Preview

It 244 Week 1 Checkpoint

Good Essays
Open Document
Open Document
721 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 244 Week 1 Checkpoint
Week 1 Assignment
Tayla DaSilva
IT 244
September 23, 2012
James Lemaster

Week 1 Assignment The company I have chosen is The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. I think Program-Framework security policy is the best overall for this type of company. As the Bloom Design Groups network stands right now it is at a high risk for potential hackers and overall business continuity. The company has one website for both the employees and the customers to gain access to which creates a significant security risk. The company should have a secured intranet complete with a firewall and a secondary form of login credentials such as a key-fob, which randomly generates a series of numbers that will allow the employees to gain access to the website. Then the network administrators should restrict access to certain employees that don’t need access to sensitive data such as the customers’ financial data. Then I would create a separate secured website where the customers can register and then be able to login with their own user credentials. Having a dedicated server that would back up the company’s financial, and customer records, would also assist in making this company a stronger and more secure establishment. Having a



References: • Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 2. Retrieved from Mark S. Merkow, Jim Breithaupt, IT244- Intro to IT Security. • Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 4. Retrieved from Mark S Merkow, Jim Briethaupt, IT244-Intro to IT Security.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    For all three settings given the conditions in which to work with a client server based model is the choice. This choice is made for a few different reasons while considering multiple factors. First off client server includes an option for flexibility. That is growth and, or modification to any existing device, or future additions to the system. The design, implication, material, and budget demands are reasonably accomplishable. A client server offers tighter security through a central database which houses an array of customized permissions which allows an appointed user whatever access is needed. A client server base model is reasonably equipped to accommodate the expanding business to the business with everything…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc/230 Week 8 Checkpoint

    • 304 Words
    • 2 Pages

    From looking at the ratio calculations Luna has a few things they could work on to help their profitability problems. I’ll start with looking at their operating profit margin which is steadily declining while gross profit is consistent indicating a large increase in operating expenses that have grown more than the percentage increase in sales, which in turn affects overall profit. Luna’s net profit margin return on assets is suffering consistently as well, but this is part of the decline in operating profit. The total asset turnover is declining indicating that the asset utilization rate is declining with it. Operating profit is also the reason why the return to equity is suffering constant losses too which makes Luna’s debt ratio at 50% which is scary number in business. You can take from this analysis that we can conclude the main reason for Luna’s profitability problems is largely to the increase in operating profits. They should consider looking into asset utilization, discontinued operation, an income from an outside source or effect of extraordinary items. Luna should develop a system to better help them keep track of their expenses and put forth any addition expensed to increase sales and promote efficient use of the company’s resources as well as avoid any unnecessary expenses. Profitability ratios are important to an organization because they help measure an originations ability to generate profit for a period in time. There are a few ways to measure profitability ratios: Gross profit margin is calculated by gross profit margin divided by the sales; Operating profit margins are calculated by operating profit margin divided by sales; Net profit margin is calculated by net profit margin divided by sales; Return of assets calculated by net profit dived by average total asset; Return of equity is calculated by net profit divided by total…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IT 240 Week 1

    • 317 Words
    • 1 Page

    1) The type of network I would use in this particular situation. I would first start off with recommending a high speed broadband provider such as in my area Either EPB or Comcast for connectivity. I would also start with a wireless router to allow wireless connectivity at the office itself. Depending on the type of business and what they would do production wise I would also recommend a VPN to allow offsite business with access to the files based off of needs of the individual employee. For this business a simple LAN would suffice their needs with simple usage. I would build the Client/Server network for this company. I would also recommend Windows 7 for the office computers. This would allow each user to have their own set of permissions with higher level employees having for instance editing access to certain documents pertinent to their job.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Checkpoint Week 1 IT284

    • 253 Words
    • 2 Pages

    For the user support employee, a customer service model begins and ends with communication. Communications not only involves speech or writing, but listening or reading well also. Communications is a two-way exercise, which involves both parties and their need to reach a satisfactory resolution. The various forms of communications between a user support employee and a customer determines the experience of a customer with user support as well as, adding or detracting to the opinion the customer has of the company. The first of these communications is the tone and style of the support employee. Each support employee should strive to create his or her own personal style of communication. This style should include everything from a greeting to a strategy for resolving customer complaints (Beisse, 2010). The technician should use clear, succinct speech or writing to convey the necessary information to resolve the customer’s issue (Beisse, 2010). A technician’s style should include the ability to categorize a customer to meet that customer’s needs and expectations. Support technicians should be able to restate a customer’s problem in the technician’s own words to show empathy and understanding of the customer problem. This is how the relationship of an ‘extremely satisfied’ customer is started and created. This should be the goal of all employees in a company with any type of communications (Beisse, 2010).…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The three dimensions to business problems are Organizational, Technological and People. With Organizational dimension comes outdated business processes, political conflict, complexity of task and inadequate resources to name a few. Technological dimension problem comes with outdated software, inadequate database capacity, rapid technological change and others. People dimension problems are lack of employee training, legal and regulatory compliance, indecisive management and lack of employee support and participation. Three dimensions in my current workplace are people; there is a lack of basic knowledge concerning applications such as Microsoft Office and in house database applications. Another example is Technology; there are workstations and servers that have been outdated for years, just as certain applications such as Adobe Acrobat and Microsoft Office are behind in versions. With the organization part, I have noticed there are many political issues between managers and employees there is a no respect for either party. To add, there is no a guideline or documentation on the procedures for tasks to be executed; this is when new employees arrive there is major chaos.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It 218 Week 4 Checkpoint

    • 290 Words
    • 2 Pages

    A one dimensional array is a variable that holds more than one index value such as car [ 13 ]. A Two dimensional array will hold two different index values such as…

    • 290 Words
    • 2 Pages
    Satisfactory Essays