Business Report Proposal
I. Introduction:
Statement of Problem.
In 2003, the company experienced a major increase of problems with the
Local Area Network (LAN). The LAN downtime has double from previous
years. There’s also an increase of maintenance problem with computers
systems this includes hardware and software. Some user’s have acquired the
authority to load there own software on their system, this has attributed to
some user’s purchasing or borrowing software from unimproved sources and
loading them on to their systems. If these actions continue it may cause
irreversible damage to our information system. This is causing this unit
thousandth of dollars per month.
Objective.
This proposal examines the computer and LAN problems from the
viewpoint of new and old employees, the tier one and tier two information
system managers. It then offers a plan to make the system more secure
against hackers. In addition, it recommends ways to improve the computer
and system maintenance making it a more secure environment for the
entire company.
Sources.
The data is compiled from a company wide-interview questionnaire,
interviews with employees; email inquiries to companies similar to 1st
Battalion Engineers, the internet, and over six years of observations of
military information system networks.
Details of the Problem.
This subsection examines the severity and causes of security and maintenance
problems on the LAN.
Severity.
Since 2001, the company has experienced a continuous increase of
computer system problems. Personnel are allowed too many privileges with
their assigned computers and the local area network, and the use of
unapproved software, which only compounds this problem. We experienced
four major system problems in the past year that led to the entire LAN being
in-operable. Many users lack the know-how to operate their system. Upon in-
processing employees are presented with numerous passwords that they
tend to write down on paper and attached to their desk or computer this
represents a major security flaw to any company that processes classified
information.
Causes.
The following were specific concerns noted by the Information System
Manager, technicians, and the employer (in descending order of importance):
1. New employees loading unauthorized software on the company systems.
2. P...
... middle of paper ...
...on Engineer, Interview by
author, Fort Jackson, South Carolina, 23 July 2003
Nettrour, Michael, Information Manager, 1st Battalion Engineer, Interview
by author, Fort Jackson, South Carolina, 23 July 2003
Moore, Benson T, System Technician, 1st Battalion Chemical, interview by
author, Fort Jackson, South Carolina, 25 July 2003
Internetworking design Basic [cited 10 Apr 2002] available at http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2002.htm#xtocid0
CIAC “Incident Reporting Procedures” [cited 9 Oct 2001] available at http://doe-is.llnl.gov/CIAC_IncidentReportingGuide3.doc
Entrust-“Internet Security 101 Basic Internet Security” available at
http://www.entrust.com/security101/basic.htm
Microsoft- “Checklist: Assess Your Risk” [ cited 2 April 2002] available at http://www.microsoft.com/security/home/
Dunham, Ken. “Bigelow’s Virus Troubleshooting Pocket Reference”
New York: McGraw-Hill Publishing, 2000.
Bigelow, Stephen J. “Bigelow’s Drive & Memory Troubleshooting Pocket Reference” New York: McGraw-Hill Publishing, 2000.
Whitten Jeffrey and Lonnie Bentley, Systems Analysis and Design
Methods, New York: McGraw-Hill Publishing, 2001
The book Fifth Business by Robertson Davies is written from the point of view of the narrator; a man named Dunstable Ramsay. From the readers’ perspective, we see him to be the main character, but as the novel progresses, he and those he encounters start to see him as fifth business. The novel shows and follows Dunstan Ramsay in his pursuit for self-knowledge, and ultimately fulfilling his role as ‘Fifth Business’ in the eyes of a number of people. It is evident that throughout the novel, he reminds himself and the reader that in fact his life and the lives of those who are close to him do not necessarily revolve around him however he still plays a large part in influencing their respective lives. The novel constantly shows instances where guilt and competition play roles in shaping character’s decisions.
Unfortunately, hacktivists that were threatening DTL Power managed to penetrate our defenses and take over part of our system. This threat actor was not in our system for a long period of time but was still able to affect the uptime of our system.
In the captivating, mysterious, and perplexing novel Fifth Business by Robertson Davies, the role of women is not only a vital but a pivotal aspect throughout the life and psychological journey of Dunstan Ramsay. Robertson Davies is famous for under-developing female characters in general; not fully creating female characters the audience can entirely understand, discover and engage, at least not to the same degree with which he develops male characters. Although the portrayal of female characters is limited, their true purpose may be much more significant than it initially appears:
Predication: On 03/17/17, Asset Protection Manager(APM) Kristin Catucci contacted APM Jakub Orlando regarding a violation of the Be Safe policy by multiple team members at store 14181.
Troubleshooting media problems on a bus networks can be very tedious, since a break in the backbone will bring down the entire LAN. For this reason, bus topology is not considered one of the more robust network topologies, compared with star or mesh. A loose or missing terminating resistor can also bring down a LAN.
It is not possible to research the accuracy of their assumption of their target market due to the fact that they do not clarify the exact details of their target market. It is not clearly documented where the market size of “two million potential customers” is derived from, therefore, cannot be tested.
Vulnerabilities occur when corrupted code or misconfigured hardware are on a network. This is why it is important for an organization to have an effective vulnerability assessment plan that includes regular scans of the network and annual penetration tests. These scans are very important to prevent hackers from “utilizing these flaws to gain access to your machines” (Houghton, 2003). An excellent source of information to get “summaries, technical details, remediation information, and lists of affected vendors” (US-CERT) is the Vulnerability Notes Database. Please view Appendix B for current threats.
Web designers have the job of working alongside clients or organisations to discuss ideas and develop job details and requirements for websites and more recently mobile application development, to provide their end uses a multi-channel window into their systems. They design and develop website content for clients as well as maintaining or coordinating maintenance for those websites once completed and implemented.
As the discussion of good writing evolved in class, I began to wonder what made good business writing. I thought about the purpose in writing both within a particular company and between different companies and organizations. I decided that most writing in business is meant to be either informative, persuasive, or a combination of both. Whether informative or persuasive in nature, I have decided that most good business writing is very similar to other good writing. I have chosen to focus on three elements that contribute to good usage in business. They are:
Yo-Good is one of four franchise options offered by ‘Fresh & Healthy Brands, LLC”, a corporation based in Burnaby, British Columbia (Serving Up Healthy Choices in New Franchise Opportunities, 2011). The company’s mission is to “offer a delicious and healthy combination of non-fat frozen yogurt with a dazzling variety of fresh toppings” (Yo-Good: Frozen Yogurt with an Important Difference, 2011) in an all-natural way without the use of artificial sweeteners. Our goal is to bring a Yo-Good franchise to the city of Halifax; a city that we believe is in dire need of great tasting healthy alternatives.
...mpany up and running through any kind of interruptions such as power failures, IT system crashes, natural or man-made disasters, supply chain/vendor problems and more.
SGM PC Depot is a start-up company that is designed to offer computer products and other gadgets. SGM PC Depot allows businesses and individuals to be informed of the latest trend in technology and grab it in the most accessible way through the internet. With SGM PC Depot, you can choose and shop a wide variety of computers, laptops, and gadgets at all times and you have 24-hour access to us. Customers can avail our products and our service by subscribing to our server on the internet.
Environmental scanning is the process of gathering information about events and their relationships within an organization's internal and external environments. The basic purpose of environmental scanning is to help management determine the future direction of the organization (Barnat, 2004). For a business to succeed, it is important to study the business environment of the firm that consists external and internal influences that affect the firm’s decisions and performance (Grant, 2010). Environmental scanning includes the assessment of Macro and Micro environmental analysis.
One constant is change. Technologies change, processes change, research creates and promotes change (Aguinis, 2013). A need for constant change and improvement exists in any organization to remain competitive in the global environment. This need to remain current in teaching and supporting the teaching and research at the College of Business requires that employees invest in their personal development. To assist with this, the college of business not only provides funds for professional development supports ongoing development through the development plan. The objectives of this plan, the content, and the development activities of the development plan for the College of Business will now be discussed.
Business plans are documents used for planning out specific details about your business.Business plans have importance and purpose for the success of the business however.Here are a few of the importance and main purpose of why we need a business plan in order to start a business. Business plan will guide us as an entrepreneur in how to handle and manage our business and company. It very useful in clarify direction , future vision , attract financing , attract team members and last but not least is to manage company.Moreover , the information gathered regarding the project is used in the Business Plan to predict viability , forecast success and propose strategies for the project .