It530 - Unit 2 - Access Technologies

In: Computers and Technology

Submitted By saurontallous
Words 2682
Pages 11
Unit 2 Assignment - Access Technologies

Kaplan University



Access technologies are technologies used by customers to access the Internet. Access technologies include but are not limited to DSL, Cable, and Satellite Internet services. Each of these are widely used in rural and city residential settings. Each technology has its advantages as well as disadvantages; some of which include cost, data download speeds, upload speeds, and availability. To determine which access technology is best a person must research each option and decide based not only on cost but also on need.

The Internet

Over the last decade or so the Internet has gone from a luxury to a common household item. According to Internet World Stats (2011), between the years 2000 and 2010 the number of Internet users in the U.S. nearly doubled from 124,000,000 user to 239,893,600 users.

This is likely due, in part, to the numerous types of Internet services or access technologies being made available to users in all areas. Three of the most popular access technologies are: DSL, Cable, and Satellite. Each of these access technologies provides Internet service, via an Internet Service Provider (ISP), to urban and suburban residential communities.

Each of these access technologies has advantages as well as disadvantages over the other. Determining the best access technology may take a bit of research and consideration. Some considerations include accessibility, cost, need, and upload/download speeds. When considering accessibility one must understand that not all technologies are available in all areas. When considering cost, not all technologies offer the same types of plans for the same prices. When considering need, one must determine what type of use the access will be used for. As far as…...

Similar Documents

Unit 3 It255 Access Control

...1. RAS server provides the most secure method for remote access to the network if it is reburied. 2. Never allow client computers on the network to answer remote access connections. 3. Organize all remote access servers in a centrally controlled location. 4. Servers have no need to originate dial-out connections (Except when using telephone lines as low cost WAN connections, but these connections should be relatively permanent). 5. To simplify security administration, allow only one method of remote access into the network. 6. Remote access control procedures must provide adequate safeguards through robust identification, authentication and encryption techniques. 7. Carefully consider the wisdom of providing cellular telephones and modems for use with laptop computers. This technology isn’t usually justified considering the relatively modest increase in productivity compared to the cost and the security risk of a lost laptop. 8. Consider using only the NetBEUI protocol for remote access to limit the extent of intrusions on the network. 9. Control the distribution of remote access software on the network. Never allow client computers to run remote control software. If remote control software is necessary, run the software from centrally controlled computers or thin-client servers. 10. Disable dial-in networking, except in the cases of trusted individuals or to special computers,because dial-in networking can bypass regular network security. ...

Words: 609 - Pages: 3

It530 - Unit 3 Frame Relay in a Wan

...Abstract This paper will give an overview of a medium-sized business that will need to consider WAN technology using Frame relay technology within the company for the future expansion to other towns and cities. The Frame relay analysis will include the operation of frame relay, what equipment is needed, what switching technologies are employed by frame relay and how frame relay is actually brought into the business premises. Frame Relay in a WAN Frame Relay Frame Relay is one of the most common WAN protocols. This high performance protocol operates at the Physical and Data Link layers of the OSI, performing any type of serial interface. This technology was developed at an attempt to resolve some of the communication problems that the other protocols would not. There was an increased need for higher speeds, an increased need for larger bandwidth efficiency, an increase in intelligent network devices that lower protocol processing, and the need to connect LANs and WANs. The Frame relay evolved passed the X.25 as a less careful, but less burdensome protocol designed to transmit packets across a network. (Horton, 2010) Frame relay is known all around the world in many different networks. There are many terms that describe and refer to Frame relay and Wide Area Networking in telecommunications. These terms are also noted when referring to Local Area Networking as well. The table below describes these terms. (Horton, 2010) Table 1 – Frame Relay Terms CIR......

Words: 1228 - Pages: 5

Access Security Unit 10

... | Final Project | IS3230 Wk10 | | ICT Development Index (IDI) | | Javier Feliciano Fady Girgius Christopher Penney Michael McClinton | 11/26/2012 | | The ICT Development Index (IDI) The Information and Communication Technology (ICT) Development Index or IDI is a composite index combining 11 indicator into one benchmarks measure that serves to monitor and compare developments in ICT across many countries. Developed in the year 2008 by ITU was presented in the 2009 edition of Measuring the Information Society (ITU, 2009) and established in response to the request to develop a regularly published single index. The IDI is divided in to the following 3 components (indicators): 1. Access – this component defines readiness, and includes five infrastructure and access indicators (fixed-telephony, mobile telephony, international Internet bandwidth, households with computers, and households with Internet). 2. Use – this component captures ICT intensity and includes 3 ICT intensity and usage indicators (Internet users, fixed broadband, and mobile broadband). 3. Skills – this component the capability or skills as indispensable input indicators. It includes 3 proxy indicators ( adult literacy, gross secondary enrollment and gross tertiary enrolment). The Main Objectives of the IDI The main objective of the IDI is to measure: * The level and evolution over time of ICT developments in countries and relative to other countries. ...

Words: 413 - Pages: 2

It530 Assignment Unit 1

... Running Head: DOMAIN NAME SERVERS AND INTERNET PROROCOL Domain Name Servers and Internet Protocol Awaz Barwari Kaplan University Abstract Domain Name System (DNS) is central to the Internet and networking. It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like into a raw IP address number DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net,......

Words: 1390 - Pages: 6

Unit 2 Assign 2

...Unit 2 Assignment 2: Microsoft Environment Analysis Vulnerabilities: * “Cross-site request forgery (CSRF) vulnerability in the Services module 6.x-3.x and 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors”. * “SQL injection vulnerability in the Backend History module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to execute arbitrary SQL commands via unspecified vectors”. * “The HP StoreOnce D2D backup system with software before 3.0.0 has a default password of badg3r5 for the HPSupport account, which allows remote attackers to obtain administrative access and delete data via an SSH session.” * “The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.” * Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.” Elevation/Priority: * The priority level is medium, also should be seen to when possible. Priority Level =......

Words: 565 - Pages: 3

Unit 2 Assignment 2: New Technology in My Field

...such as make phone calls, send text massages, and navigate on web, it has to be connected to a cellular phone via Google Glass app. “But can it become a business?” (Simonite, 2013) Many people are afraid of technological progress and are very negative towards the future technology. In the article “Who’s Afraid Of Google Glass?” (Businessweek, 2013) it talks about invading people’s privacy. “One concern is that recording other people will probably get easier.” (Businessweek, 2013) Due to privacy issue a lot of places are banning such devices to be used in their facilities. Such facilities include: bars, casinos, strip clubs and court houses. All data that is being searched, pictures and videos are being generated will be stores on Google’s cloud servers. “Surely hackers will be interested in that too. So will marketers.” (Businessweek, 2013) Google is looking into security not only convenience for people so therefore there will be curtain security and privacy regulations. Google Glass is becoming next step to a new way of living. Imagine what can a computer that is 100 percent hands free can help an individual who’s disabled. “Google Inc. touting Glass as a liberating breakthrough that will make technology more convenient and less obnoxious in social situations than checking a smart phone to see what’s happening in your digital realm.” (Liedke, 2013) People that do outdoor activities such as biking, skateboarding, parachuting, Google Glass will be a great tool to capture......

Words: 308 - Pages: 2

Unit 3. Access Controls

...NT2580 Unit 3 Access Controls 01/22/2014 1. For the construction company scenario the data would probably consist of customer contact information, accounting, and inventory. For administrative controls I would administer a password policy. For the logical/technical controls I would have passwords checked and enforced. For the software controls I would make sure that updates are checked regularly. 2. For the advertising company scenario the data would probably consist of customer contact information, accounting, and inventory. For administrative controls I would administer a password policy. For the logical/technical controls I would have passwords checked and enforced. For the software controls I would make sure that updates are checked regularly. 3. For NetSecIT, I would implement all access controls on this organization because of the size of the company and the remote access. For administrative controls I would administer a password policy. For the logical/technical controls I would have passwords checked and enforced. For the software controls I would make sure that updates are checked regularly. For the hardware controls I would utilize MAC filtering and smart card use. For the physical I would utilize security guards and ID badges. 4. For Backordered Parts, I would implement all access controls for this organization because it is a defense contractor that builds communications parts for the military. For administrative controls I would administer......

Words: 362 - Pages: 2

Unit 2

...Diploma in Business (Management) 2 Qualification Title Edexcel BTEC Level 5 HND Diploma in Business (Management) Qualification Number 500/8239/5 Guided Learning Hours 960 Learning Time 2400 Qualification Credit Value 240 minimum Edexcel BTEC Level 5 HND Diploma in Business (Management) The Edexcel BTEC Level 5 HND provides greater breadth and specialisation than the Edexcel BTEC Level 4 HNC. Edexcel BTEC HNDs are mode free but are followed predominately by full-time learners. They allow progression into or within employment in the business sector, either directly on achievement of the award or following further study to degree level. Progression Opportunities Learners studying the Edexcel BTEC Level 5 HND will be able to progress to a degree in business or one of its specialist areas. The qualification also prepares learners for employment in the business sector. Some learners may wish to use this qualification in order to enter a specialist area of employment in the sector, where learners may work towards professional membership or study for professional body examinations. Structure of the Edexcel BTEC Level 5 HND Diploma in Business (Management) Year 1 Unit number Units 1 Business Environment 2 Managing Financial Resources and Decisions 3 Organisations and Behaviour 4 Marketing Principles 5 Aspects of Contract and Negligence for Business 6 Business Decision Making 7 Business Strategy 47 Employability Skills Year 2 Unit number Units 30 Internet Marketing 32 Quality......

Words: 16547 - Pages: 67

Unit 2

...Antonio Wilson Unit 2 Assignment MT140: Introduction to Management Kaplan University In this paper and assignment the four contemporary approaches to management will be explained. And the definition of open systems and the outline of internal, competitive, and macro environments of an organization. The contemporary approaches to management are sociotechnical system theory, quantitative management, organizational behavior, and systems theory. Sociotechnical system theory is a theory of management that believes technology merely constrains human action instead of rigidly determining behavioral outcomes. This can build good human relations into the technology workflow. Quantitative management relies on solely technology. The quantitative management approach involves the use of math modeling to find the right solutions to problems. Applied to workplace challenges, going from making decisions during product development to fix employee conflicts. Organizational behavior is like sociotechnical system theory when the focus is on people rather than technology. Organizational behavior is the study and knowledge of how people act in organizations. The goal is to build better relationships by achieving human objectives, organizational objectives, and social objectives. Similar the system theory does not look at individuals but the flow of business as a whole. It focuses on subdivisions within the organization and how it ties in with the big picture, the business. An......

Words: 430 - Pages: 2

Unit 2 Assignment 2: New Technology in My Field

...Unit 2 Assignment 2 09/30/2014 Cold plasma therapy is the process of using room temperature ionized gas to treat cancer. Normally generated at high temperatures recent advancements have led to progress of atmospheric plasma. This advancement has been said to have the ability to completely remove cancer and tumors. Also a great advantage of cold plasma therapy is that it eradicates all cancer cells while not damaging normal cells. This treatment opens many doors and possibilities enabling better overall treatment. The method of cold atmospheric plasma has been researched to kill many pathogenic bacteria. This helps to treat wounds in patients who aren’t able to fight off bacteria themselves. This new medical treatment has been seen as a safe and efficient way to treat patients with chronic wounds. The treatment is both safe and painless while decreasing bacteria. The help of clearing all bad bacteria using cold plasma therapy helps the body successfully heal itself. The cold plasma therapy is used using two methods in-vitro and in-vivo. The method of in-vitro is the one that allows all bad cells to eradicated. The method of in-vivo is used to effectively reduce the size of tumors. This treatment has shown promising signs and potential to shift the way cancer is approached and thought to be treated. Using other methods of matter to treat cancer may be the way the future of medicine is going. APA (American Psychological Assoc.) References Keidar, M., Walk, R.,......

Words: 286 - Pages: 2

Unit 2

...Eboni Clark Unit 2 Individual Project Metaphysics is defined as the study of the true nature of reality. When it comes to considering what is real when referring to metaphysics time has to be one of the biggest factors. This is including everything that we have already experienced, our emotions and ideas, all the way down to our dreams and hallucinations is what we consider to be reality. The physical world and the spiritual world are just as real as one is to the other. For one, they both are considers worlds but are just defined as two different types of world. I do believe that there is such thing as souls and souls surviving with and even without a human body. Life is predetermined already by faith from the time the person is conceived. Little do we realize it but everything is known by prior experiences. The basic knowledge is experience. Everything we know now is here and being taught because someone in the past had to go through the experiences and learn from it and then from there taught what they had learned. The lessons have simply just been passed down over the years. I do believe that with knowledge there is universal truth to it. The relationship between faith and reason go hand and hand. With those two things a person can truly find out the truth. Artificial intelligence can actually teach people a lot about knowledge from what they do know to what they don’t know.......

Words: 929 - Pages: 4

Unit 3 Access Control

...Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business. Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads. Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage. Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles. Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for......

Words: 288 - Pages: 2

Access Security Week 2 protections and access authorization mechanisms appropriate for that data. Such categorization encourages the discussion and subsequent full understanding of the nature of the data being displayed or manipulated. Data is classified as one of the following: Public (low level of sensitivity) Access to “Public” institutional data may be granted to any requester. Public data is not considered confidential. Examples of Public data include published directory information and academic course descriptions. The integrity of Public data must be protected, and the appropriate owner must authorize replication of the data. Even when data is considered Public, it cannot be released (copied or replicated) without appropriate approvals. Sensitive (moderate level of sensitivity) Access to “Sensitive” data must be requested from, and authorized by, the Data Owner who is responsible for the data. Data may be accessed by persons as part of their job responsibilities. The integrity of this data is of primary importance, and the confidentiality of this data must be protected. Examples of Sensitive data include purchasing data, financial transactions that do not include restricted data, information covered by non-disclosure agreements and Library transactions. Restricted (highest level of sensitivity) Access to “Restricted” data must be controlled from creation to destruction, and will be granted only to those persons affiliated with the College who require such access in order to......

Words: 800 - Pages: 4

Unit 2 Quality? ● Quality Management System ● Quality Tools ● TQM and QMS ● The Focus of Quality Management-Customers ● The Role of Employees in Quality Improvement ● Quality in Services ● Six Sigma ● The Cost of Quality ● The Effect of Quality Management on Productivity ● Quality Awards ● ISO 9000 2 Problems • Internet Exercises • Online Practice Quizzes • Lecture Slides in PowerPoint • Virtual Tours • Company and Resource Weblinks Quality Management at GREEN MOUNTAIN COFFEE ike wine, coffee quality is judged on attributes like fragrance, aroma, acidity, body, flavor, balance, and finish. Coffee professionals use words like “lush,” “complex,” and “fruity” to describe their evaluations, which are based on precise sensory criteria. Coffee Review, one of the most respected and widely read coffee publications in the world, rates coffees based on a 100-point scale, similar to the one used in the wine industry. Coffee connoisseurs seek out coffees awarded a rating of 80 or above. Each year GREEN MOUNTAIN submits coffee to Coffee Review for independent reviews. On average, Green Mountain L Copyright © 2007 John Wiley & Sons Chapter 2 • Quality Management 53 coffees scored 88.8 points—significantly higher than their better-known west coast and European competitors—and many of their coffees score above 90! Great reviews only reinforce Green Mountain’s commitment to quality and doing things the right way. They buy some of......

Words: 31668 - Pages: 127

Remote Network Access Technology

...WHAT IS REMOTE NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS ) Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines. These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office. VPN REMOTE ACCESS TECHNOLOGY VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network. A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main......

Words: 1041 - Pages: 5