Friday, February 14, 2020

Department of Defense (DOD) Information Technology infrastructure Research Paper

Department of Defense (DOD) Information Technology infrastructure Audit - Research Paper Example This will achieved by CompTech’s detective controls. The company will provide an alarm system that uses laser technology to detect intrusion and report it immediately to the police. This will ensure that the confidentiality of data and information within the DOD is safeguarded from intruders. The department of Defense (DOD) within its directives provides that DOD information must be protected from security breaches by one or more physical controls (Online Information for Defense Community 2012). It is in this regard that that the CompTech Inc. will provide physical security through locks which inhibit access to sensitive data and information within the DOD. Physical barriers will be installed within the DOD to prohibit access to data warehouses. The physical barriers that CompTech Inc. will provide for the DOD include passwords to entry and exit doors including the elevators. Through physical protection, the privacy of data within the department will be guaranteed. In order to comply with the information security program that is recommended by the DOD, CompTech Inc. will ensure that the department recovers quickly from any losses of data that emanate from security breaches. The company will achieve this through the design and installation of data recovery software that will act as a corrective control for data losses. This will ensure availability of data for use without any delays hence implementation of quick corrective measures. The Critical Program Information within DOD’s requirements and directives will be adhered to by CompTech Inc. in its procedural controls. The company will design and present training applications will help employees within the department to have adequate skills and knowledge on safeguarding the system. This will lead to a situation where the integrity of information within the DOD is maintained. CompTech Inc. will provide the DOD with secure systems which are designed and installed with firewalls,

Saturday, February 1, 2020

Project Communication Term Paper Example | Topics and Well Written Essays - 250 words

Project Communication - Term Paper Example The first thing we can do is pair people into groups of four, two of each. This lets each person feel they have someone who understands them while having to work with two who are coming from a different place. Second, when were doing user group instruction or teaching, we should again have paired elements. The introverted person can handle some of the electronic communication, while the extroverted person can do some of the speaking portion, but both should be involved at each step. When an introverted developer gets a chance to answer a question about how his programming works, his area of expertise, hell come out of his shell quickly more often than not. Finally, we should use a message board and a wiki. This not only lets us keep up in real time with our user group, but it also lets the introverted people have a chance to discuss in a forum that lets them apply their thinking