Preview

Cs2531 Unit 1 Assignment

Satisfactory Essays
Open Document
Open Document
52 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cs2531 Unit 1 Assignment
I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    Kurtis Galaba 2/7/14 NT2580 Unit 5 Assignment 1 BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Unit 1 Assignment 1 Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 2 assignment

    • 475 Words
    • 2 Pages

    RBOCS- Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal Court consent decree on December 31, 1983. The seven original regional Bell operating companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. Each of these companies owned at least two Bell operating companies (Bell operating company). The BOCs were given the right to provide local phone service while AT&T was allowed to retain its long-distance service.…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 9 Assignment Professor Topics         Issues at St. Vincent’s Hospital…

    • 844 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Professor Topics        Law in Human Resources Implications of Law in Human Resources…

    • 553 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Impact of a Data Classification Standard ITT Technical Institute NT2580 June 20th, 2013 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITT Technical Institute – To: Supervisor of Richman Investment From: IT Intern As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Application of Risk Management Techniques Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Assignment

    • 500 Words
    • 2 Pages

    The grade level of my students for this discussion is 6th grade and I will be teaching world cultures.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Table presenting the processor model, year and transistor count for Intel processors from 1971 to the present.…

    • 308 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Nu310 Unit 8 Assignment

    • 1627 Words
    • 7 Pages

    Polit, D. F., & Beck, C. T. (2012). Nursing research: Generating and assessing evidence for nursing practice. (9th ed.). Philadelphia, PA: Wolter Kluwer and Lippincott Williams & Wilkins.…

    • 1627 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Introduction: Application (1): The purpose of the first application is to demonstrate that you can control many things from a distance instead of being at the actual location of the object. You can do this from a different location using the internet or onsite using the Local Area Network. This is done by connecting the object be it a nuclear power plant or a simple light bulb to a computer. Via the internet this can then be controlled from a far location. The equipment we used to perform this demonstration are a light, bell, relay, Data Acquisition device, and a computer that has the correct software installed. The local area network we set up on the main computer (the server) would bridge the way for operating the object from a distant location using the internet. We showed this by turning a light and a bell on and off using the computer directly connected to them (the server) and from another computer using the Internet.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    Class A Addresses Feature Value First octet range 1 to 127 Default subnet mask 255.0.0.0…

    • 762 Words
    • 4 Pages
    Good Essays