldwide Manufacturers, Distributors, Retailers & S Di t ib t R t il Suppliers li…

    • 1764 Words
    • 8 Pages
    Powerful Essays