Describe security measures needed to support the system

Assignment Help Computer Engineering
Reference no: EM133666447

Homework: Project Technology Hardware and Software Guidelines

Competency

In this project, you will demonstrate your mastery of the following competency:

Describe the technologies, hardware, and software used within the information technology field.

Scenario

You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly and is opening a new office. They are focused on hiring and retaining the best in the field, and they believe that one way to do this is to provide every employee with the appropriate tools and technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and network for the three employees in the new office. They would also like you to address the security needs of the various employees.

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

1) Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.

2) Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.

3) Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

1) Describe all hardware components, including peripherals, needed to create the systems

2) Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:

a) Operating systems
b) Applications such as:
c) Office automation products
d) Security products

3) Describe security measures needed to support this system. Security measures could focus on:

a) Access
b) Administration and user passwords
c) Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

Reference no: EM133666447

Questions Cloud

Ecological model focuses : Ecological model focuses on: Ecological model focuses on: a temporal progression that connects the various elements to the health outcomes
Emphasis on the historical interpretation of genesis : Consider the arguments and evidence presented in this course, why do you believe "the emphasis on the historical interpretation of Genesis, backed by textual.
Clinical orientation-clinical experience : Clinical Orientation-What did you learn from this week's clinical experience? What skills did you complete today?
What is the strongest scientific argument : Consider the arguments and evidence presented in this course, what do you believe is the strongest theological argument in favor of young-Earth creation?
Describe security measures needed to support the system : Describe all hardware components, including peripherals, needed to create the systems. Describe security measures needed to support this system.
Role of scripture within the christian community : Explain the Significance and Role of Scripture: Discuss how the week's readings illustrate the role of Scripture within the Christian community.
The intersection of cardiovascular health : The Intersection of Cardiovascular Health, Aging, and Physical Activity: Examine the relationship between aging, physical activity
What are the theological teachings of the book of mark : What are the theological teachings of the Book of Mark and what would be missing if it was not in the canon?
Types involves evaluation of the power of new test : Which of those types involves evaluation of the power of a new test to differentiate between patients who have vs patients who do not have a specific disease?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd