Reference no: EM132139125
Discussion
Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Clear and specific policies coupled with technology can secure your network. There must be a balance between tight security and the ability of users to have access to resources to perform their job duties.
Discuss each of the following scenarios:
Imagine you are an information technology (IT) manager at the organization that you chose for your project. List as many different kinds of users as you can think of who would need access to the organization's servers to perform their jobs. What permissions would you give each type of worker and why?
Suppose a worker in your organization frequently forgets his or her password, attempts to use obvious passwords, reuses old passwords, and sometimes gets locked out of the system for failed log-in attempts.
How would you deal with such a user? What organizational policies should be in place for handling user behaviors of this kind?
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
What did you learn from your classmate's posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates' postings?
List two strategies for consulting stakeholders
: List two strategies for consulting stakeholders about the vision and mission of the organization.
|
What amount did jozy withdraw
: At the end of the 12 years, Jozy withdrew the accumulated amount of money. What amount did Jozy withdraw, assuming the investment earns simple interest
|
Research an application of graph theory in the real world
: Research an application of Graph Theory in the real world. Find an article that describes how Graph theory is used, and what parts of Graph Theory are used.
|
What barrier do organizations hope to overcome
: As organizations build inclusion efforts to drive diversity (e.g., pluralism, structural integration, informal network integration, absence of prejudice
|
What permissions would you give each type of worker and why
: How would you deal with such a user? What organizational policies should be in place for handling user behaviors of this kind?
|
Discuss about the counselor knowledge of the abuse cycle
: Assuming there was abuse occurring prior to the death of Yeardley Love, hypothesize how it may have been difficult for a counselor to assess and identify.
|
What value to your future career in business is supported
: What value to your future career in business is supported by research, analysis and communication (writing and speaking)?
|
What amount should messi company pay for this investment
: Messi Company is considering an investment that will return a lump sum of $900,000, What amount should Messi Company pay for this investment
|
Different environments within an organization
: With respect to the different environments within an organization (certain, risk, or uncertain), why is it best for an organization to support both systematic
|