Preview

IT205 Week 4 Assignment

Good Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT205 Week 4 Assignment
Assignment: Information Use Paper
Student: Josey Wayne Hudson
Class: IT/205
Professor: Li Lo

The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.

I work for the government in IT, as a Part Timer. Every morning getting in my building I use My CAT card to enter the building, then I start my day. My occupation is information system, I will begin off with information system, and my obligations are figure out what the association needs in a system and PC framework before it is situated up. Additionally introduce all system equipment and programming that need overhaul and repairs before the each one comes in. additionally I keep up the system and PC framework security and guarantee that all framework is working accurately. I gather information keeping in mind the end goal to assess the system or framework execution and help improve the framework work and speedier. I set and add clients to a system and allocate and overhaul security authorizations on the

You May Also Find These Documents Helpful

  • Powerful Essays

    1.7 Store and retrieve presentation files effectively, in line with local guidelines and conventions where available…

    • 1708 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    in terms of bandwidth and storage. Your company has never traded with the U.S. Government at this…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FOSS (Free and Open Source Software) had some trouble in 2006 when Microsoft submitted 235 patents that were allegedly violated by FOSS. Microsoft created these patents in order to collect royalties from companies in the “free world” (companies/people using free software). Eben Moglen of the Free Software Foundation contended that software is a mathematical algorithm and is not patentable. Moglen wrote, “It’s a tinderbox. As the commercial confrontation between free software and software-that’s-a-product becomes more fierce, patent law’s going to be the terrain on which a big piece of the war’s going to be fought.” FOSS has powerful corporate patrons and allies. So if Microsoft ever tried to sue Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Active directory is controlled from an Active Directory server. The server is accessed by an administrator and then the changes that are made on the AD infrastructure is replicated to all workstations and users that login. AD exists in one location and replicated or issues out the permissions, rules, and roles out to the objects it is managing.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Eng121 Week 1 Assignment

    • 530 Words
    • 3 Pages

    Being self employed will allow more control over my own ideas, projects and the work that I would do. In other words, I won’t have to get approval from a boss or colleague. I would have all the say so. People usually consider me to be friendly and outgoing. However, in a work setting involving a team project, I turn bossy and controlling. I like to make decisions. When working for a company or another individual they are the ones to make all the decisions. However, I do understand that being self employed there has to be contact with others, but I will be the individual to make the final decisions of my own business. Being self employed allow control.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ENGL227 Week 1 Assignment

    • 623 Words
    • 2 Pages

    This audience profile is required as part of the week one assignment. Answer the questions below to create a thorough profile for your primary audience, Jeff Clarke, and your secondary audience, Human Resources.…

    • 623 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ms4 Assignment 2013

    • 659 Words
    • 3 Pages

    A machine costing Rs. 50,000 book value Rs. 30,000 as at 31st December, 2009 was disposed off for Rs. 20,000;…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ICT project

    • 682 Words
    • 3 Pages

    One of the important stipulations regarding project for MSC is that the candidate is to undertake a…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is not uncommon for people to say that relationships are based upon trust. Although love alone plays a major role in a successful relationship, obstacles found within trust boundaries are often tested and played out. It is equally important to express your self-disclosure as it is to receive your partners. Communication can either make or break a relationship depending on how far one is willing to trust the other. After reading “Can We Talk? Researcher Talks About the Role of Communications in Happy Marriages” and reviewing on my own personal relationship status, I am in conclusion that good communication between interpersonal relations are key to a successful relationship/marriage.…

    • 575 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Capstone Project It331

    • 3189 Words
    • 13 Pages

    Five doctor offices have decided to join each of their buildings to a network. With this, each office will have access to each of the other four offices’ information. This would greatly benefit them and their patients, allowing them to pull up a patient’s medical and billing information from a central server for easy access. However the central, east and west offices are each on their own LAN. The three LANs are similar in design for connecting each workstation and for hardware and software. The eastern and western offices have already been in a partnership with their own peer-to-peer with remote access network along with shared billing and insurance management software. The north and south locations are running standalone workstations that are various ages. Each office has no kind of network compatible hardware and runs the billing and insurance software on one dedicated computer, each with its own attached printer. Patient information is stored on several computers throughout the offices and patient records are filed manually on paper.…

    • 3189 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Ict Unit 4 P1

    • 367 Words
    • 2 Pages

    External environmental factors contribute to the need for change. Some of these factors are legislative and some are financial…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Hi my name is Brian Warren and I live in Queens, NY. I am 33 years old and my birthday is in May. Now I am a student at the University of Phoenix studying to be an IT.…

    • 328 Words
    • 1 Page
    Good Essays