Sunshine machine works has expanded its infrastructure

Assignment Help Basic Computer Science
Reference no: EM13700352

Write a paper consisting of 1300 words (double spaced).

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy suggestions, finalize the policy and it will be provided to the employees.

Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems.

Scenario: Sunshine Machine Works has expanded its infrastructure. When they started there were just three computers, and ten employees. Now there are over 100 employees and their network will have fifty computer terminals, with two servers. During the expansion there has been a lot of discussion about the need for a written computer use policy.

Role: You are the IT Services manager for Sunshine Machine Works. This company has seen rapid growth. Management is looking to you to provide a critical input for an Information Systems Use Security Policy. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy.

Background: When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we need to centralize our file storage. I am concerned that if we are not careful, some proprietary information could be compromised. We need a good information systems use policy in place. Keep in mind that I am also looking at expanding our business into some oil field work and the standards we will be required to comply with dictate that we have a written policy in place. There are a lot of spreadsheets which have our account information on them. There is restricted access so that the only ones to access those files are the CEO, the General Manager, and me. No other employees have access to most of them. When they need access to financial data, I am contacted and provide them with the feedback they request. I hope that we are able to keep this system running efficiently and any policy helps enhance the safeguarding of our financial data. I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales outreach. I need to have our staff utilize our computing resources with maximum efficiency; however, I want to balance this with the realization our staff may need to check their personal email accounts, bank information, etc. As our file server has arrived and all file storage has been centralized, we need to look at how we secure our network while keeping productivity up.

Reference no: EM13700352

Questions Cloud

What is the final pressure of the gas : Expand 1.025 mole of an ideal monatomic gas initially at 5.47 kPa and 642 K from initial volume Vi = 1.00 m3 to final volume Vf = 2.00 m3. What is the final pressure of the gas
Estimate the voltage across the resistor : A current of 2.00 A flows through a resistor that has R = 4.84 ohm. What is the voltage across the resistor
Spanning forest is a subset of a graph : a) Assume Ce in Z. Give an algorithm that finds the MSF (minimum spanning forest), show correctness and running time of this algorithm.
Find the entropy change of the aluminum : In an experiment, 230 g of aluminum (with a specific heat of 900 J/kg • K) at 100°C is mixed with 48.0 g of water (4186 J/kg•K) at 20°C, What is the entropy change of the aluminum
Sunshine machine works has expanded its infrastructure : Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy..
Determine how far a car travels : Determine how far a car travels in three seconds in the positive direction of x if its initial velocity is (2i) m/s and its acceleration is (4i + 3j) m/s2
Given a set p of n points on the plane : Given a set P of n points on the plane, consider the problem of finding the smallest circle containing all the points in P. Show that the following is a 2-factor approximation algorithm for this problem. Pick a point x ∈ P, and set r to be the ..
Security threats and vulnerabilities of the itrust database : The length of this paper should be 5-7 pages double spaced not inclusive of the title or reference pages and include all completed Tables as appendices. Prepare your report in either Word or PDF format, as your instructor requires, and post it ..
Determine the horizontal distance traveled by the object : An object is thrown horizontally with a speed of 10.0 m/s from a balloon at an elevation of 20.0m. Determine the horizontal distance traveled by the object

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Solve the following problems using linearity of expectation.

Solve the following problems using linearity of expectation. . (For each problem you will want to think about what the appropriate random variables should be and define them explicitly.)

  Transferring of videos and music files between computers

Transferring of videos and music files between computers

  Important considerations in the design of performance

What are some of the important considerations in the design of performance benchmarks for mobile devices? Why?

  Annotated bibliography

Annotated Bibliography

  Bob is stationed as a spy in cyberia for a week

Bob is stationed as a spy in Cyberia for a week and wants to prove everyday of this week that he is alive and has not been captured. He has chosen a secret random

  Determine the number of students having scores

Write a program that reads a file ("scores.txt") consisting of students' test scores in the range of 0-200. These scores should be loaded into a one-dimensional array. Then the program should determine the number of students having scores in each ..

  Describe binary tree traversals

Describe binary tree traversals (inorder, postorder, preorder and level-order). Give examples of applications of these traversals.

  What is the output from the following c++ code fragment

What is the output from the following C++ code fragment

  Illustrate how to overload the operators

Use the class rectangletype to illustrate how to overload the operators

  Addresses design issues and evaluation issues

A new design for an interactive device or some software application. It will provide the student with an overall look at the entire lifecycle of design from an HCI perspective. Feel free to incorporate techniques and references from the readings o..

  T & corporate transformation course assignment

T & Corporate transformation course assignment:

  A calculator application that allows prefix, infix and postf

A calculator application that allows prefix, infix, and postfix expressions to be evaluated (i.e., allows all 3 types of expressions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd