Describe security measures needed to support the system

Assignment Help Computer Engineering
Reference no: EM133666447

Homework: Project Technology Hardware and Software Guidelines

Competency

In this project, you will demonstrate your mastery of the following competency:

Describe the technologies, hardware, and software used within the information technology field.

Scenario

You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly and is opening a new office. They are focused on hiring and retaining the best in the field, and they believe that one way to do this is to provide every employee with the appropriate tools and technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and network for the three employees in the new office. They would also like you to address the security needs of the various employees.

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

1) Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.

2) Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.

3) Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

1) Describe all hardware components, including peripherals, needed to create the systems

2) Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:

a) Operating systems
b) Applications such as:
c) Office automation products
d) Security products

3) Describe security measures needed to support this system. Security measures could focus on:

a) Access
b) Administration and user passwords
c) Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

Reference no: EM133666447

Questions Cloud

Ecological model focuses : Ecological model focuses on: Ecological model focuses on: a temporal progression that connects the various elements to the health outcomes
Emphasis on the historical interpretation of genesis : Consider the arguments and evidence presented in this course, why do you believe "the emphasis on the historical interpretation of Genesis, backed by textual.
Clinical orientation-clinical experience : Clinical Orientation-What did you learn from this week's clinical experience? What skills did you complete today?
What is the strongest scientific argument : Consider the arguments and evidence presented in this course, what do you believe is the strongest theological argument in favor of young-Earth creation?
Describe security measures needed to support the system : Describe all hardware components, including peripherals, needed to create the systems. Describe security measures needed to support this system.
Role of scripture within the christian community : Explain the Significance and Role of Scripture: Discuss how the week's readings illustrate the role of Scripture within the Christian community.
The intersection of cardiovascular health : The Intersection of Cardiovascular Health, Aging, and Physical Activity: Examine the relationship between aging, physical activity
What are the theological teachings of the book of mark : What are the theological teachings of the Book of Mark and what would be missing if it was not in the canon?
Types involves evaluation of the power of new test : Which of those types involves evaluation of the power of a new test to differentiate between patients who have vs patients who do not have a specific disease?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compute the result z and use polling to send the output

Compute the result Z and use polling (on the transmitter control and transmitter data) to send the output X+Y=Z to the display.

  How use of online transaction entry can increase efficiency

Explain how the use of online transaction entry (OLTE) can increase efficiency when using batch processing.- Explain the relationship between online real-time (OLRT) and immediate mode processing.

  Generate and show all power-of-two numbers

show an arbitrary user-input integer.generate and display all power-of-two numbers in the range +128 to -128.

  How to write a class template sortablevector

how to Write a class template SortableVector. The class should have a member function that sorts the vector elements in ascending order (your choice of the sorting method).

  Describe how cloud-based data storage works

Describe how cloud-based data storage works. Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce.

  Differentiate between the interaction types and styles

Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.

  What is the average latency time for disk

What is the disk transfer rate in bytes per second and what are the minimum and maximum latency times for this disk? What is the average latency time for this disk?

  Brief explanation of the computing concepts to be modeled

Create a 4- to 5-page report in a Microsoft Word document on your findings on the time complexity for a game you chose. Use the guidelines stated below for your report. Your report should include the following:

  Write the specifications for this function

Write a paragraph comparing the client function and the member function for the same task.

  What horizontal row the chip is sitting in

What horizontal row the chip is sitting in. The chip may move in any direction on the board: horizontally, vertically, or diagonally.

  How can you prevent the from happening

What can you do if this happens to you? How can you prevent this from happening? Summarize Are deleted files gone forever found above?

  Why each principle is important to security

Why each principle is important to security and how it enables the development of security mechanisms to implement desired security policies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd