Preview

Week 10 Individual Assignment

Satisfactory Essays
Open Document
Open Document
357 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 10 Individual Assignment
The first thing that I would tell Dmitri is to not panic and that between the two of us we should be able to come up with a way to figure this out. I would then tell him that he should have his colleague address the problem with the three executive users and their email to keep them from harassing him while trying to get the rest of the things figured out and because it is one of the quicker problems to address and correct. I would then tell Dmitri that he needs to address the workstations in the Marketing Department and get the virus handled so that is does not affect anyone else. There could be some down time while this is being fixed, but better to have some down time then to have to all of the other computers with viruses to fix as well.
When Dmitri’s colleague completed helping the executive users with the email problem, I would have Dmitri tell his colleague to fix the network printer in the Accounting department at the Boston headquarters so that they could get their print jobs completed and out by noon. Hopefully, by this time the virus situation would be solved and everything back to normal. I would then instruct Dmitri that he and his colleague should work together to get the Albany, New York location’s network back up and running because you might need to sets of hands to be able to get the job done that much faster. Once that job is completed, I would tell Dmitri that they should tackle the WAN link that is down between Washington and New York causing the server to be re-routed from Washington to Boston and then to New York so that the down time would be decreased greatly and it could be up and running in no time at all.
Hopefully, before they got to the WAN link his other colleague that was running late would be there so that they could help fix the problem with them to decrease the time that it will take to fix the link and get it running faster.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    (Using ABC to improve product pricing) Answer the four questions posed in the case. Include in your answer the basic differences between volume based (traditional) overhead application procedures and the ABC method.…

    • 399 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Sold instruments to customers for $10,000; received $6,000 in cash and the rest on account.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Window of vulnerability would be close to two weeks of time where their system can breached again and my recommendation if I were the administrator to remedy this gap of time I would attempt to have around the clock staff working on this in order to prevent further breaches of security until the Window of Vulnerability is closed off and made to be secure and available for public use again. The IT staff would have to be on board to work around the clock to correct this gap in security as fast possible the administrator should ask for volunteers to avoid rocking the boat and upsetting his/her IT staff. In my opinion this would be the best course of action to close the security gap as soon as possible and it would provide your staff with overtime if they want to take that opportunity but also…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To recap, the security breach was reported on a Friday. On Monday, looked on Microsoft’s website to see when the patch would be released, and it indicated that it would take 3 days for it to be available. Counting Monday, 3 days would be, Wednesday. Depending on the time that the patch is released on Wednesday, would need an additional 2 days to download and test the patch before deploying, if early Wednesday, then Thursday to test. But if it comes late Wednesday, then it would take Thursday and Friday to test. Then that would leave the weekend, if the IT staff would work on the weekend. But if not, then it is going to restart on Monday and complete on…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A fresh Economics graduate from a highly ranked UK university seeking an entry-level position in the area of Marketing Communications.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Chris works for a large corporation that has several branch offices in the city. Operating as a certified computer support technician, he must roam among the branch offices, solving computer and network problems as they arise. Chris receives a call that a remote office is having network problems. When he arrives at the remote office, he is told that the network is down. This office consists of seven computers connected to a router, which is connected to a cable modem.…

    • 843 Words
    • 4 Pages
    Good Essays
  • Better Essays

    CareGroup’s network had experienced a total network failure to its central system. This was disastrous…

    • 1259 Words
    • 6 Pages
    Better Essays
  • Better Essays

    application files) or to the boot sector of a disk. When an infected file is…

    • 4808 Words
    • 20 Pages
    Better Essays
  • Satisfactory Essays

    Managing Global Team Case

    • 721 Words
    • 3 Pages

    Greg James became aware of a problem with HS Holdings where the server went down for two hours and created disaster for their online banking business and the support from James’s team did arrive on time.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Incident Report

    • 427 Words
    • 2 Pages

    On Nov 13th, I was sent to Helijet, Victoria by Director Darren Hasselhoff for an emergency of the government offices in the Department of Human Service. The emergent problem was assumed as malware-leading hacking and attacking at first and perplexed me yesterday. However, today I figured out that the problem is caused by the factory defect of network cards in their computers and solved it, then I returned right after that.…

    • 427 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Chris works for a large corporation that has several branch offices in the city. Operating as a certified computer support technician, he must roam among the branch offices, solving computer and network problems as they arise. Chris receives a call that a remote office is having network problems. When he arrives at the remote office, he is told that the network is down. This office consists of seven computers connected to a router, which is connected to a cable modem.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It255 Iloveyou Virus

    • 387 Words
    • 2 Pages

    Virus stared in Manila, Philippines on May 5th 2000, it moved to Hong Kong then Europe and then finally the US. As employees began their workday that Friday morning virus have already caused US $5.5 to 8.7 Billion in damages worldwide and estimated to cost US $15 billion to remove the worm within ten days. Over fifty million infection had been reported, it was reported that 10% of internet-connected computers in the world. Damaged cited was mostly the time and effort spent getting rid of the infection and recovering files form back up. To protect them, The Pentagon, CIA, The British Parliament and most large corporation decided to completely shut down their mail system.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    network problem, staff stopped in a traffic jam, a security attack . . . everything that might…

    • 276 Words
    • 2 Pages
    Satisfactory Essays