This website uses cookies to ensure you have the best experience. Learn more

Project Part 1 Essay

560 words - 3 pages

Project Part 1
The top three security threats that Aim Higher College faces are the following: Mobile devices connecting to the network, Social Media, and Compromised routers intercepting sensitive information. These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report.
College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to ...view middle of the document...

Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware every time they are used on the campus network. Malware can be embedded in everything from videos to comments. Every time a student or teacher clicks on a video viruses, keystroke loggers, or worms can be installed and start destroying or intercepting data. The infected devices must be identified quickly and the malware removed while still allowing others to access the websites. Another challenge unique to social media is the fact that not only is there a potential network impact, but students may be caught for violations to campus policy on their own time. Social media is being scrutinized on a massive scale and students and teachers both must watch what they post on these sites. Pictures, comments, and activities are being monitored and a night partying that is posted may result in a student expulsion or faculty members being fired. In the past activities that did not take place on campus or in a person’s own time were private. Social media has changed this and you must be aware of what you are doing at all times.
The last threat in the list is a compromised router intercepting sensitive information. As the core routing system for the Internet, BGP defines the most efficient route for Internet data to be transmitted around the world, deciding which links carry Internet data. Think of it as the Internet’s navigation system, providing turn-by-turn directions for all Internet connections. By hijacking the BGP translations, attackers can drive unsuspecting surfers and/or students, faculty and staff attempting to access the university’s network to malicious sites. They can also intercept e-mail, financial transactions, and other highly sensitive data and personal information as they are transferred to the university or a key partner. The financial and security implications associated with such acts can be tremendous.

Other Papers Like Project Part 1

Gm 545 Course Project Part 1

1209 words - 5 pages Course Project Part 1 GM545 Business Econcomics (Fall Session A 2010) November 9, 2010 Ethical Issues in Business Ethics is an everyday occurrence in the corporate world as well as one's personal life. Business ethics is the same as normal ethics. In both cases, ethics is knowing what is right or wrong, and/or learning what is right or wrong in the environment in which one is involved. An ethical issue may not have a concrete answer

Nt2580 Project Part 1 Essay

517 words - 3 pages 1. Network firewall The first line of defense against unwelcomed users would surely be the firewall. At one point, the use of dual firewalls from different vendors was all the rage, but DMZ is more popular today. There are actually a few different types of firewall implementations. For example, consumer-grade routers typically make use of Network Address Translation (NAT), because the identity of hosts is complicated, NAT is often said to offer

Business Research Project Part 1: Business Problem and Research Questions (Revised)

718 words - 3 pages Business Research Project Part 1: Business Problem and Research Questions (Revised) QNT/561 December 15, 2014 Business Research Project Part 1: Business Problem and Research Question Cooper & Schindler (2011) define business research as the process of planning, acquiring, analyzing, and disseminating relevant data, information, and insights to decision makers in ways that mobilize the organization to take

Intro to Info Security Project Part 1

750 words - 3 pages as intrusion detection/prevention * High availability and scalability LAN to WAN Security 1. Perimeter • Firewall • Network-based anti-virus • VPN encryption 2. Network • Intrusion detection / prevention system (IDS /IPS) • Vulnerability assessment (VA) tools • Access control / user authentication 3. Host • Host IDS • Host VA • Anti-virus • Access control/user authentication 4. Application • Host IDS • Host VA • Access

Kudler Fine Foods Integrative Network Design Project (Part 1)

644 words - 3 pages Kudler Fine Foods Integrative Network Design Project Your Name Here Fundamentals of Networking (NTC/362) June 9, 2013 Daniel Aldama Integrative Network Design Project Kudler Fine Foods currently operate out of three locations with the home office located at La Jolla, CA and two other locations at Del Mar, CA and Encinitas, CA. The three locations are connected via a dedicated T3 which provides a 44.6 MBs connection between all three

Project Management Competencies in the Project Oriented Organization

3909 words - 16 pages pm process, by defining its objectives and by defining its deliverables, it is possible to measure the quality of the pm process. The pm process consists of the following subprocesses: 1. 2. 3. 4. 5. Project start Project control Project coordination Management of project discontinuities Project close-down. Objects of consideration in the pm process are the project objectives, the scope of work, the project schedule and the project costs, as

Mis Fnb Project

1396 words - 6 pages processes  For PMPs, this course counts towards PDUs. Office of the Senior Associate Vice President for Finance www.pmi.org Page 2 GW MS in Project Management Project Management Fundamentals Office of the Senior Associate Vice President for Finance business.gwu.edu/mspm/ Page 3 Outline Project Management Fundamentals 1. Project Issues 2. Project Characteristics – Definition of a Project – Project vs. Operations

Project Charter

3758 words - 16 pages Name - Siddharth Mandwal ID- 1001704 Date Submitted - 10/26/2015 PROJECT CHARTER AND ITS STRUCTURE INTRODUCTION Projects have been a part of the human life for hundreds of years. They can exist for a significant amount of time, can cost a lot of money and may involve people from all departments and offices under an organization. When projects can be very complicated, small mismanagement practises might cost a lot of time and money. This

Project Management

1136 words - 5 pages have all the information needed to make educated decisions for the project to function correctly in the other phases. The initiation phase plays an important part in the project life cycle because this is the time that the ideas are produced and brought together before moving on to the next phase. Planning entails charting all necessary tasks for project completion and providing realistic task completion dates (Gordon, 2014). This phase is

Project on Beverage Company

1213 words - 5 pages needed Is there any history or previous feasibility studies? Is this related to / derived from any other project? Project Feasibility Definition OBJECTIVES EXPAND FROM PROJECT BRIEF….WHAT ARE WHAT ARE THE MAIN OBJECTIVES for feasibility? Defined method of approach THERE ARE VARIOUS POSSIBLE APPROACHES OR OPTIONS, DETAIL YOUR SELECTED ONE. FOR EXAMPLE: 1. Contract Out: the project work is contracted out to an external

Assignment 2

797 words - 4 pages Case Study 1: Green Computing Research Project – Part 1 Due Week 3 and worth 70 points Read the Green Computing Research Project, Part 1 in Appendix C. Assume the project budget is $500,000 and will take six months to complete and that you must select the project team as soon as possible. Use project charter examples from Chapters 3 and 4 as support in your answer. Prepare a project charter for the Green Computing Research Project

Related Essays

Curse Project Part 1 Essay

1031 words - 5 pages Course Project – Part I Introduction The Course Project is an opportunity for you to apply concepts learned to a real-life simulation experience. Throughout the Course Project, you will assume that you work as a financial analyst for AirJet Best Parts, Inc. The Course Project is provided in two parts as follows: Part I – In Part I, you work with AirJet Best Parts, Inc. staff to identify the best loan options, as well as to evaluate stocks

Project Part 2 Task 1 Essay

588 words - 3 pages Project Part 2 Task 1: Secure File Storage Server Scenario There is a requirement to read customer confidential data located in the local area network (LAN) of First World Bank Savings and Loan. The organization needs to deliver highly confidential customer data in Portable Document Format (PDF) format for its online customers. This data is typically uploaded to a Linux file server by the bank employees within the LAN. However, online

Health Care Reform Project Part 1

628 words - 3 pages Health Care Reform Project Part 1 David Chambliss HCS/440 - Economics January 12, 2016 Professor Kamal Faour Health Care Reform Project Part 1 The Price of Progress: Drugs In The Health Care Market This is a review of the above fore mentioned article. The U.S. health care system in the new century comes with good and bad news both stemming from the same source; medical innovation. The good news: life expectancy and

Is3440 Project Part 1 Task 2

1215 words - 5 pages Project Part 1 Task 2: Provide Open Source Server Solutions Database Server Database Server solution: PostgreSQL is an object-relational Database software solution that offers vast features as compared to the bigger commercial manufacturers such as Oracle and IBM. PostgreSQL has wide functionality, it allows for the use of two different types of interface, a GUI (simple clicking) and a SQL for those who like to get more in depth with the