Is3230 Project Details

In: Computers and Technology

Submitted By ChatGirl44
Words 1595
Pages 7
Project Details: Integrated Distributors Incorporated (IDI), a publically traded company, has its home office located in Billings, Montana. IDI has more than 4000 employees in the following locations: ▪ Billings, Montana, 600 employees ▪ Sao Paulo, Brazil, 580 employees ▪ Warsaw, Poland, 975 employees ▪ Sydney, Australia, 340 employees ▪ Tanzania, Africa, 675 employees ▪ Japan, China, and Hong Kong, 700 employees

IDI has accounts with major market retailers, Federal governments, and large State governments. IDI operates a fleet of trucks in each country and has network interface agreements with subcontractors for freight forwarding, storage, and delivery.

IDI is responsible for the movement of goods, from multiple manufacturers and distributors to its clients, in a timely and efficient manner using cost-effective methods. Alternatively, IDI may transfer this responsibility to one of its JVs or SAs, if it is more cost-effective and the income differential is within acceptable limits.

IDI is also under pressure for several of its competitors in the logistics industry. The competitive market is driving IDI to improve its routes, delivery methods, fleet vehicles, and other facets of its business to increase profits (a strategic goal) and to reduce costs. The company realizes that the information technology infrastructure has been neglected for some time and that many operating locations are running on outdated hardware and software. On several occasions last year, IDI suffered no less than four network compromises through one of its JV Internet sites that led to the disclosure of sensitive and strategic information on contracts and mergers.

The chief information officer (CIO) made a strategic presentation to the board of directors and executive management to first assess the…...

Similar Documents

Access Control: Is3230

...Access Control Project Access Control: IS3230 By Andrew Reed November 20, 2012 TABLE OF CONTENTS 1 INTRODUCTION 1.1 Project Title 1.2 Project Schedule Summary 1.3 Project Deliverables 1.4 Project Guides 1.5 Project Team Members 1.6 Purpose 1.7 Goals and Objectives 2 Risks and Vulnerabilities 2.1 Overall 2.2 Billings, Montana 2.3 Warsaw, Poland 3 Proposed Budget 4 IDI Proposed Solution 4.1 Billings, Montana 4.2 Warsaw, Poland 5 Drawings 6 Conclusion 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables • Solutions to the issues that the specifies location of IDI is facing • Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability • Assessment of strengths and weaknesses in current IDI systems • Address remote user and Web site user’s secure access requirements • Proposed budget for the project—Hardware only • Prepare detailed network and configuration diagrams outlining the proposed change • Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. 1.4 Project Guides Course Project Access Control Proposal Guide Juniper Networks......

Words: 1198 - Pages: 5

Details

...Details of the Assignment The Objective of the assignment is to consult our Client who is willing to setup a Vocational Training Institute in NCR based on various aspects like: (a) Understanding of the current as well as Future Skill requirements our Manufacturing as well as Services Sector in NCR (b) Understanding the Aspirations as well as Constraints of various Target Groups for the Institute (c) Mapping the current Private as well as Public competition in the region (d) Identify the Skill Gaps that exist in the region (e) Prepare an Implementation road map for the Institute Student Live Project Participation Herein, the students will be participating in the assignment right from the stage where they will be involved on Field in the process of Qualitative Data Collection from Industries / Companies in both Manufacturing as well as Services Sector to the stage where they will analyse their data and prepare an Analysis Report. Live Project Timeline & Conditions Students will be expected to be a part of the assignment on a full time basis for 5-7 days OR on a part time basis for 10-15 days. We would ideally want the assignment to start as soon as possible and so would like to wrap up the process of receiving applications quickly. Student Benefits -> All the students successfully completing the Live Project will be awarded a Certificate of Appreciation for their participation in the project along with their role description and performance...

Words: 257 - Pages: 2

Contact Details

... • Suspended Assets Management (NPA) – Identification of assets that are likely to fall in the category of special category assets and then to suspended assets, Ensuring prompt repayment by the borrower by vigorous follow ups, Rescheduling of installment periods for those accounts where prior approval obtained from the bank. • Preparation of various reports for submitting to various authorities like concurrent audit, internal audit, statutory audit, Information systems audit and RBI. • Ensuring all GL heads getting tallied regularly by monitoring the same. Environment / Tools: • Finn one – Retail Asset operation • FCRM (Finacle Customer Relationship Management) • IAMS-(Internal Audit Tool) PROJECT EXPERIENCE |Client Name |: Alwifaq Finance Corporation | |Role |:Team Member | |Environment |: T24(Temenos) | |Duration |: June 2010 to July 2010 | | | | Description: T24 is a core banking application by Temenos which covers the Banking domain,....

Words: 948 - Pages: 4

Is3230 Lab 1

...Felix Tamez IS3230 Lab 1 Assignment 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control)". 2. Why would you add permissions into a group instead of the individual? What policy definition do you think is required to support this type of access control implementation? Adding permissions in a group is a lot more resourceful and less time consuming via individually. Group Policies 3. List the 5 different access control permissions that can be enabled on user folders and data within a Microsoft Windows Server. Full Control, Modify, Execute, Read, Write 4. What is the lowest level of permission you can enable for a user who must view the contents of a folder and its files? Why is this type of permission necessary? Read, so the user has access to any file on the system that they are entitled to but not able to make any changes. 5. What are other available Password Policy options that could be enforced within a Microsoft Windows Server to improve security? Enforce password history,......

Words: 674 - Pages: 3

Project

...Project Access Control Proposal Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: ▪ The ability to discern when a risk assessment should be performed and carrying out the task ▪ Understanding user or customer access requirements, whether remote or local ▪ Using a layered security approach to establish and maintain access controls ▪ Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous units of instruction for this course. Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following: ▪ Relate how an access-control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. ▪ Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. ▪ Relate how a data classification standard influences an IT......

Words: 1018 - Pages: 5

Personal Detail

...Village/Town: | Police Station : | Post : | Dist : | Pin : | Educational Details Examination | Yr of passing | Board/Institute | Main Subjects | % of marks | 10th | | | | | 12th | | | | | B.E./B.Tech. | 2013 | | | Pl . mention % of marks below | % Sem 1 | % Sem 2 | % Sem 3 | % Sem 4 | % Sem 5 | % Sem 6 | % Sem 7 | % Sem 8 | Total Avg % | | | | | | | | | | Subjects I liked most in Engineering studies: (1) (2) Languages known : Category - i.e. General/SC/ST/Sportsman: In case of Sportsman, pl. mention the Game you play and to which the level you played: Hobbies / Extracurricular Activities : Do you have any of your relative working with Aditya Birla Group. If yes, give details: Documents to be attached:- 1. Updated Bio-data 2. Xerox copies of all Educational Certificates, duly attested by the Placement Officer. 3. Xerox copies of all Mark sheets up to last Semester, duly attested by the Placement Officer. 4. Xerox copies of Sports or any other relevant certificate, duly attested by the Placement Officer. I hereby declare that the information given by me is true to the best of my knowledge. In case any of the information is found incorrect at any point of time, my candidature or employment shall be liable to termination by the company without any notice to me. If selected, I am ready to work at any upcoming project/ unit of the company anywhere in the......

Words: 289 - Pages: 2

Is3230

...organizations and selling bonds financed by student loan interest payments. (Wright Aff. ¶ 6.) Prior to performing each new financial analysis, Wright receives an electronic database from Brazos’s Finance Department in Texas. (Wright Aff. ¶ 7.) The type of information needed by Wright to perform his analysis depends on the type of transaction anticipated by Brazos. (Wright Aff. ¶¶ 8-11.) When Wright is performing asset-liability management for Brazos, he requires loan-level details, including customer personal information, to complete his work. (Wright Aff. ¶¶ 11.) On September 24, 2004, Wright’s home was burglarized and a number of items were stolen, including the laptop computer issued to Wright by Brazos. (Wright Aff. ¶ 18.) Wright reported the theft to the local police department, but the police were unable to apprehend the burglar or recover the laptop. (Wright Aff. ¶ 19.) After the police concluded their investigation, Brazos hired a private firm, Global Options, Inc., to further investigate the details the burglary. (Villarrial Aff. ¶ 26.) Global Options was unable to regain possession of the computer. (Villarrial Aff. ¶ 26, Ex. 21.) 2 Case 0:05-cv-00668-RHK-JSM Document 61 Filed 02/07/2006 Page 3 of 14 With the laptop missing, Brazos sought to determine what customer data might have been stored on the hard drive and whether the data was accessible to a third party. Based on internal records, Brazos determined that Wright had received databases......

Words: 3818 - Pages: 16

Is3230

...Project Access Control Proposal Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:  The ability to discern when a risk assessment should be performed and carrying out the task  Understanding user or customer access requirements, whether remote or local  Using a layered security approach to establish and maintain access controls  Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous units of instruction for this course. Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:  Relate how an access-control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.  Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.  Relate how a data classification standard influences an IT......

Words: 1016 - Pages: 5

Is3230

...of the use of freeware utility such as Sam Spade is it depends on the user; there will always be someone out there that can and will take advantage of a tool that was created for malicious actions however there will also be people that can counteract the actions of that user. 8. What do you think companies and organizations should do in regards to access to whois information in the public domain? The companies should implement plans that allow the option to leave out certain information that identifies the company and important information. 9. What icon or function in Sam Spade downloads the entire HTML code of the targeted website? Since Browse Web is skeleton web browser the function displays the raw HTTP code which provides details such as the OS, the Web Server software and the HTTP extensions. It is also beneficial for debugging CGI scripts. 10. Why would someone use a proxy in order to perform data gathering from a remote website? There are circumstances that the uses of proxy that their use would be optimal such as the fact that proxy return hundreds of thousands results that contain the IP addresses and port numbers they also contain information that can be used to calculate different malware attacks...

Words: 599 - Pages: 3

Is3230

...Come up with a way to maintain the CA plan from risks. 7. When deploying a PKI, it is important to understand how many CAs will be necessary to properly implement the infrastructure. Provide 3-5 important considerations that must be taken into account before deploying a PKI for a large environment. Future applications you may need to support, cost, resources you have to manage the PKI solution, level of security, and flexibility and scalability. 8. What is the main function of the certutil.exe command line tool available in Microsoft Windows? Displays information about the digital certificates that are installed on a DirectAccess client, DirectAccess server, or intranet resource. 9. What is the OpenSSL project and their mission? It is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. Their mission is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. 10. What is the purpose of Single Sign-on? Provide one example of how it benefits security and one example as to how it can increase security risk. Property of access control of multiple related, but independent software systems. Benefit is reducing......

Words: 1143 - Pages: 5

Project Details

...Project Details: Title: Give the title of your project (less than 200 characters). Short Title or Acronym: (max. 15 letters). Keywords: Identify the relevant keywords. Duration: Up to 12 months. Total cost: Estimated overall budget of the project. Funding: total amount requested from AASTMT up to 200,000 EGY pound. Research Theme: specify which theme under which this proposal lies. Proposal Summary: (max. one page) Summarise the main questions and/or approach and objectives; give a short description of the activities and expected results of the project, emphasising on the intellectual merit of the proposed research and the broader impacts resulting from the proposed. To help evaluate the proposal, LPI should state its goal(s) and explain its place within the LPI's work and the general field of research. In addition to explaining the importance of the idea, the LPI needs to provide data or information that demonstrates the potential for the success of the project. Finally, the LPI needs to explain how the plan will be implemented. Background (max. three pages) Outline the background of the proposed research, knowledge, or information that has led to the current project proposal, by assessing existing data or providing qualitative analysis. Discuss how the proposed research would address gaps in current knowledge in the relevant field. Questions and Objectives (Max. three pages) * Describes the project’s goal and how it advances knowledge and......

Words: 1759 - Pages: 8

Mm1 Details

...really did capture it would be incomprehensible. Matrix does, however, have one well-disguised virtue: it calls attention to the central problem in structuring today. That problem is not the one on which most organization designers spend their t i m e - t h a t is, how to divide up tasks. It is one of emphasis and c o o r d i n a t i o n - h o w to make the whole thing work. The challenge lies not so much in trying to comprehend all the possible dimensions of organization structure as in developing the ability to focus on those dimensions which are currently important to the organization's e v o l u t i o n - a n d to be ready to refocus as the crucial dimensions shift. General Motors' restless use of structural change--most recently the project center, which led to their effective downsizing e f f o r t - i s a case in point. The General Motors solution has a critical a t t r i b u t e - t h e use of a temporary overlay to accomplish a strategic task. IBM, Texas Instruments, and others have used similar temporary structural weapons. In the process, they have meticulously preserved the shape and spirit of the underlying structure (e.g., the GM division or the TI Product Customer Center). We regularly observe those two attributes among our sample of top performers: the use of, the temporary and the maintenance of the simple underlying form. We speculate that the effective "structure of the eighties" will more likely be described as "flexible" or " t e m p o r a r y " ; this......

Words: 7510 - Pages: 31

Project Guidelines

...------------------------------------------------- Project Access Control Proposal Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: * The ability to discern when a risk assessment should be performed and carrying out the task * Understanding user or customer access requirements, whether remote or local * Using a layered security approach to establish and maintain access controls * Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous units of instruction for this course. Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following: * Relate how an access-control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. * Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. * Relate how a data......

Words: 1099 - Pages: 5

Is3230 Final Project Outline

...ITT Technical institute – isc program | Project: Access Control Proposal Outline | IS3230 - Access Control | | Issues at the Data Center * Different versions of unix on servers * Outdated patching * Logisuite 4.2.2 is outdated by 10 years, the license has expired, and would be extremely cost-and-time prohibitive to upgrade to the latest version * Routsim is not integrated into Logisuite or Oracle financials to take advantage of the databases for –real-time currency valuation and profit or loss projections * Managers buy whatever PCs they like and nothing is standardized * Different types of Office Software * Telecoms has not been updated in 15 years and is not integrated with customer service database to improve call management efficiency * The Service Provider for the telecom system is out of business and parts are not available for maintenance * Executives are connecting non approved devices to the network * WAN is outdated and is insufficient for the organization * The PBX is limited that only provides voice mail and call forwarding Solutions * Follow the lead of Standardization from the Brazil Site * Upgrade all the Unix servers to 11x and install appropriate patches * Look into other shipping programs such as Infor ERP and see if it would be more cost effective. ERP allows for growth because it supports large businesses as well. However, if that is not an option, then upgrade Logicsuite but to a......

Words: 794 - Pages: 4

Details Needed

...Please mention the following details regarding your SIP and send the same as an attachment along with your project file in .doc format. {Few prerequisites before filling up the below details: * Roll no. has to be mentioned in full : * Mail ID needs to be the full mail ID: * Title should not contain any quotation marks. Ex ‘,’ cannot be included in the title. * Summary should be of maximum 200 alphabets. * Student Name should be the complete Name of the Student with the Initial and the Surname. * ‘Mentor’ would be the name of the faculty mentor of the student. * Choose your Industry from the List of Industries mentioned below. If it doesn’t feature in the List, then mention it in BOLD RED. } The details needed are: 1. Roll No : 2. Specialization: 3. Mail Id: 4. Title : 5. Company: 6. Course: 7. Summary : 8. Industry : 9. Student: 10. Mentor: List of Industries: 1. Advertising 2. Aeronautics 3. Automobile 4. Aviation 5. Banking 6. Capital markets 7. Cement 8. Chemicals 9. Construction 10. Consulting 11. Consumer durables 12. Electrical Equipment 13. Energy 14. Export Import 15. Fertilizer 16. Footwear 17. Health Care 18. Hospitality 19. Industrial Gases 20. Insurance 21. Investment 22. I.T. 23. K.P.O. 24. Logistics 25. Manufacturing 26. Market Research 27. Media & entertainment 28. Mutual Fund 29. NBFC 30. NGO 31. Personal Care 32. Personal......

Words: 254 - Pages: 2

LeBron James | YTS Subtitles | Termini d'uso