Explore BrainMass

Operating Systems

Levels of Risk Associated with Specific Threats

In your new position at XYZ Corporation, you have been asked to lead a risk assessment team. As part of your project to assess security risks for the computing infrastructure, you have found that other managers often have different ideas on the severity and levels of risk associated with specific threats and you only have a week

Security Manager: Questions Asked to Determine Access Needs

As the security manager for XYZ Corporation, you are asked to determine the amount of access that a new user needs. You contact the user and ask them to help you understand what kind of access they need. What would the top 4 questions that you would ask them be? What other questions would you ask? Can you think of any other ways

Differences between information, computer and network security.

What are the differences between information security, computer security, and network security? Do you feel that the boundaries between these areas are clearly defined, or are those blurred? Why? Are any of these disciplines more technical than the others? Why or why not?

info Systems

Compare Bluetooth, Wi-Fi and WiMax. What are their capabilities? For what types of applications is each best suited?

Job Description of a Network Administer

Write a job description of the role and responsibilities of a network administer. Create a detailed list of the personal traits and skills necessary for a person to be a highly effective network administrator. Make the description and list as detailed and complete as possible.

Importance of a business continuity plan

Business continuity planning is important for businesses, large and small. Briefly discuss the importance of a business continuity plan under the following heads. (a) Discuss about business continuity needs for eCommerce organizations vs. retail organizations. (b) Discuss about resources that security personnel can leverage

The Benefits of Workgroups

Case Study: Executives from another IT consulting business are visiting for the day and are interested in your network setup. They are curious about what measures you have in place to keep users from accessing areas of the network they should not be accessing. 1. Using language they can understand, explain to the executive

Accessing a UNIX file from Windows

Can a Windows computer access files on a UNIX machine (e.g. be able to open the file from Windows Explorer)? Please explain why and/or how.

Software Architecture Benefits of Use

The traditional software development process changes profoundly when software architecture is its technical foundation. Consider issues such as the experience needed to successfully exploit an architecture, productivity gains, potential to overlook novel solutions, advantages for evolving product families, and architectural degr

Hardware, Software and Staff-Training

As was stated before, the company X is going to expand its information system. To do this, it is going to select and purchase new hardware and software and retrain employees. The problem-solving team has been established and has specified hardware, software and staff-training needs. Let us now presume that the new organizational

Affiliate Programs and How They Work

More companies are using affiliate programs to drive traffic to their Web sites. In a 2-3 page paper, describe what an affiliate program is and how it works. In your paper, discuss the advantages and disadvantages of using an affiliate program and give at least three examples of successful affiliate programs.

Organizational Security

Describe the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, etc.) and eCommerce (internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recomme

Opening a file: Automatic or Traditional Method

Some systems automatically open a file when it is referenced for the first time and close the file when the job terminates. Discuss the advantages and disadvantages of this scheme compared with the more traditional one, where the user has to open and close the file explicitly.

Firewalls and Border Security

Why is it important for a company to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when I read on it seems border security is very similar. I really don't understand the true reason why a company should have both in place. What is the difference from a

Introduction to Operating System Interfaces

Would you help me to get started on the following assignment? You are getting more and more of your home computing environment figured out, and now you will take a bigger step toward the goal of telecommuting. During the course of your work, you will be sharing files with many of your coworkers. For this project, you will co

Introduction: Operating System Interfaces

Would you be able to help me with the following assignment? Pick one of the programs that comes with Vista in which you think your classmates would be interested. What does the program do? How do you use the program? Suggested programs of interest would be those found in the Accessories or Control Panel.

Introduction to Computer Operating System - Interfaces

Can you help me with this assignment: You have a good start on setting up your home computing environment, and you are ready for the next step. Almost all businesses use the Internet for many activities, and remote workers must communicate with their coworkers effectively. One method of good communication is instant messaging

Professional Issues in Computing

Would you help me to get started with the following assignment? One of the challenges in dealing with cybercrime is the collection of forensic evidence. In this assignment, you will address this challenge by looking at the process of gathering forensic evidence. In preparing your paper, please make sure you answer the fol

Professional Issues in Computing: Ethical Hacking

"White Hat Cracking" involves security testing by arrangement. "Grey Hat Cracking" seeks to identify insecure systems and inform administrators/users of vulnerabilities. "Black Hat Cracking" involves accessing systems. Counterattacks on phishing servers, spam sources, and malware distributors are held up as "ethical cr

Radio frequency ID (RFID) Chips

Explain the uses and advantages of radio frequency ID (RFID) chips into products such as clothing and appliances. Mention likely privacy objections and refute them.

Capabilities of computing made possible or enhanced by computing technology

The creation and use of computing technology enables new capabilities. For example, information and decision rules can be captured and copied more easily; individuals can be monitored, tracked, and evaluated at increasingly short intervals and at finer levels of detail. Thus, new computing capabilities strain our current norms,

Components of network management software

Briefly describe the network management software components and explain the elements and capabilities of a fault, configuration, accounting, performance, and security server. Please provide something more than the normal out of the book definition, with source information where I can do additional research.