Preview

Week 5 Bsa/310

Powerful Essays
Open Document
Open Document
4336 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Bsa/310
Network security fundies Wk 5 bsa310

Introduction

The Essence of Network Security: * Allow everything to be accessible and secure at the same time.
What exactly does this mean? It means that all your local and network resources need to be made accessible all the time, but to only the right people. It is the second part of this statement that causes difficulty. Most administrators have no problem making the resources available, but the issue of "to only the right people" is where the confusion begins. Who are the "right people"? Who decides who the "right people" are? Is it possible for someone to be considered in the "right people" group only during certain hours of the day?
It is extremely important to realize that security is not a single technology. A person cannot go and buy security. Security is a mindset; it is a combination of feeling safe, knowing data is secure, and being as sure as possible that the network will not go down at any moment. These are not tangible items they are emotions.
Perfect security is a goal that few people pursue due to the fact that most security professionals realize there is no such creature. The concept of perfect security cannot exist for one simple reason: humans. As human beings, we are allowed the freedom to make decisions, both good and bad.
Take the following analogy as an example: A single workstation computer. No network card. This workstation is in a sealed room with no windows, only a single overhead halogen light and a single ventilation duct. There is an armed guard who verifies the user upon entrance to the foyer of the sealed room. To get into the sealed room requires a fingerprint scan, a retinal scan, and voice recognition. Once inside, there is only one user in the world that is authorized and has access to this computer. To log in to the system, the user must log in using biometrics and a password.
Can the owner of this business feel confident that this computer is secure? Since there is a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lm/300 Week 4

    • 672 Words
    • 3 Pages

    Formulate LPM to determine the number of basketballs and footballs to produce in order to maximize profit.…

    • 672 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 6 HSM 260

    • 324 Words
    • 2 Pages

    1. The difference in service volume between the high and low time periods is calculated by subtracting the month with the lowest number of meals served from the month with the highest number of meals served.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bsa 375 Week 1

    • 700 Words
    • 3 Pages

    The human resource department has gathered information through the analysis phase and the design phase. Here we will focus on the implementation phase. The implementation phase has six key activities which are critical when executing this phase. The six activities are coding, testing, installation, documentation, training and support. These factors can get quite complex and confusing if the plan is not implemented correctly. Riordan Manufacturing has chosen to follow through with this system to improve its functions and to keep certain employee information confidential.…

    • 700 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 5 xmgt/216

    • 388 Words
    • 2 Pages

    I hope all is well since our last meeting. As we have recently been confronted with financial difficulties within Austen Pharmaceuticals, I have given extensive consideration in devising an effective plan for adequately addressing the directive of decreasing payroll by 15% and am prepared to share my prospective solution. As this transition will directly impact the employees, I have met with them to apprise them of the proposed cuts that have been presented and will ultimately take place. In an effort to maintain morale and make this evolution as seamless as possible for the employees, I have incorporated some of their ideas and suggestions in constructing the plan to decrease the payroll while preserving the workforce. After reviewing the most current performance evaluations for each employee, I have established a ranking system that rates each employee based on their overall performance in addition to any individual contributions that they have made which resulted in more efficiency within our division. By rating the employees based on performance, this provides a reference point to determine the most productive employees versus those who are marginal in the event that lay-offs are inevitable. The first step in fulfilling the objective of the plan is to immediately eliminate overtime and have salaried staff help out where possible to complete the work. Next, is to restructure or reduce the amount of hours that each employee works while allowing them to maintain their benefits. The more productive employees will work during peak hours and the average staff will work during off-peak hours. This will allow for the work to be completed while utilizing our best resources when the workflow is the highest. The final…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hca.270 Week 2

    • 724 Words
    • 3 Pages

    Background: Cost centers are used in an organization to group expenses. For example, the patient registration department would be a cost center. All costs associated with operating the patient registration department would be grouped into this cost center. Items such as paper, copier rental, education and training for new employees, and computers used by the registration employees would be allocated to this cost center.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    Valacich, J. S., George, J. F., and Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education. Retrieved from the University of Phoenix eBook Collection database.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BSA/310 week 2 dq

    • 392 Words
    • 2 Pages

    There are many advantages of aligning business and IT strategies. For most companies aligning the business and IT a strategy are both a necessity and gives a competitive advantage. Alignment can exist if the directional aspects of IT strategy are driven by the business strategy. If a company neglects to align business and IT strategies it can result in a significant setback for the company in reference to the capabilities it needs to compete. Two examples of IT strategy principles are IT solution will be based on technology standards, and will be implemented with regards for financial worth, risk and strategic alignment. Companies can achieve benefits with effective use of technology these can include: reduce cost, consistent procedures, improved productivity, better risk control systems, execution of new company policies and procedures, growth, and sales. The success alignment between IT and the business strategy is based on knowledge of the company, effective communication, and cooperation all through the business. A major advantage of aligning IT with business strategy can be obtained from having vigorous, but flexible, technology all over the company, while maintaining a smart business strategy.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BSA 310 Week 4 DQs

    • 441 Words
    • 2 Pages

    This work of BSA 310 Week 4 Discussion Questions shows the solutions to the following problems: DQ 1: Using specific examples, respond to the following discussion question by Thursday. Be sure to respond to fellow students' posts. Electronic media is everywhere. What are trends in marketing that result from the convergence of entertainment, communications, and technology?…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pol/310 Week 1

    • 627 Words
    • 3 Pages

    This work POL 310 Week 4 Discussion Questions 2 Biodiversity, Extinction, and Making Choices in Policy contains answers on the following tasks: "Some people argue that since extinctions have always taken place, they should be considered a natural process and that the current extinction rates are not a matter of concern. Others point out that the preservation of biodiversity is essential to the continuation of life on Earth and that human actions have greatly accelerated the extinction rate. Should the policy process take into consideration all competing positions…

    • 627 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Having a sense of security is of great importance to me. The knowledge that I will be protected and…

    • 706 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch08

    • 13779 Words
    • 64 Pages

    1) The potential for unauthorized access is usually limited to the communications lines of a network.…

    • 13779 Words
    • 64 Pages
    Satisfactory Essays
  • Good Essays

    One can agree that in order for one to be 100% secure they most sacrifice 100% of their privacy so that the measures of security can keep a constant watch on everything going on in every aspect of their life in order to grant absolute protection.…

    • 728 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At this point we discuss why a computerized information system is either more or less secure than traditional methods. One of the primary ideas behind computers is that the computer key or password is unique for each person or group and can be changed as often as necessary with no cost other than time. Changing a real lock, however, is difficult because all of the keys for that lock must be changed which requires more time and of course money which is not as effective for running a business.…

    • 1528 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Law Inforcment Cameras

    • 442 Words
    • 2 Pages

    All the security can keep you safe, though you should not have to trade privacy for security.…

    • 442 Words
    • 2 Pages
    Good Essays