Tag: server

Security Concerns of a Collaboration System

[Abstract] The purpose of this document is to analyze the collaboration system that is to be migrated into the Kucera Clothier‚Äôs company and identify security concerns with the system, as well as, identify methods to minimize the risk of an incident of unauthorized access to company information. This document is intended for anybody looking to …

Continue reading

Project “Phasing In”

[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …

Continue reading

Scenario Proposal of a Server Cluster

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

Proposed Server Cluster for Scenario Business

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

“Phase In” Equipment into Business Operations

[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Hardening OS X

[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple‚Äôs operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] ‚ÄúEvery Mac is secure ‚Äî right out of the box …

Continue reading

Network Testing Programs

[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …

Continue reading

Network Design Scenario

                                                                                            [Scenario] Schaumburg Elementary is a four-year-old, single-level building with …

Continue reading

Information System Controls

[Abstract] The purpose of this document is intended to look at a course registration system within a university and argue which controls should be inputted into that system to ensure the system is not being abused. Also included within this document is an argument for which controls should be put into place to ensure students …

Continue reading