This website uses cookies to ensure you have the best experience. Learn more

Network Engineer Essay

301 words - 2 pages

For starters, companies need to protect the data that they receive from their customers and also their own. Companies must set policy’s to have a set of guidelines to follow by in order to keep procedures straight and also for the employees to follow. Also companies need to have and abide by intellectual property.
After my risk assessment user passwords are not part of the intellectual property laws. Now for server patches licensing would have to be valid for any of our ...view middle of the document...

So customers hosting their information with us stays on their system and not copied to or given to another customer for cash. All technicians have been certified in each of the major vendors such as Microsoft, Cisco, Sonic Wall, and VMware.
In our datacenter we have to keep all customers data safe and not able to fall in the wrong hands because my company could get sued for not having the proper security for their systems. All of the customers equipment is locked up separated and segregated from our internal network. We hire a third party to do security audit to help keep up with the security precautions.

IT Asset Description | Seven Domains of Typical IT | Privacy Data Impact | Assessment[Critical-Major-Minor] |
User Passwords | Workstation Domain | User and company Data | Major |
Server patches an security | Lan domain | Company data | Major |
Cisco ASA (Old users and ACL on our Ip lists.) | Lan to WAN domain | Company | Major |
Remote users security | Remote access domain | User/ Company data | Major |
Webserver (Updates and services not needed) | System/application Domain | Company | Minor |
RDP Servers Security | System/application Domain | Company | Major |
IT security to Datacenter | User domain | Company | Major |
HIPAA compliance | User domain | Company / Customer Data | Critical |

Other assignments on Network Engineer

Cis 175 Assignment 1

2878 words - 12 pages -15,000. A company that small can have 2-4 people in their IT department: a network engineer, a software ingineer and an IT manager- maybe one person for enduser support. All of which could be outsourced and handled by a third party. With peer-to-peer, because of the software and applications are individualized and not in a central location there would be a need to have personnel for enduser support and management. The worry is spread out rather

Huba Essay

946 words - 4 pages later merged with Fujitsu-Siemens AG. Nokia also began developing mobile phones for the NMT network;unfortunately, the company ran afoul of serious financial problems in the1990s and streamlined its manufacturing of mobile phones, mobile phoneinfrastructure, and other telecommunications areas, divesting itself of other items, such as televisions and personal computers.In 2004, Nokia resorted to similar streamlining practices with layoffs

Emerging It Technologies

747 words - 3 pages to Apple’s server so users can have their commands translated. This still has a lot of potential. J.A.R.V.I.S is Tony Stark’s automated voice recognition assistant in the Iron Man movies. It is awesome to have. Appe’s iOS 6 has new features for Siri and it can open apps now. I can really imagine the benefit of this one if implemented in my work to automate most tasks. I am a network engineer and I perform everyday tasks to keep our business

Paper

5421 words - 22 pages slaves acknowledges/reacts. Can be used to connect multiple devices using just two lines. Addressing is software driven. Explain Cloud Technology: Cloud technology can be defined as delivery of IT resources and services using the underlying network infrastructure. The services are provided on demand and at scale in a multi-tenant environment. Advantages It has several advantage: Cost – companies do not need to create, maintain their own IT

Mr Praveen

862 words - 4 pages allow me to develop insight into various industries, as well as an overarching vision of the international business arena. I have now worked for nearly two years in the energy and environment group of Koc Holding, Turkey's first and biggest diversified conglomerate. As a project engineer, I am mainly responsible for our holding companies' environment and energy sector investments. This position has given me the opportunity to interact with

Robbin Li

1253 words - 6 pages network engineer, but now, he has already become an excellent leader. As a leader, Robin has many good qualities. He is knowlegable, cautious, patient, full of passion and keeping appropriate development speed of Baidu. There is nearly no rapid change or ups and downs in the development of Baidu. The development is stable and sustained. What gives others biggest impression in Robin Li's leadership is his gentleman-style leardership.In ancient

Cisco Master Acquirer

1063 words - 5 pages Systems, Inc. is an American multinational corporation headquartered in San Jose, California, that designs, manufactures, and sells networking equipment. CISCO in 1980’s Cisco was formed by the married couple, Len Bosack and Sandy Lerner, who worked as computer operations staff at Stanford University. In 1984 they were joined by another computer engineer Richard Troiano. They formed the company that would sell computer networking products. The

Cyber Crimes

1600 words - 7 pages hacker, through use of the internet, gains access to control printers or network computers. In 2012, a version of the SpyEye malware (Trojan horse virus) infected computer webcams and microphones (Constatine, 2015). This malware allowed hackers to watch and manipulate the individual’s computers as they were conducting online banking. The hackers secured the necessary information to gain access to individual’s accounts without detection

Power And Organizational Politics

3129 words - 13 pages illustrate the most extreme and fully developed form of a latent tendency present in most aspects of organizational life. • EXAMPLE OF ORGANISATIONAL POLITICS The manager of a production department may align with the marketing manager to block a proposal from the production engineer not because he disagrees with the basic ideas, but because of resentments associated with the fact that he and the production engineer have never gotten along. Though

Group Of People

2141 words - 9 pages for the construction of the Hollywood Freeway, which was opened in December 1950, and in 1957 a memorial for the old fort and its American pioneers was placed on a site north of the freeway. The fort is now memorialized by the Fort Moore Pioneer Memorial. According to a G. Warren Shufelt, a geophysicist mining engineer deep beneath the heart of Los Angeles’ financial district (Fort Moore Hill) hundreds of feet below corporate offices, and

Entreprenuer

2241 words - 9 pages Dr. Christian Tidona -  Biotech entrepreneur Topically: Founder, Owner, Managing Director with BioMed X GmbH, Co-Founder, Managing, Director with BioRN Cluster Management GmbH, Managing Director with BioRN Network e. V., Founder, Owner, Managing Director with MANTICORE GmbH Education: Diploma in Biology, Ph.D in molecular biology and virology at the age of 28, Ruprecht-Karls-Universität, Heidelberg, Germany. Languages: English, French, German

Similar Documents

Cyber Security Essay

317 words - 2 pages Maroc (Oujda) Responsibilities Penetration tester /01/2014 - /12/2014 Perform penetration testing on web application, infrastructure, network and writing reports. Control and Audit for network devices, operating systems, and database. Manage access identity and users privileges. Alliances Group (Casablanca) Responsibilities Security Engineer /05/2013 - /11/2013 Used a variety of network security testing tools and exploits to identify

Airasia Essay

866 words - 4 pages offices and ports, particularly in terms of voice quality on calls. “The Comscentre solution incorporates the best telephony equipment available, using technology which transfers data packets more efficiently and prioritises each packet accordingly, which allows for a guaranteed quality of service for voice transmissions” explains Comscentre Senior Network Engineer, John Kennedy. “The solutions we roll out to customers are state of the art and

Organizational Chart Essay

438 words - 2 pages organization called as Computer Maintenance Agency (CMA) as a junior customer engineer for a period of one year. CMA is linked with a government organization called as National Remote Sensing Centre (NRSC). NRSC is popularly known as wing of Indian space research organization. CMA mainly works with network maintenance and system administration by signing an annual contract with NRSC. The CMA organization consists of director, customer support manager, team

Network Essay

2593 words - 11 pages to route packets. The startup configuration stored in NVRAM is the configuration the router will use on the next reboot to route packets. These configurations are only the same when the network engineer has copied the running configuration to NVRAM and not made any subsequent changes to the running configuration. 7. You entered a command and need to change it. What do you do? For example, you enter 10.4.0.1 as the IP address for the Fast