Monday, January 27, 2020

Primark Is Very Famous Retail Clothing Store Chain Marketing Essay

Primark Is Very Famous Retail Clothing Store Chain Marketing Essay I will highlight the basic components of strategic marketing and discuss how strategic planning process is vital and how much its important for making an effective marketing strategy. This assignment has been divided in to three learning outcomes. First learning outcome is about how marketing plan supports the strategic objectives of the organization. This learning outcome includes marketing planning process, how SWOT could be an effective tool and difference between marketing strategies and marketing planning. Second learning outcome is about the construction of marketing plans. This includes analysis of marketing mix how to produce marketing plan. Third and the last learning outcome are about how to promote the marketing plan in support of strategic objectives. Primark Primark is very famous retail clothing store chain, providing clothes to customer at reasonable and affordable prices. Primark is actually an Irish retailer of clothing with the numbers of stores in United Kingdom, Ireland and Spain. Primark has more than 170 stores in which 125 stores are located in all over United Kingdom, 35 stores in Ireland and round about 10 stores in Spain. The first Primark store was established in year 1969 in capital city of Ireland in Dublin by Arther Ryan with the collaboration with Micaela Mitchell. After achieving the first success, they open more stores in different business centres with in local and regional areas, which alternatively generate more profits. (Source: www.primark.co.uk) Now I would like to discuss the first learning outcome of my assignment that how marketing plan supports strategic objectives. I will first define both of them then focus on the vision and mission statements of Primark. The Marketing Concept The marketing concept emerged in the mid-1950s. Instead of a product-cantered, make-and-sell philosophy, business shifted to a customer-cantered, sense-and-respond philosophy. Instead of hunting, marketing is gardening. The job is not to find the right customers for your products, but the right products for your customers. The marketing is actually a tool to hold the key to achieve organizational mission and goals. In this way company become more effective than its competitors in the market for creating, delivering goods to the customers. (Source: MBA Career Program) Theodore Levitt of Harvard drew a contrast between selling and marketing concepts: Selling is the concept which only focuses on the needs of the seller; marketing is on the need of the buyer. Selling is actually a phenomena with sellers need to convert its product into cash; marketing is an idea of satisfying the need of the customer by mean of the product and the whole cluster of things associated with creating, delivering and finally consuming it. (Source: International Marketing Strategy, fifth edition) What is strategy and why it is important: A strategy is actually a plan of action which is designed to achieve the particular goals. Its consists of competitive moves and approaches used by the managers to run the company Management is concern with the following action plans their main aim is to Grow the business Please attract the customers Compete in the market successfully Conduct different operations Achieve targets of organizational performance Strategy involves in three questions and the answers of these three are on the basis of an organizations strategic planning these questions are Whats the present situation of the organization? Where does the organization need to go from here? How will the organization get there? The organizations answer to how it will get there is its strategy. Strategy and Competitive Advantage: Now days to survive in the market its very important to have competitive advantage over your competitors and rivals. Strategic planning helps us to get the competitive advantage so that organization can increase their market shares and earn more profits. A different and distinctive strategy thats helps and makes the company apart from their rivals and gives a company competitive advantage is a companys most reliable way to get the profit above average profits. Competing with competitive advantage is more beneficial than competing with no advantages Competing without competitive advantage result in low profitability. Vision of Primark: The mission of the management and the staff of Primark have been to supply quality and affordable product to the customers with a focus on new promotion. Mission Statement The Mission statement of Primark Company is to provide good and quality product to the customer relativity low as compare to the other retailers working in the market and with this stay competitive and should have a competitive edge with other clothing retailers in order to promote the culture of value for money. SMART Analysis: If we apply SMART analysis is accordance with the mission statement of Primark we can analyse the following Specific: Specific means that mission statement of Primark is specific in nature in terms of its objective. Measurable: The mission statement to some extent doesnt provide any time frame. Achievable: The targets of the organization are quite achievable. Realistic: Primark stores have adopted a realistic approach. Timely: to achieve the organizational goals Primark has no set any time framework. Importance of Marketing Planning at Business Product Level: The success of any business and any product which is launched in the market is depends on its Marketing Planning. For this reason I will focus on the importance of marketing planning for the business as well as the product. Let me discuss what is Product. Products: A product is something which is tangible in nature that can be touch or have a physical existence i.e. shape, size, colour dimensions etc, but this is a misleading concept in term of product definition because product can be intangible in nature as well like financial services provided by banks, services provided by the insurance companies to the customers etc. (International Marketing Analysis Strategy P-275) Now I would like to discuss the marketing planning process and analyse how this process is important for business and the products. Marketing Planning Process: Market plan is a document that has the details regarding the product or the actions which company takes. (Kotler et al. (2010). The different methods used by the management of the organizations in which they defines in details there current and future strategies, objectives and aims is called planning process. By this they can access the current and future trends of the markets and this evaluates the current and potential capabilities of the organization and an attempt to forecast the future in order to achieve its objectives. The international planning process allows the organizations to answer the below mentioned questions. What is the present state of the company now? Where does the company want to go? How will the company get there? An efficient marketing planning process consists of the following steps. Determining the objectives of the organization. Assessing and evaluating organizational resources. Evaluating the opportunities risks. An efficient Marketing strategy. Evaluating and implementing marketing plans. (Source Doole Lowe 2004) Explanation: As it is already mentioned in the stages of the marketing planning process, first step is to determine the organization goals and set the objectives of marketing plan. This is the stage where the organization decides that what need to do and how we gong to achieve that. Keeping in mind the objectives, organizational resources are assessed which include the financial condition of the organization, its people, technology used and production capability. SWOT Analysis: SWOT Analysis is considered to be the very useful tool now days. It is actually a strategic planning method or approach to evaluate the strengths, weakness, opportunities and threats of an organization. It involves in the project and business ventures as well. SWOT analysis consists of following Strengths: The characteristics of the organization or business thats gives an advantage to the company over its competitors or rivals. Weaknesses: The characteristics of the firm that have disadvantage to its competitors or rivals. Opportunities:  The opportunities are the external chances that make greater sales and can earn more profits. Threats:  Threats are also the external elements in the environment that cause trouble for the business. An  overall  plan  is based  on  the first  3  steps  of the SWOT analysis that will help the the  marketing  plan  a  major success  in the future. As I already mentioned marketing strategy gives us the answers for the following questions What is the present state of the company now? Where does the company want to go? How will the company get there? With the help of SWOT analysis we can analyse the company strengths, weakness, opportunities and threats. At the same time we can use the tool of PEST analysis that helps us analyse the political, economic, social and technological analysis. It helps us describe the work of marketing plan of the company. Porters five forces model gives us the knowledge of the number of forces that affects the marketing strategy of an organization. Last phase is to apply and implement the marketing plan; on the basis of the analysis the organization chooses its targeted market by using market segmentation methodology. And in the end the combination of effective and right marketing mix can give an edge over its competitors and rivals. During the stage of the planning process, organizations give more importance to their External Environmental Forces that can or will affect the marketing process. PEST analysis plays a very important and vital role at this stage and this gives the organizations a thorough analysis of the products. Difference between Marketing Planning Strategy: Strategy of an organization actually defines the overall aims, objectives mission of the company. Every business/ organization has set their goals and objectives in order to gain the market share and earn more profits as compare to their competitors. As I already mentioned that strategy of the company provides the answers of the following questions; As mentioned earlier that strategy of the company provides answers for the following three key questions; What is the present state of the company now? Where does the company want to go? How will the company get there? On the basis of these 3 important questions, an organization or a business sets its targets and makes a proper plan of action to achieve their goals. Marketing Planning: The process of promoting the product or services of the company on the basis of over all strategy of the organization is called marketing planning. Marketing planning involves Situational Analysis, Internal External Analysis of the organization and on the basis of the above factors choosing a right kind of marketing mix to increase the market share and maximize the profit and getting company competitive advantage over the competitors and rivals in the market. Construction of a Marketing Plan: It is extremely important for the businesses to make a proper marketing plan when they promote their product. This should be done efficiently in order to gain competitive advantage over competitors in an effective manner so that the organization can make more profits. Now I would like to focus on the components of the marketing plan. In this phase I will highlight the importance of marketing mix which helps us while making a marketing planning. The efficient kind of marketing mix strategies always gives a company an advantage in the market place. Marketing Mix: Marketing mix is defined as a set of tools an organization may use to achieve its marketing goals. (Kotler, Managing Markets 2006, P-19) McCarthy divided marketing mix in to four groups, which are commonly knows as 4Ps Product Price Place Promotion An organization uses the all four factors of marketing mix to attracts and target their customers. A company can change its price and keep changes its promotion schemes in short run but it might take longer period for them to change their product or places. Most of the organizations working in the market use Price and Promotion as key factors to target the customer to earn profits. The above mentioned 4Ps helps and represents sellers view of the marketing tools in order to attract the buyers. (Kotler Managing Markets 2006, P-20) Some other authors include 7Ps as the complete version of marketing mix. The remaining three are as follows: People Processes Physical Evidence If we look on the marketing mix of the Primark then we can analyze the marketing strategy they adopted so that they attract numbers of customers. Marketing Mix of Primark: Primark is widely knows and popular as a clothes retailer which keep attracting the customer by their low price and good quality clothes. I will highlight the marketing approach Primark adopted to get the benefits as compare to their competitors. Product: Primark is a clothes retailer, it is producing good and quality product according to the need of the people for all range of ages. In this section I will discuss what products they are selling and what are the different features of their products from mens wear, ladies wear and childrens wear. Quality: Quality of the product of Primark is quiet reasonable as compare to their prices especially if we look on the other retailers in the high street market retailers. Designs: Primark keep introducing latest designs at their retails out lets. Primark targeted people of ages from 25 to 35. Primark keep providing latest designs in their retails outlets at reasonable prices. Brand Names: Primark has launched different types of brands in their retails outlets for their customers, which are quite popular. I am discussing few brands of Primark that has become a part and become a value for money business. Rebel Active CS Active Early Days (For babies) Young Dimensions Active Cedar wood State (For Gents) Atmosphere (Source: www.primark.co.uk) Packing Sizes: The product which Primark produces are good in quality and their packing is extremely good that people attract to their products. In these products ladies wear and gents dress shirts comes under good packing and in all sizes. Services, Warranties Returns: Primark is one of the company which is growing very rapidly and company core objective is to provide the best services to their customers. Each and every Primark store has a customer services department where trained customer representative staff help the customers to their concern are solve the problems of the customers on priority basis. At Primark the product that has been purchase by the customers can be exchanged or it can be even refunded within the prescribed 21 days time of the day of purchased date. Price: Primark as a retail company is focusing to provide good quality of products to the customer at the very reasonable prices. Primark is one of the retailers in the Europe where a customer has been targeted by the price of the products. Their marketing strategy most important aspect is value for money with the slogan Look good pay less Examples: Gents shirt prices starts from only  £2.00 Gents jeans pent can be purchased with in  £10.00 Gents formal suite can be purchased in  £40.00 Apart from all that above Primark keep on reducing the prices of the product from time to time and in this way company fulfilling their promise of Look Good Pay Less. Promotion: Like other retailers working in the region you cannot see many promotion schemes but Primark do make promotions schemes so that they can create more market share. But over all the promotion factor of Primark is bit low because they dont have online shopping facility for their customers. This online shopping has been neglected which shouldnt be neglected as this is a very important factor in now days. Like all the other companies in the region, Primark introduced Pennys Gift Card in all their stores in Ireland. This brings a lot of saving on shopping in the Primark outlets. Place: In marketing mix the 4th P is a very important as far as the clothes retailer concern. You will see Primark stores and outlets on all major and important high streets and shopping centres. Primark has also opened a shop at the famous Oxford Street in the Central London, this store at Oxford Street doing a very good business. The Primark store at Lakeside is also one of the busiest stores at Lakeside shopping centre. If we talk regarding the transportation point of view, all Primark stores and outlets are easy assessable to the general public through public transports as they are located at the very important and majors high streets and shopping centres, and this make Primark a value for money brand for the consumers in the recession period. People: This is also a very important factor of marketing mix and it is very significant as well. Marketing strategy should be made for the people who either are the end users of are the part of the organization for e.g. workers, management, consumers etc. this also defines the market segmentation and demographic segmentation. Processes: This process also plays a vital role because its gives an overview about the processes involved in the business. Like mechanism, procedure and flow of all the activities by which services are used. This also tells us the procedures that how product reach the end users. So its important that marketing process should be flexible to meet the needs of the businesses processes. Physical Evidence: The last 7P of marketing mix is physical evidence this mean that the marketing strategy should include effectively communicating their satisfaction to potential customers. Impact of Marketing Mix on the Management Decision Making: The importance of marketing mix is very important for every organizations business and marketing plans. Marketing mix is chosen after the very critical analysis of the forces that affects internal and external environment. In this way management can get the better idea about the strengths and weaknesses of the organizations. The potential business opportunities and threats are due to the presence of the different companies offering and doing the businesses by same sort of services and product. After the very careful and critical analysis of all the above factors the management of the companies make very good and fruitful decisions. An effective and correct Marketing Mix strategy will give the companies competitive edge over the competitors in this way they can produce more profits and maximise the market share of the company. Importance of Budgeting in Marketing Plan Financial forecasting is also very important and vital in over all running of the business unit. In case of marketing the funds availability is very important. On this basis the organization allocates resources and funds for an effective marketing plan so that they can produce more result in shape of success. Here the question arises that what should be the cost of the whole marketing campaign of the product or the business and how we can allocate the funds for that. Promotional budget normally determined by how much fund provided and how much percentage is available out of the revenue received from the sale of the brand.

Sunday, January 19, 2020

Access Control Proposal Essay

Access control: type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc. With mandatory access control, this security policy is centrally controlled by a secu rity policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes. (The traditional UNIX system of users, groups, and read-write-execute permissions is an example of DAC.) MAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users. Historically and traditionally, MAC has been closely associated with multi-level secure (MLS) systems. The Trusted Computer System Evaluation Criteria[1] (TCSEC), the seminal work on the subject, defines MAC as â€Å"a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained  in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity†. Early implementations of MAC such as Honeywell’s SCOMP, USAF SACDIN, NSA Blacker, and Boeing’s MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement. Originally, the term MAC denoted that the access controls were not only guaranteed in principle, but in fact. Early security strategies enabled enforcement guarantees that were dependable in the face of national lab level attacks. Data classification awareness: For any IT initiative to succeed, particularly a security-centric one such as data classification, it needs to be understood and adopted by management and the employees using the system. Changing a staff’s data handling activities, particularly regarding sensitive data, will probably entail a change of culture across the organization. This type of movement requires sponsorship by senior management and its endorsement of the need to change current practices and ensure the necessary cooperation and accountability. The safest approach to this type of project is to begin with a pilot. Introducing substantial procedural changes all at once invariably creates frustration and confusion. I would pick one domain, such as HR or R&D, and conduct an information audit, incorporating interviews with the domain’s users about their business and regulatory requirements. The research will give you insight into whether the data is business or personal, and whether it is business-critical. This type of dialogue can fill in gaps in understanding between users and system designers, as well as ensure business and regulatory requirements are mapped appropriately to classification and storage requirements. Issues of quality and data duplication should also be covered during your audit. Categorizing and storing everything may seem an obvious approach, but data centers have notoriously high maintenance costs, and there are other hidden expenses; backup processes, archive retrieval and searches of unstructured and duplicated data all take longer to carry out, for example. Furthermore, too great a degree of granularity in classification levels can quickly become too complex and expensive. There are several dimensions by which data can be valued, including financial or  business, regulatory, legal and privacy. A useful exercise to help determine the value of data, and to which risks it is vulnerable, is to create a data flow diagram. The diagram shows how data flows through your organization and beyond so you can see how it is created, amended, stored, accessed and used. Don’t, however, just classify data based on the application that creates it, such as CRM or Accounts. This type of distinction may avoid many of the complexities of data classification, but it is too blunt an approach to achieve suitable levels of security and access. One consequence of data classification is the need for a tiered storage architecture, which will provide different levels of security within each type of storage, such as primary, backup, disaster recovery and archive — increasingly confidential and valuable data protected by increasingly robust security. The tiered architecture also reduces costs, with access to current data kept quick and efficient, and archived or compliance data moved to cheaper offline storage. Security controls Organizations need to protect their information assets and must decide the level of risk they are willing to accept when determining the cost of security controls. According to the National Institute of Standards and Technology (NIST), â€Å"Security should be appropriate and proportionate to the value of and degree of reliance on the computer system and to the severity, probability and extent of potential harm. Requirements for security will vary depending on the particular organization and computer system.†1 To provide a common body of knowledge and define terms for information security professionals, the International Information Systems Security Certification Consortium (ISC2) created 10 security domains. The following domains provide the foundation for security practices and principles in all industries, not just healthcare: Security management practices Access control systems and methodology Telecommunications and networking security Cryptography Security architecture and models Operations security Application and systems development security Physical security Business continuity and disaster recovery planning Laws, investigation, and ethics In order to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are determined by an organization’s risks, threats, and vulnerabilities. Appropriate access controls are categorized in three ways: preventive, detective, or corrective. Preventive controls try to stop harmful events from occurring, while detective controls identify if a harmful event has occurred. Corrective controls are used after a harmful event to restore the system. Risk mitigation Assume/Accept: Acknowledge the existence of a particular risk, and make a deliberate decision to accept it without engaging in special efforts to control it. Approval of project or program leaders is required. Avoid: Adjust program requirements or constraints to eliminate or reduce the risk. This adjustment could be accommodated by a change in funding, schedule, or technical requirements. Control: Implement actions to minimize the impact or likelihood of the risk. Transfer: Reassign organizational accountability, responsibility, and authority to another stakeholder willing to accept the risk Watch/Monitor: Monitor the environment for changes that affect the nature and/or the impact of the risk Access control policy framework consisting of best practices for policies, standards, procedures, Guidelines to mitigate unauthorized access : IT application or program controls are fully automated (i.e., performed automatically by the systems) designed to ensure the complete and accurate processing of data, from input through output. These controls vary based on the business purpose of the specific application. These controls may also help ensure the privacy and security of data transmitted between applications. Categories of IT application controls may include: Completeness checks – controls that ensure all records were processed from initiation to completion. Validity checks – controls that ensure only valid data is input or processed. Identification – controls that ensure all users are uniquely and irrefutably identified. Authentication – controls that provide an authentication mechanism in the application system. Authorization – controls that ensure only approved business users have access to the application system. Input controls – controls that ensure data integrity fed from upstream sources into the application system. Forensic controls – control that ensure data is scientifically correct and mathematically correct based on inputs and outputs Specific application (transaction processing) control procedures that directly mitigate identified financial reporting risks. There are typically a few such controls within major applications in each financial process, such as accounts payable, payroll, general ledger, etc. The focus is on â€Å"key† controls (those that specifically address risks), not on the entire application. IT general controls that support the assertions that programs function as intended and that key financial reports are reliable, primarily change control and security controls; IT operations controls, which ensure that problems with processing are identified and corrected. Specific activities that may occur to support the assessment of the key controls above include: Understanding the organization’s internal control program and its financial reporting processes. Identifying the IT systems involved in the initiation, authorization, processing, summarization and reporting of financial data; Identifying the key controls that address specific financial risks; Designing and implementing controls designed to mitigate the identified risks and monitoring them for continued effectiveness; Documenting and testing IT controls; Ensuring that IT controls are updated and changed, as necessary, to correspond with changes in internal control or financial reporting processes; and Monitoring IT controls for effective operation over time. References : http://hokiepokie.org/docs/acl22003/security-policy.pdf Coe, Martin J. â€Å"Trust services: a better way to evaluate I.T. controls: fulfilling the requirements of section 404.† Journal of Accountancy 199.3 (2005): 69(7). Chan, Sally, and Stan Lepeak. â€Å"IT and Sarbanes-Oxley.† CMA Management 78.4 (2004): 33(4). P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998. Access Control Proposal Essay Proposal Statement Integrated Distributors Incorporated (IDI) will establish specific requirements for protecting information and information systems against unauthorised access. IDI will effectively communicate the need for information and information system access control. Purpose Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change. See more:  Perseverance essay Scope This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems. Definition Access control rules and procedures are required to regulate who can access IDI information resources or systems and the associated access privileges. This policy applies at all times and should be adhered to whenever accessing IDI information in any format, and on any device. Risks On occasion business information may be disclosed or accessed prematurely, accidentally or unlawfully. Individuals or companies, without the correct authorisation and clearance may intentionally or accidentally gain unauthorised access to business information which may adversely affect day to day business. This policy is intended to mitigate that risk. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Applying the Policy – Passwords / Choosing Passwords Passwords are the first line of defence for our ICT systems and together with the user ID help to establish that people are who they claim to be. A poorly chosen or misused password is a security risk and may impact upon the confidentiality, integrity or availability of our computers and systems. Weak and strong passwords A weak password is one which is easily discovered, or detected, by people who are not supposed to know it. Examples of weak passwords include words picked out of a dictionary, names of children and pets, car registration numbers and simple patterns of letters from a computer keyboard. A strong password is a password that is designed in such a way that it is unlikely to be detected by people who are not supposed to know it, and difficult to work out even with the help of a Protecting Passwords It is of utmost importance that the password remains protected at all times. Do not use the same password for systems inside and outside of work. Changing Passwords All user-level passwords must be changed at a maximum of every 90 days, or whenever a system prompts you to change it. Default passwords must also be changed immediately. If you become aware, or suspect, that your password has become known to someone else, you must change it immediately and report your concern to IDI Technical Support. Users must not reuse the same password within 20 password changes. System Administration Standards The password administration process for individual IDI systems is well-documented and available to designated individuals. All IDI IT systems will be configured to enforce the following: Authentication of individual users, not groups of users – i.e. no generic accounts. Protection with regards to the retrieval of passwords and security details. System access monitoring and logging – at a user level. Role management so that functions can be performed without sharing passwords. Password admin processes must be properly controlled, secure and auditable. User Access Management Formal user access control procedures must be documented, implemented and kept up to date for each application and information system to ensure authorised user access and to prevent unauthorised access. They must cover all stages of the lifecycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed by IDI. User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks. User Registration A request for access to IDI’s computer systems must first be submitted to the Information Services Helpdesk for approval. Applications for access must only be submitted if approval has been gained from Department Heads. When an employee leaves IDI, their access to computer systems and data must be suspended at the close of business on the employee’s last working day. It is the responsibility of the Department Head to request the suspension of the access rights via the Information Services Helpdesk. User Responsibilities It is a user’s responsibility to prevent their userID and password being used to gain unauthorised access to IDI systems. Network Access Control The use of modems on non- IDI owned PC’s connected to the IDI’s network can seriously compromise the security of the network. The normal operation of the network must not be interfered with. User Authentication for External Connections Where remote access to the IDI network is required, an application must be made via IT Helpdesk. Remote access to the network must be secured by two factor authentication. Supplier’s Remote Access to the Council Network Partner agencies or 3rd party suppliers must not be given details of how to access IDI ’s network without permission. All permissions and access methods must be controlled by IT Helpdesk. Operating System Access Control Access to operating systems is controlled by a secure login process. The access control defined in the User Access Management section and the Password section above must be applied. All access to operating systems is via a unique login id that will be audited and can be traced back to each individual user. The login id must not give any indication of the level of access that it provides to the system (e.g. administration rights). System administrators must have individual administrator accounts that will be logged and audited. The administrator account must not be used by individuals for normal day to day activities. Application and Information Access Access within software applications must be restricted using the security features built into the individual product. The IT Helpdesk is responsible for granting access to the information within the system. Policy Compliance If any user is found to have breached this policy, they may be subject to IDI’s disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from IT Helpdesk. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible Head of Information Services, Head of Human Resources Accountable Director of Finance etc. Consulted Policy Department Informed All IDI Employees, All Temporary Staff, All Contractors. Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Key Messages All users must use strong passwords. Passwords must be protected at all times and must be changed at least every 90 days. User access rights must be reviewed at regular intervals.  It is a user’s responsibility to prevent their userID and password being used to gain unauthorised access to IDI systems. Partner agencies or 3rd party suppliers must not be given details of how to access the IDI network without permission from IT Helpdesk. Partners or 3rd party suppliers must contact the IT Helpdesk before connecting to the IDI network. Access Control Proposal Essay 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project for IDI 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables †¢ Solutions to the issues that specifies location of IDI is facing †¢ Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability †¢ Assessment of strengths and weaknesses in current IDI systems †¢ Address remote user and Web site user’s secure access requirements †¢ Proposed budget for the project—Hardware only †¢ Prepare detailed network and configuration diagrams outlining the proposed change 1.4 Project Guides Course Project Access Control Proposal Guide Juniper Networks Campus LAN Reference Architecture 1.5 Project Members David Crenshaw, IT Architect and IT Security Specialist Members of the IT Staff 1.6 Purpose A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations. 1.7 Goals and Objectives Objective 1 To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms. Objective 2 The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle. Objective 3 Solutions to the issues that the specifies location of IDI is facing Objective 4 Assessment of strengths and weaknesses in current IDI systems Objective 5 Address remote user and Web site user’s secure access requirements Objective 6 Prepare detailed network and configuration diagrams outlining the proposed change Objective 7 Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. Objective 8 A comprehensive network design that will incorporate all submitted requirements and allow for projected growth. Objective 9 Final testing of all installed hardware, software, and network connectivity. Objective 10 Initialization of the entire network and any last minute configuration adjustments to have the network up and operating within all specified ranges. 2 Current Environment 2.1 Overall: There are a variety of servers, switches, routers, and internal hardware firewalls. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. The information technology infrastructure is old and many locations are running on outdated hardware and software. Also, the infrastructure is out dated in terms of  patches and upgrades which greatly increase the risk to the network in terms of confidentiality, integrity, and availability. 2.2 Data Center: Logisuite 4.2.2 has not been upgraded in almost 10 years. Also, numerous modifications have been made to the core engine and the license agreement has expired. Progressive upgrading to the current version will be required. As a result, renewing this product will be extremely cost and time-prohibitive. RouteSim is a destination delivery program used to simulate routes, costs, and profits. It is not integrated into Logisuite or Oracle financials to take advantage of the databases for real-time currency evaluation and profit or loss projections. IDI’s office automation hardware and software has not been standardized. Managers have too much liberty to buy what they want according to personal preferences. Other software problems include early versions of MS Office 5, WordPerfect 7.0, and PC-Write that are not compatible. Telecommunications has not been since the company moved its current headquarters 15 years ago. This has left many of the new features for telecommunications lacking and not integrated with the customer service database to improve call management efficiency. The generic system was acquired from a service provider who is now out of business. Policies for personal devices are being ignored by many of the executives who have local administrators install the clients on their unsupported, non-standard personal laptop computers and workstations that interface with the internet. The original WAN was designed in the early 2000’s and has not been upgraded. During peak periods, usually between September and March, the capacity is insufficient for the organization resulting in lost internet customers which  further reduces growth and revenue. Telecommunications works through a limited Mitel SX-2000 private automatic branch exchange (PABX) that only provides voice mail and call forwarding. 2.3 Warsaw, Poland This is the largest office based on number of employees, strategically located to assist IDI for major growth in the Middle East and Asia, and the home portal for expansion and geographical client development, yet there is insufficient computing power to stay afloat on a day-to-day basis. The primary freight forwarding application is almost 10 years old and does not interface with the McCormack dodge accounting and finance system There are 6 Web servers (4 are primary and 2 fail during clustered load balancing) The cafeteria sponsors a public wireless network running WPA (Wi-Fi Protected Access) with no password protection. Telecommunications is an 8 year old Siemens Saturn series PBX, some of whose features have become faulty. The desktop phones have not been replaced or upgraded during this time. There is a lack of separation of duties between the network operations and the accounts receivable department and there is evidence of nepotism and embezzlement. 2.3 Sao Paulo, Brazil Vendors are unwilling to sign a service agreements.

Saturday, January 11, 2020

Outside Speech Assignment Essay

After I watched the speech which was gave by Bill Gates in June 08, 2007 on the Harvard commencement, I felt more interesting in Bill Gates. According to the information offered by woopidoo. com, we can find the Biography of Bill Gates, which said, â€Å"Bill Gates is one of the most influential people in the world. He is cofounder of one of the most recognized brands in the computer industry with nearly every desk top computer using at least one software program from Microsoft. Bill Gates is the richest man in the world and has held the number one position for many years. Gates was born and grew up in Seattle, Washington USA. His father, William H. Gates II was a Seattle attorney and his mother, Mary Maxwell Gates was a school teacher and chairperson of the United Way charity. Gates and his two sisters had a comfortable upbringing, with Gates being able to attend the exclusive secondary â€Å"Lakeside School†. Bill Gates started studying at Harvard University in 1973 where he spent time with Paul Allen. Gates and Allen worked on a version of the programming language BASIC, which was the basis for the MITS Altair (the first microcomputer available). He did not go on to graduate from Harvard University as he left in his junior year to start what was to become the largest computer software company in the world; Microsoft Corporation. † 30 years later since Gates left Harvard; Gates came back to Harvard and gave a speech to those students who were graduated from Harvard. The reason why Bill Gates gave this speech is that he wanted to deliver what he had thought about a successful person should do to the world after graduated from school. His topics were appropriate for the audience, because the audience were all students who graduated from Harvard. Also, his topics were appropriate for the occasion, because it was Harvard commencement Day. For the general purpose of this speech, it was the special occasion speech, because this speech was a presentation that highlights a special event. The special event was the Harvard commencement. For the mode of delivery for this speech, I think it should be the manuscript mode, because during Bill Gates were giving the speech; he looked down on the speech table. Bill Gates used his voice effectively. He adjusted his rate very well. He did not speak very fast so that everyone there can get what he said. Also, he used pause for effect, such as when he said, I’ve been waiting more than 30 years to say this: â€Å"Dad, I always told you I’d come back and get my degree. † Between â€Å"to say this† and â€Å"Dad† he used a pause, so that audience would think about what would he going to say. And it made the speech more interesting. Also, he used duration for attention, pitch for expression, volume for emphasis, enunciation for clarity and fluency for fluidity during his speech. He spoke clearly and smoothly, so that everyone could understand what he was talking about. Bill Gates used eye contact to hold audience attention, because he would look at audience usually, not kept reading his manuscript all the time. He did not use facial expression a lot, but audience still could see him smiling sometimes. Thus, for the delivery part, I think Bill Gates did very well. He gave the speech by using a manuscript; however, he gave the speech without kept reading the manuscript all the time. He used voice to get audiences’ attention; he used eye contact to kept audiences’ attention. And everything he talked was clear and smooth. For the speech organization, Bill Gates used a very good attention getter by saying, â€Å"I’ve been waiting more than 30 years to say this: â€Å"Dad, I always told you I’d come back and get my degree. â€Å"I want to thank Harvard for this timely honor. I’ll be changing my job next year†¦and it will be nice to finally have a college degree on my resume. But I also want to be recognized as the guy who got Steve Ballmer to drop out of business school. I’m a bad influence. That’s why I was invited to speak at your graduation. If I had spoken at your orientation, fewer of you might be here today. I applaud the graduates today for taking a much more direct route to your degrees. For my part, I’m just happy that the Crimson has called me â€Å"Harvard’s most successful dropout. † I guess that makes me valedictorian of my own special class†¦I did the best of everyone who failed. † These were part of the manuscript I found from networkworld. com. After his introduction, he began to recall his school life when he was studying in the Harvard. By telling his story, he told audience how he began his business. After his business, he talked about what he had thought about during the 30 years. Then, his main point came out: â€Å"In your years here, I hope you’ve had a chance to think about how–in this age of accelerating technology–we can finally take on these inequities, and we can solve them. † Then, Bill Gates gave an example for the inequities: there were millions of children were dying from poverty and disease. Then, Gates started talked about how to help these children from dying, â€Å"If we can find approaches that meet the needs of the poor in ways that generate profits for business and votes for politicians, we will have found a sustainable way to reduce inequity in the world. This task is open-ended. It can never be finished. But a conscious effort to answer this challenge will change the world. We can make market forces work better for the poor if we can develop a more creative capitalism? If we can stretch the reach of market forces so that more people can make a profit, or at least make a living, serving people who are suffering from the worst inequities. We also can press governments around the world to spend taxpayer money in ways that better reflect the values of the people who pay the taxes. At the last, he gave the conclusion by calling action, â€Å"Knowing what you know, how could you not? And I hope you will come back here to Harvard 30 years from now and reflect on what you have done with your talent and your energy. I hope you will judge yourselves not on your professional accomplishments alone, but also on how well you have addressed the world’s deepest inequities †¦ on how well you treated people a world away who have nothing in common with you but their humanity. † I think the organization of Bill’s speech was very good, because everything was included and nothing was unnecessary. For the materials to support the speech, Bill Gates used the AIDS as an example, â€Å"The broad goal, of course, is to end the disease. The highest-leverage approach is prevention. The ideal technology would be a vaccine that gives lifetime immunity with a single dose. So governments, drug companies, and foundations fund vaccine research. But their work is likely to take more than a decade, so in the meantime, we have to work with what we have in hand–and the best prevention approach we have now is getting people to avoid risky behavior. Pursuing that goal starts the four-step cycle again. This is the pattern. The crucial thing is to never stop thinking and working–and never do what we did with malaria and tuberculosis in the 20th century–which is to surrender to complexity and quit. The final step–after seeing the problem and finding an approach–is to measure the impact of your work and share your successes and failures so that others learn from your efforts. † This example told people how to help those people who were suffering from disease. Also it told people to solve the problem when they met. The audiences were responded lively. When Bill Gates stood on the stage, all the people stood and began to clap. When Bill Gates used humor to deliver his points, audiences would laugh or clap. When Bill Gates was talking, the audience would be silence. It showed that the speech was interesting and meaningful that they would like to listen. Also, they showed the respect to the people who were the richest one in the world. After I watched the video, I think Bill Gates did very well on his speech. He gave an interesting and meaningful speech to people. He let people laugh; at the same time, he let people think.

Thursday, January 2, 2020

21st Century Breakdown A New York Times - 1367 Words

21st Century Breakdown Another day, another dollar. A new day starts; change has been done, being made, and being organized. A new update is available, a new trend is gaining attention, a new problem is on the rise, and new technology is being engineered. Within twenty-four hours, a major shift in society has acted upon. The awareness and understanding of people are becoming more active; they are gaining ideas about the changes that are happening in society. Although they are conscious about the situation, sometimes not everybody accept change and they are not willing to make the transition for change in this modernized society. Our transition into the 21st century changed the definition of literacy into something more improved†¦show more content†¦The more students that do this and graduate with their course, the production of human workforce with a more developed education background are high which then they could work in American companies which helps their economy to rise. As students are aware of the economic status of their country, they are now encouraged to be as well-rounded as possible to contribute to the rise of their nation’s economy. The consciousness of people does not only focus to the world of economy, they also attend to the status of the world of environment. The Synthesis Text Collection about Climate Change shows that Americans do have a sense of consciousness about the situation of the problem, the aspects and concept, the issue and solutions to the problem. Every Source talks about how much people are aware of the issue, what are the factors affecting the problem, certain issues associated with Climate Change, the â€Å"other side of the story†, the fut ure effect of the crisis, and solutions to somehow resolve the environmental issue. The term â€Å"Basically† is the most commonly used phrase by everyone. Yet as much as it is used, this term could determine someone’s knowledge capacity if everything they know and say are only the basics of everything. The documentary â€Å"Two Million Minutes† present the difference of High School students in the United States, India, and China. Based on the statistical data shown in the documentary, four out of