Sunshine machine works has expanded its infrastructure

Assignment Help Basic Computer Science
Reference no: EM13700352

Write a paper consisting of 1300 words (double spaced).

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy suggestions, finalize the policy and it will be provided to the employees.

Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems.

Scenario: Sunshine Machine Works has expanded its infrastructure. When they started there were just three computers, and ten employees. Now there are over 100 employees and their network will have fifty computer terminals, with two servers. During the expansion there has been a lot of discussion about the need for a written computer use policy.

Role: You are the IT Services manager for Sunshine Machine Works. This company has seen rapid growth. Management is looking to you to provide a critical input for an Information Systems Use Security Policy. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy.

Background: When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we need to centralize our file storage. I am concerned that if we are not careful, some proprietary information could be compromised. We need a good information systems use policy in place. Keep in mind that I am also looking at expanding our business into some oil field work and the standards we will be required to comply with dictate that we have a written policy in place. There are a lot of spreadsheets which have our account information on them. There is restricted access so that the only ones to access those files are the CEO, the General Manager, and me. No other employees have access to most of them. When they need access to financial data, I am contacted and provide them with the feedback they request. I hope that we are able to keep this system running efficiently and any policy helps enhance the safeguarding of our financial data. I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales outreach. I need to have our staff utilize our computing resources with maximum efficiency; however, I want to balance this with the realization our staff may need to check their personal email accounts, bank information, etc. As our file server has arrived and all file storage has been centralized, we need to look at how we secure our network while keeping productivity up.

Reference no: EM13700352

Questions Cloud

What is the final pressure of the gas : Expand 1.025 mole of an ideal monatomic gas initially at 5.47 kPa and 642 K from initial volume Vi = 1.00 m3 to final volume Vf = 2.00 m3. What is the final pressure of the gas
Estimate the voltage across the resistor : A current of 2.00 A flows through a resistor that has R = 4.84 ohm. What is the voltage across the resistor
Spanning forest is a subset of a graph : a) Assume Ce in Z. Give an algorithm that finds the MSF (minimum spanning forest), show correctness and running time of this algorithm.
Find the entropy change of the aluminum : In an experiment, 230 g of aluminum (with a specific heat of 900 J/kg • K) at 100°C is mixed with 48.0 g of water (4186 J/kg•K) at 20°C, What is the entropy change of the aluminum
Sunshine machine works has expanded its infrastructure : Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy..
Determine how far a car travels : Determine how far a car travels in three seconds in the positive direction of x if its initial velocity is (2i) m/s and its acceleration is (4i + 3j) m/s2
Given a set p of n points on the plane : Given a set P of n points on the plane, consider the problem of finding the smallest circle containing all the points in P. Show that the following is a 2-factor approximation algorithm for this problem. Pick a point x ∈ P, and set r to be the ..
Security threats and vulnerabilities of the itrust database : The length of this paper should be 5-7 pages double spaced not inclusive of the title or reference pages and include all completed Tables as appendices. Prepare your report in either Word or PDF format, as your instructor requires, and post it ..
Determine the horizontal distance traveled by the object : An object is thrown horizontally with a speed of 10.0 m/s from a balloon at an elevation of 20.0m. Determine the horizontal distance traveled by the object

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd