Week_7_Discussion.docx

doc

School

Kenyatta University *

*We aren’t endorsed by this school

Course

2022

Subject

Information Systems

Date

Nov 24, 2024

Type

doc

Pages

3

Uploaded by Jmsomuse

Report
Discussion Week 7 Network Management Network admin has always been a tough job. The added layer of hacking, social engineering, scanning, and scanning on the inside is new to the network admin, and it is much harder to keep track. With the expected workload, it is even harder to keep up with the attacks—that is why monitoring should be important to any network admins mind. Ransomware is the most significant type of malware seen in this kind of job, so that is what the threat is focused on in this presentation. Currently, the most common ransomware threat is Crypto locker. It is a kind of malware that encodes all the files on the user's device and only decrypts them after paying a fee to the attackers; this is why it has called Ransomware (Drakos, 2020). This type of malware can also spread to other devices using an infected USB drive or even the infected network. In addition, if the user's device gets stolen and is found on the network, the same malware could infect other devices without the users knowing it, making the attack even more dangerous. Many times, when the user receives the ransom from the attacker, they are told to get the malware removed. Moreover, they often click on the link in an email telling them how to do that. However, it is often an attachment that will then have Ransomware Infected. Even worse, the attacker may infect a file on the user's device (which will appear on the device) to make it harder for them to detect and remove the Ransomware. Ultimately, they lose their files and may even lose their data entirely. The attackers then get their money, and the network gets the restoration cost (Homoliak et al., 2020). References Drakos, P. (2020). Implement a security policy and identify Advance persistent threats (APT) with ZEEK anomaly detection mechanism. Homoliak, I., Venugopalan, S., Reijsbergen, D., Hum, Q., Schumi, R., & Szalachowski, P. (2020). The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses. IEEE Communications Surveys & Tutorials, 23(1), 341-390. Project Management 1.As it’s condominiums that are to be built, we can consider the ‘Owners’ would the person or entity who will eventually own the condominium. My company would become a ‘General contractor’ also called as primary contractor and the list of potential sellers of who own would be selected would be the ‘Subcontractor’. Below are the selection criteria that would be used to narrow the potential sellers. Technical: This factor would comprise of technical know-how i.e., their technical research, production, or business process. Other factors also include expertise, Equipment, specialism, and design capacity.
Managerial: This factor would be more about assessing the management of the potential sellers through factors like Brand, Culture, Trust/integrity, Methodology & Organization. Financial: This factor would be assessing the financial strength and basis of the potential seller, as it would also be an important factor to assess if the seller has adequate financial resources to finish the contracted work. This financial factor is assessed by potential seller’s financial strength, Marketability, Stability, Audit reports & Turnover Experiential: This experimental factor is assessed by individual factors such as Design-build similar projects, Diversity, Resources & Reputation. 2.RFQ and RFP are both commonly used ‘procurement documents. RFQ: Request for quotation, this procurement type is generally used when the specification is known, and price is the main factor that is requested from the suppliers. RFP: Request for proposal, this procurement type is generally used at early stages of planning to request proposals from the suppliers with their commodity or service
As the project manager of the renovation of the large apartment building and outsourcing the installation of new septic tank, I would use RFP, Request for proposal. It’s because for a large apartment building the specifications of the septic tank must be designed based on factors such as units in the apartments, square footage and soil type and other regulatory factors. Also, in this case RFP is to be used at early stages of planning for proposals as other stages of construction like plumbing works should be planned accordingly based on the proposals received from suppliers. References: Contemporary Project Management, Fourth Edition, ISBN: 978 1 337 40645 1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help