Technical Data Controller Essay

810 words - 4 pages

N&H Investments Inc.

  March
 12,
 2012
 
  To:
 David
 Maybach,
 Director
 IT
 security
 
  From:
 Norman
 Haughton,
 IT
 Security
 Analyst
 
  Subject:
 Progress
 of
 the
 ‘’Web
 Security
 Two-­‐Factor
 access‘’
 Project
 at
 N&H
  Investments
 
  Dear
 Mr.
 Maybach,
 
  In
 keeping
 with
 our
 corporate
 objective
 of
 being
 Canada’s
 most
 secure
 financial
  institution,
 I
 must
 report
 that
 the
 progress
 of
 the
 “two-­‐factor”
 security
 access
  system
 is
 underway
 at
 a
 steady ...view middle of the document...

  In
 2008
 Phonebusters
 reported
 12,142
 claims
 on
 identity
 theft,
 which
 amounted
 to
  losses
 over
 $9.5
 million
 dollars
 in
 Canada
 (Stolen
 Identity,
 2009).
 With
 these
 facts,
 I
  support
 the
 initiative
 of
 increasing
 our
 web
 security
 measures,
 and
 will
 use
 all
 the
  resources
 available
 to
 achieve
 our
 target
 of
 implementation
 by
 the
 end
 of
 2012.
 
  I
 am
 currently
 completing
 impact
 studies
 on
 your
 hardware
 device
 proposed
 (token
  with
 changing
 codes
 every
 60
 seconds).
 I
 suggested
 a
 keychain
 type,
 due
 to
 the
  ergonomics
 and
 ease
 of
 use.
  I
 also
 formulated
 an
 idea
 for
 a
 new
 “two-­‐factor”
 software
 identification
 system,
 that
  asks
 for
 your
 login
 username
 and
 password
 but
 also
 tracks
 users’
 last
 transactions.
  The
 software
 will
 ask
 intuitive
 questions
 based
 on
 previous
 account
 activities
  during
 high-­‐risk
 transactions.
 
  The
 concepts
 were
 tendered
 for
 bidding
 and
 I
 authorized
 a
 budget
 for
 this
 project
  from
 our
 ‘’innovations”
 allotment
 for
 the
 financial
 year.
 On
 completion
 of
 the
  designs,
 the
 products
 will
 be
 tested
 by
 a
 focus
 group
 that
 will
 be
 providing
 us
 insight
  on
 the
 products
 and
 personal
 relevance
 of
 tighter
 security
 measures
 when
 using
  online
 banking
 tools.
 
 

N&H Investments Inc.

 
  Work
 completed:
 On
 February
 25,
 2012,
 I
 tendered
 a
 contract
 for
 bidders
 to
  propose
 designs
 for
 a
 keychain
 card
 with
 an
 electronic
 interface,
 which
 gives
 a
 pin-­‐ code
 that
 changes
 once
 every
 60
 seconds.
 
  On
 February
 27,
 2012
 I
 submitted
 a
 request
 to
 a
 local
 statistical
 company
 to
 gather
 a
  diverse
 “focus
 group.”
 The
 group
 will
 give
 insight
 on
 tighter
 security
 measures,
 and
  the
 ergonomics
 of
 a
 keychain
 card
 access
 code
 device.
  On
 February
 28,
 2012,
 I
 tendered
 a
 contract
 to
 5
 software
 developers.
 Details
 of
 the
  type
 of
 software
 system
 were
 proposed,
 and
 the
 contractors
 will
 make
 their
 pitches
  on
 March
 17,
 2012.
 They
...

Other Essays Like Technical Data Controller

The New Age of Motherboards Essay

1360 words - 6 pages temperature ranges more efficiently to reduce system noise by minimizing fan speed changes. Universal Serial Bus (USB) - Hi-Speed USB 2.0, provides greater enhancement in performance with a design data rate of up to 480 megabits per second (Mbps) with up to 14 USB 2.0 Ports. USB 2.0 rate matching hub - Enables lower power requirements and manages the transition of the communication data rate from the high speed of the host controller to the lower

Leverage Case Essay

1731 words - 7 pages multinational corporations. . Two friends started it in 1997 with just US$ 1000. From the beginning, the company had followed a conservative financing policy. For them loan was a synonym of headache. That’s why; despite advised by their financial controller never borrowed long-term loan for business operations though they had to lose out various business opportunities at times. The global telecom market landscape had changed remarkably in

IS4680 Final Exam Questions

975 words - 4 pages are types of this. Answer: Encapsulating protocols Question: RADIUS stands for this. Answer: Remote Authentication Dial In User Service Question: TACACS stands for this. Answer: Terminal Access Controller Access-Control System Question: These are the two types of patch management. Answer: OS and application Question: Having this type of site allows an organization to stay as current as possible with replicated data so switching

Controlling Black Smoke Emission

788 words - 4 pages CONTROLLING BLACK SMOKE EMISSION FROM PALM WASTE FIRED BOILERS IN PALM OIL MILL BY: FOREWORD It has been quite some years; this important topic was made as a compulsory project for all participants of the Diploma in Palm Oil Milling Technology and Management. A remarkable effort has been made by most of them to MPOB where huge technical data, information and practices were made known and presented and will definitely benefit

Cyber Vulnerabilities

1387 words - 6 pages discloses personal information. Typically, the ultimate goal of the attacker is to steal data from the targeted organization and also to install back doors access so attacker can return for further exploitation. Do not open any junk mail, open email messages in plain text preferably HTML or RTF, lower administrative rights while access web browsers and no opening attachment until properly scanned (www.sans.org) Office solutions software

Bluetooth

2563 words - 11 pages LUETOOTH TECHNOLOGY ABSTRACT Bluetooth technology unplugs our digital peripherals and makes a cable clutter a thing of the past. In short, it is a wireless replacement for many of the cables we currently use to transmit voice and data signals. It is the result of the joint achievements of nine leading companies: 3COM, Lucent Technologies, IBM, Intel, Microsoft, Motorola, Nokia, Toshiba, Ericsson, altogether known as the Blue Tooth Special

Bios and Post

1291 words - 6 pages , drive controller BIOS, network adapter BIOS, SCSI adapter BIOS, etc... These BIOS' are the lowest level of software in a computer providing a set of small programs or software routines that allow the hardware of a computer to interact with the operating system by a set standard. The Boot Process To get to the operating system, a computer must first boot from the BIOS.  The BIOS performs a number of tasks when a computer is started.  From

Software Engineering

1735 words - 7 pages presenting system information to system users. * The information may be presented directly (e.g. text in a word processor) or may be transformed in some way for presentation (e.g. in some graphical form). * The Model-View-Controller approach is a way of supporting multiple presentations of data. Model-View Controller INFORMATION PRESENTATION: * Static information * Initialised at the beginning of a session. It does not change

Marketing Communication and Promotion Strategies

1711 words - 7 pages Introduction To Computers Computer - is an electronic device, operating under the control of instruction stored in its own memory, that can accept data, process the data according to specified rules, produce result, and store the result for future use. Data & Information Data- is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Information- conveys meaning and is useful to people. Computer

Lnteligent Energy Controller

1228 words - 5 pages harvests solar electric output from your PV system that helps you to get quicker return on your investment and thereby accelerate system payback. Technical Data Sheet and Features of IEC, Super Energy Harvester l the power output of individual modules Maximize MITRAMAXTM also offers factory embedded IEC Super Energy Harvester add-on the most popular framed solar modules in aluminum frames for simple on-site array installation for your new

Aat Credit Control Legislation

3153 words - 13 pages Commissioner’s Office (ICO). • Entities holding personal information are required to have adequate security measures in place. Those include technical measures and organisational measures. • Subjects have the right to have factually incorrect information corrected • All data users and computer bureaux have to register with the Data Protection Registrar – the data user must then only hold data and use data for the purposes which are registered

Related Papers

Active Directory And Dns Design Essay

2525 words - 11 pages 2 VLAN2 Descrption Forest Root Domain Secondary Domain Controller with DNS Virtualization Stack Exchange 2010 Child domain with DNS Sharepoint Services Servers Monitoring Enterprise solution Patch Management and Software Distribution Child Domain with DNS configured DP for data access VLAN 3 VLAN 3 VLAN 3 Certificate Server DNS Namespace Local Local Local Global Virtual Description CLT.LOCAL GPR.CLT. LOCAL FINANCE.CLT. LOCAL CLT.com

Rendell Case Essay

3820 words - 16 pages technical points, his role was strictly that of a staff man. Most of the divisional controllers had worked for Rendell for 10 years or more. Usually they worked up through various positions in the controller organization, either at headquarters, in ttz Part I The Managernent Control Enuironment their division, or both. Two of the divisional controllers were in their early 30s, however, and had only a few years' experience in the

Humance Resource Essay

915 words - 4 pages been paid for extra work they had carried out. The reason why is Ann had been forget to providing the details of this extra work to the Finance Department. If Ann holding the information on computer, the finance manager would know the details as soon as possible. 3. To build a computerized personnel information system can make the data stored by classification to help data controller find the information he/she need. Ann had lost the notes

The Applications Of Ict Shopping Essay

1611 words - 7 pages such equipment, (c) Is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, or (d) Does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68; \"Data processor\", in relation to personal data, means any person (other than an employee of the data controller) who processes the data on behalf of the data controller; \"Data