Preview

Industrial Attachment

Satisfactory Essays
Open Document
Open Document
582 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Industrial Attachment
REPORT ON INDUSTRAIL ATTACHMENT
1.0 INTRODUCTION:
1.1 Organization: Data Bank.
1.2 Venue: Koforidua Polytechnic.
1.3 Date: 14Th June to 25Th June, 2013.
1.4 Purpose of Attachment: To expose the student to the job market.
1.5 Purpose of The Report: To give an account of events that happened during the industrial attachment period.
2.0 BODY:
2.1 First week: On the first day of the attachment, I had an orientation on the importance of industrial attachment to the job market for an hour. Later in the day, I was introduced to the importance of a server managed by a system administrator in a company. I was asked to install a windows server 2008 on a virtual machine to serve as a domain controller. I was also assigned to find the difference between Drupal and a Word press and also the difference between a domain and a workgroup. As the day continues in the first week, I was assigned to do a configuration of the domain controller I was asked to install on the virtual machine on my laptop. I was later assigned to run a new bare metal installation of a windows server 2008 to serve as s second to main controller to replace the initial domain controller in the event of system failure and then joined the two domain controller using internet protocol addresses. Create users and organizational units and assigned policies to it, login in with their user name and password to verify if the policies, applied to each user and the various organization units are really functioning. As the day goes by I was ask to install a window 2007 operating system on the virtual machine I had on my laptop and then joined it to the initial domain controller and remote desktop from the windows 2007 desktop to the administrator’s desktop using the administrator password and it user name.
2.2 Second week: On the second week, I was initially introduced to the importance of `security to the IT firm and how to implement it efficiently to help sustained the existence of an organization by

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Feedback: Christine this is a good start where you have demonstrated a sound understanding of ways to maintain a secure work environment. Can you take it one step further and provide a specific example of how security can be maintained also? Consider some of the ways that this is done at your current or previous workplace. (2.3)…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    “Identify what you see as the main purpose of Security Management” and “Discuss what is meant by the statement that ‘Security measures must be commensurate with the threat’”.…

    • 1598 Words
    • 7 Pages
    Powerful Essays