Information Technology Essay

1012 words - 5 pages

Security Solution for a Bank Officer’s Laptop

Introduction:

UAE Bank provides laptops to their loans officers. The laptops contain information about all of the bank’s loans products (public information), and some other bank information (confidential information). The bank officer takes loan applications from clients (confidential information) and keeps these on the laptop. The loans officer travels to various locations to meet clients.

Since computer security has become important, almost all of the focus has been on securing large, multi-user machines. Moreover, for that purpose was the importance of some security procedures if the laptop were stolen or lost .
Body:
Data loss ...view middle of the document...

And to make sure that the computer has got a strong access control it should has the following security functions:

• Strong user authentication
• Control of user access per partition
• Support for user identification using dynamic passwords
• Secure remote assistance for users who are traveling and have forgotten their passwords
• Central configuration and administration
• Keyboard lock and screen saver for Windows95/98
• Limited number of logon attempts with automatic locking
• Audit logging of events, i.e. successful and failed logon attempts
And to have a safe access for the internet you should do the following:
| Completely close your system to all NetBIOS name and resource sharing leakage, and firmly shut the NetBIOS . |
| Cost nothing to implement, other than the time taken to read and understand these pages, and do not depend upon any external software. |
| Do not in any way disturb your current Windows or network logon procedures and do not disrupt your dial-up networking or other stored passwords. |
| Do not rely upon any "hacking tricks" or undocumented procedures. No warranties will be voided and no one can refuse to support your system on the grounds that you've done something "strange" to it. (You won't have.) |
| Create a solid foundation for establishing a secure local area network — today or tomorrow. When you have read and understood this page and the one that follows, you will have gained a solid understanding of the theoretical and practical aspects of network component binding. |
| Return CONTROL of a significant and important aspect of your personal computing experience — your computer's networking — back to YOU where it always belonged! |
In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event
67% of internet users have suffered serious data loss
A data repository model can be used to provide structure to the storage. Now there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.
Before data is sent to its storage...

Other Papers Like Information Technology

Information Technology Essay

555 words - 3 pages Computing & Information Technology Directory contents Which Computer or IT course is right for you? Types of Computer or IT course Computing & IT Course Guides A good computer science degree is still in very high demand. Information Technology has changed the way we do business, learn, communicate and even entertain ourselves. Your computer course helps you stay one step ahead in this fast-changing sector. Computer science and IT

Information Technology Essay

3010 words - 13 pages Information Technology in Health Care By: Antonio Ross Southern Illinois University at Carbondale HCM-20 Health Policy, Professor Swain Abstract Health care reform has reemerged as a policy imperative. Congressional discussions regarding sizable federal investments in health information technology (IT) infrastructure have revitalized the vision of health IT as a critical component of accelerating improvements in the quality and value

Information Technology

1710 words - 7 pages Course Syllabus College of Information Systems & Technology CMGT/442 Version 4 Information Systems Risk Management Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies

Information Technology - 4741 words

4741 words - 19 pages MGT220 Information Technology Term Paper Term Paper Part I. Assume you have taken over responsibility to play the lead Information Technology (IT) management role in Magnum Enterprises. Your boss, Rachel Heigl, is Magnum’s CIO. The IT management group is comprised of six people who you will be supervising. Ms. Heigl is an enlightened manager, and she believes that if you are to carry out your responsibilities effectively, you need to

Information Technology - 971 words

971 words - 4 pages live. Computer-assisted technologies in schools offer students greater access to information, an eager motivation to learn, a jump-start on marketable job skills and an enhanced quality of class work. For my life this computer makes many help to complete my works. So I must thank to specific persons to give us a wonderful technology to world.

Information Technology - 690 words

690 words - 3 pages Information Technology BIS/200 July 2, 2012 In late 2000, the U.S. Congress passed the Children's Internet Protection Act and the Neighborhood Internet Protection Act. “The law places restrictions on the use of federal funding to support libraries if the libraries do not implement both Internet safety policies and implement filters for certain objectionable material which can be accessed over the Internet” (Online Libraries &amp

Information Technology - 883 words

883 words - 4 pages ..................................................................................................................... 36 SECTION ONE1.0 INTRODUCTION 1.1 STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) BACKGROUND In the earlier stage of science and technology education in Nigeria, students were graduatingfrom their respective institutions without any technical knowledge or working experience. Itwas in this view that students undergoing science and technology related courses

Using Information Technology

610 words - 3 pages truly aware of all that technology has to offer. For the longest time I always looked at technology as a rather unnecessary addition to someone’s household. I always figured that you could get the same information from reading the newspaper or watching the news, when in all reality, there is no quicker more efficient way to get information that technology and the internet. It’s amazing the amount of information that can be stored on technology

Communication and Information Technology

817 words - 4 pages Communication and Information Technology Technology has given health care providers the ability to communicate over distances to provide better care for the patient. Technology has made many differences in the health care community. “Technology has become a powerful communication tool in medicine,” (pg. 21). One new development in technology is electronic medical records (EMR) and electronic health records (EHR). This technology will allow

Information Technology Act Paper

1030 words - 5 pages Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money

Information Technology Acts

618 words - 3 pages Information Technology Acts Bruce Washington BIS/220 December 4, 2012 Troy Adams Information Technology Acts Throughout the years, technology has advanced at an ever increasing rate. Advances in information technology in particular, have made information that years ago, would have taken weeks or even months to gather, available at the push of a button. With information so readily available to anyone and everyone, new ethical issues arose

Related Essays

Information Technology Essay 425 Words

425 words - 2 pages QUESTION 1: Instead of command and control bureaucracies, free flow of information around organizations When the new technology was introduced, people were skeptical of its functions: (bad stuff) However this decade marks the age of intranets and social media where people are no longer concerned about the deskilling of workers and the bad effects of new technology, people are now savvier, comfortable at ease in using technology, as the

Information Technology Essay 969 Words

969 words - 4 pages Information Technology This report provides an analysis and evaluation of information technology tools available to help support our business. The purpose of this plan is to set the foundation for our information technology department regrading marketing, accounting, sales, and quality assurance. This report will also cover and evaluate technologies that have emerged in the last five years and consider there potential impact on the business and

Information Technology Essay 2695 Words

2695 words - 11 pages nformation technology is a wide field, and has enabled organizations across the world to work in an efficient manner. It plays a very important role in effective management and running of a business. The use of IT in organizations is inevitable, be it any type of company like manufacturing or medicinal sector. It has contributed largely to the process advancements in organizations. Basic Elements of Information Technology Software and

Technology Information Essay

2254 words - 10 pages Questions & Answers for mid-term examination Chapter 1: 1- List and describe four reasons why information systems are so important for business today? Answer: - Capital Management - Foundation of doing business - Productivity - Strategic opportunity and advantage 2- Describe five technology and business trends that have enhanced the role of information systems in today’s competitive