Free Essay

Nt2580 Final Project

In: Computers and Technology

Submitted By 1boondocks
Words 1901
Pages 8
Richman Investments | Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project | | Jason R Spitler | 5/30/2014 |

Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |

Final Project I. Richman Internet Infrastructure Security Management Upgrade A. Purpose
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication
It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)

1. Biometric Identification - Biometrics is the science of identifying someone from physical characteristics. A user’s fingerprint is one of the strongest authenticators available. Never lost during a commute or forgotten at home, has fingerprint authentication introduced a new plateau of convenience for fast, secure access all users will have, Desktop USB add on, laptops and Iphone6 with biometric fingerprint scanners. This will be level one security. The log records will show GPS coordinates of the scanned process as well.

2. Device Authentication- Entrust IdentityGuard software leads the industry as one of the most robust authentication. We can use Entrust for device authentication, biometrics, digital certificates, mobile soft tokens, and IP Geolocation. 3M Cogent provides the highest-quality fingerprint authentication technology to government, border services and security- conscious organizations across the globe. “Entrust has partnered with 3M Cogent to integrate its world-class fingerprint enrollment and verification technology into the Entrust IdentityGuard software authentication platform.”(2) These are all available through Entrust.

3. Windows Basic Authentication-User ID and password. This is the most common, and typically the simplest, approach to identifying someone because it is fully software-based.

B. Strong Password Resolution

Make no mistake: An eight-character password could be very secure, even if attacked by today's high-speed computers. This method will soon be antiquated. Fortune 100 corporations, small firms and even Internet service providers with strong security have an Achilles heel; users who pick easily guessable passwords. Many who think themselves clever place a digit or two on the end of their chosen word. Such feeble attempts at deception are no match for today's computers, which are capable of trying millions of word variations per second and often can guess a good number of passwords in less than a minute. Richman must stay one step ahead and have a torn Achilles tendon no more

1. SFSP - Simple Formula for Strong Passwords
SFSP is a simple way for all users to grasp the idea of good password creation methods. This will be taught to all Richman users by corporate video training followed by password reset script for users to change their passwords to the new method. SFSP works on a three part method.

a. Input Rules are static procedures dictating where certain information is to be typed b. Secret Code is a static number that a user secretly chooses that is easy to remember. c. Memory Cue is a an easy to remember word the user secretly selects

2. This is an example of the new password method for Richman employees. You can make as many input rules as the company deems necessary. For this password example there are two rules. The static number is the first number before the rule changes the number. The memory cue is the easy to remember word.

a. R1 = Add doubling numbers in between each character of simple word, before, through and after
R2 = Insert the special character “*” (not including quotes) as the first and last character, as the last step in creating the password b. Secret Code number is 1 c. Memory Cue is internet d. New Password is *1i2n4t8e16n32e64t128* e. Memory Cue is oranges f. New Password is *1o2r4a8n16g32e64s128* C. Permissions and Rights (What they can do. . Which operations they can perform on a system.)
All users will be reviewed to insure they are set up correctly with their user rights and permissions. The Administrator will review and updates roles and objects to insure each user has the correct amount of rights and permissions. The Administrator will look at each object per role, and each permission can have one or more access rights associated with it. In addition, a Windows user or group can be associated with more than one role. By redefining roles and access rights, Richman can put the squeeze on security loop holes and give their employees and clean internet access and 99.999% continuity. III. Access Control (Which resources they can access.)
Access Control helps employers control activities that lower productivity. - Monitor Computer use. You can restrict activities that lead to the computer being unfairly monopolized. - It can even minimize the likely hood of getting infected by preventing access to potentially dangerous websites. Richman can protect itself by training our employees in internet user monitoring and filtering policy. In conjunction, we will start using Pearl Echo. Suite web filtering and internet control software to enforce the policy. A. Employee Internet Use Monitoring and Filtering Policy
1.0 Purpose The purpose of this policy is to define standards for systems that monitor and limit web use from any host within Richman Investments' network. We need to ensure employees use the Internet in a safe and responsible manner. Employees will be monitored to obtain details with incidents.
2.0 Scope
This policy applies to all Richman Investments' employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation connected to the Richman Investments' network. This policy applies to all end user initiated communications between Richman Investments' network and the Internet, including web browsing, instant messaging, file transfer, file sharing, and other standard and proprietary protocols. Server to Server communications, such as SMTP traffic, backups, automated data transfers or database communications are excluded from this policy.
3.0 Policy
3.1 Web Site Monitoring
The Information Technology Department shall monitor Internet use from all computers and devices connected to the corporate network. For all traffic the monitoring system must record the source IP Address, the date, the time, the protocol, and the destination site or server. Where possible, the system should record the User ID of the person or account initiating the traffic. Internet Use records must be preserved for 180 days.
3.2 Access to Web Site Monitoring Reports
General trending and activity reports will be made available to any employee as needed upon request to the Information Technology Department. Computer Security Incident Response Team (CSIRT) members may access all reports and data if necessary to respond to a security incident. Internet Use reports that identify specific users, sites, teams, or devices will only be made available to associates outside the CSIRT upon written or email request to Information Systems from a Human Resources Representative.
3.3 Internet Use Filtering System
The Information Technology Department shall block access to Internet websites and protocols that are deemed inappropriate for Richman Investments' corporate environment. The following protocols and categories of websites should be blocked:
• Adult/Sexually Explicit Material
• Advertisements & Pop-Ups
• Chat and Instant Messaging
• Gambling
• Hacking
• Illegal Drugs
• Intimate Apparel and Swimwear
• Peer to Peer File Sharing
• Personals and Dating
• Social Network Services
• SPAM, Phishing and Fraud
• Spyware
• Tasteless and Offensive Content
• Violence, Intolerance and Hate
• Web Based Email
3.4 Internet Use Filtering Rule Changes
The Information Technology Department shall periodically review and recommend changes to web and protocol filtering rules. Human Resources shall review these recommendations and decide if any changes are to be made. Changes to web and protocol filtering rules will be recorded in the Internet Use Monitoring and Filtering Policy.
3.5 Internet Use Filtering Exceptions
If a site is miss-categorized, employees may request the site be un-blocked by submitting a ticket to the Information Technology help desk. An IT employee will review the request and un-block the site if it is miss-categorized.
Employees may access blocked sites with permission if appropriate and necessary for business purposes. If an employee needs access to a site that is blocked and appropriately categorized, they must submit a request to their Human Resources representative. HR will present all approved exception requests to Information Technology in writing or by email. Information Technology will unblock that site or category for that associate only. Information Technology will track approved exceptions and report on them upon request.
3.0 Enforcement
The IT Security Officer will periodically review Internet use monitoring and filtering systems and processes to ensure they are in compliance with this policy. Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
4.0 Revision History 11/23/2007 – Draft Completed, Kevin Bong
Revision History04/18.2014 – Draft Completed, Jason Spitler
Revision History 03/18/2014-Drafted Completed, Jason Spitler

Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to stephen@sans.edu B. Pearl Echo. Suite web filtering and internet control software

Pearl Echo.Suite is an employee monitoring tool that can be used across multiple areas including e-mail, web surfing, file transfers, news resource access, instant messaging and chat. “Regardless of the needs of your company or organization, Pearl Echo.Suite will meet them whether for single or multiple locations as well as for the monitoring of roaming and mobile Internet users.”(3)

IV. Summary

By taking a three part approach to Internet Security within the user domain, Richman will define the standard of how a company’s internet maintains continuity. This document dictates the details the appropriate access control policies, standards, and procedures that define users within user domain; what they can do, which resources they can access, and which operations they can perform on a system.

References:
Entrust (2014),” Entrust Identityguard” Retrieved from: http://www.entrust.com/
Pearl Echo Software (2014).” Pearl Echo.Suite” Retrieved from: http://www.pearlsw.com/
SANS.ORG(2014),”Two Factor Authentication” Retrieved from: http://www.sans.org/reading-room
System Administration, Networking, and Security Institute or SANS.org (2001) “View Employee Internet Use Report (PDF)” retrieved from http://www.sans.org/security-resources/policies/internet.php…...

Similar Documents

Premium Essay

Final Project

...and/or expenses timetable. The company’s interests in these cash flows are on an after-tax basis since they are part of the shareholders dividends. Additionally, the additional cash flows are of important, because, after analyzing the project while viewing the company as a whole, the additional cash flows are seen as minimal benefits and will show the elevated value to the company if the decision is made to implement the project. B. Since depreciation is not considered a cash flow item, it does affect the balance of the differential cash flows during the course of the project's run cycle due to the amount of taxes to be paid by the company. Depreciation is in fact an expense item. If the company records more depreciation has incurred, the more they will have in expenses. Hence, the profits will be lower and so will the taxes paid out which are cash flow items. C. While assessing the possible budgeting proposal, any unrecoverable costs are disregarded. The company needs place more interest in the cumulative after-tax cash flows by viewing the company has as a whole. Even if the company decide to investment the sunk costs will have already appeared, which means they are not additional cash flows and are not relevant. D. The projects Initial Cash Outlay can be calculated by using: Initial Cash Outlay = Cost of New Plant & Equipment + Shipping & Installation Costs + Increase in Working Capital Initial Cash Outlay = $7,900,000 + $100,000 +......

Words: 1153 - Pages: 5

Premium Essay

Final Project

...Axia College Material Appendix A Final Project Overview and Timeline Final Project Overview Create a 10- to 15-slide Microsoft® PowerPoint® presentation of information about the fictional company that you created in Week Four. Use text, charts, tables, visuals, etc., to detail the different areas of business found within your company. Include information on the following topics: • Business organization • Potential legal or ethical issues • Business culture • Types of motivation • Human resource management • Technology • Operations and materials management Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, some CheckPoints and Assignments in the course are designed to assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week Three: Consider how a code of ethics will affect the creation of the company you will describe in your Final Project. □ Suggested in Week Four: Create a fictional company that you will explore for your Final Project due in Week Nine. Begin to explore the roles and behaviors that you would like the key players of your company to possess. □ Suggested in Week Six: Use your completed Job Fair brochure to generate ideas about the types of motivation you would......

Words: 270 - Pages: 2

Free Essay

Final Project

...List of part for transmitter circuitry………………………………….…...14 Table 4. List of part for receiver circuitry…………………………………….…....15 Appendix B…………………………………………………………………………….…16 Figure 8. Transmitter schematic……………………………………………….…..16 Figure 9. Receiver schematic………………………………………………….…...17 Appendix C………………………………………………………………………….……18 Final board layout Appendix D…………………………………………………………………………..…...19 Code for ATMEGA48 in transmitter circuit Appendix E………………………………………………………………………...……...29 Code for ATTINY45 in receiver circuit Important Data Sheets…………………………………………………………………….30 1 1. BACKGROUND Biketronics Inc, a local company in Moscow Specializing in motorcycle electronics requested the help of a senior design team from the University of Idaho. Team ThumbStart has been chosen to research and design a fingerprint scanner system that can replace the traditional key ignition system that is commonly used on motorcycles. The integration of a keyless ignition system using a fingerprint scanner into existing motorcycle technologies is possible. There are many different design considerations that have been taken into account. We have proposed a design and have a working final prototype that can successfully implement the fingerprint system into a wide variety of motorcycles. This system uses fingerprint data and allows the vehicle owner to operate the motorcycle without the need of keys. The system requires no hardware to be carried, but must maintain the same or higher level of security......

Words: 4867 - Pages: 20

Free Essay

Final Project

...Rayvon Collins Andrea Hines Cornelius Williams Isauro Valdez Steve Miltenberger Group dynamics Class project This project will show group cohesiveness and it will show group communication. You will have to rely on your group to come up with the answer and you will have to trust you group and group members. GROUP FEUD 1. Everyone will get into their permanent groups for the game. 2. One person will be elected to answer for their group; this person has the final say for the group when answering the questions. 3. Groups have a set time limit to come up with the answer to the question. 4. When the time is up no one is to speak but the person answering the question. If your group is still talking after the time allotted time there will be a 20 point deduction for that group. 5. Questions will have a set point value for each round. 6. The final and bonus questions will be valued by how many points your group agrees to wager, BUT you will be asked to wager points before you hear the question. 7. If you would like to challenge whether or not an answer is right you can do so but, yonika will have the final say, any group can challenge at any time. 8. The group with the most points WINS. Questions First round questions are worth 50 points. 1. Point value 50: In class we talked about primary and secondary group, give me an example of a primary group. Answer: family, church, work, any group that is permanent in their life. ...

Words: 596 - Pages: 3

Premium Essay

Final Project

...Address, City, State, Zip No practicum projects can be approved if they are based in Maryland, Tennessee, or Washington State, USA. No RN MSN mentors can be approved if they live and/or work in Maryland, Tennessee, or Washington State, USA. Stephanie Johnson EdD©, MSN,RN Morehead State University 150 University Boulevard Morehead, Ky 40351 Mentor’s Name and Educational Credentials Mentor’s Agency (Minimum of RN MSN required) Clinical Nursing Instructor 606-836-0202 sj.johnson@moreheadstate.edu Mentor’s Job Title Mentor’s Phone E-mail Maryland, Tennessee, and Washington, USA Students Students cannot complete ground-based clinical hours within the states of Maryland, Tennessee, or Washington, USA. Residents of these states must contact their instructor for further direction. |Practicum Goal: | |To analyze, develop, implement, and evaluate an educational learning curriculum for staff that increases their knowledge and addresses the current evidence based practice standards of safe mixing,| |and administration of chemotherapy in the outpatient setting. | |Project must be done with staff – no......

Words: 1118 - Pages: 5

Premium Essay

Final Project

...2008, p.302). Coordinated team member work is required for productive systems development. End users, systems analysts, technical specialists and programmers all have to work in concert with one another to make a development project successful. There are three main advantages to systems development. These are error detection, accountability, and control. The systems development model also has disadvantages. SDLC is not flexible due to its inherent structure and it is expensive since it is time-consuming. The first phase of SDLC is system investigation. A feasibility study is undertaken to define the options that are possible solutions for the problem at hand and the best option is determined. With this study in hand, a committee will determine whether the project will go forward from that point. Systems analysis takes place after that determination. Detailed information is acquired regarding the system requirements. The developers will then move to the systems design stage in which they will detail the system description and its functions. SDLC tasks also encompass programming which entails the translation of design specifications into a new computer code. Testing, implementation, operation, and maintenance are the final phases of the project development (Rained & Turban, 2008). Executive Dashboard Products Digital dashboards, which are also known as executive dashboards or management cockpits are designed to provide “rapid access to timely information and......

Words: 1825 - Pages: 8

Free Essay

Final Project

...Final Project ETH/125 March 30, 2014 Final Project Learning what diversity means is the first step to learning how it has helped the United States to be better. Diversity is defined as the state of having different races, ethnics, cultures working together in a group or organization. ("Diversity," 2014) Different cultures and races working together make the United States stronger and better as one. Understanding that everyone is the same, even if they each have different colored skin or believe in different things, each person may have their own beliefs but just like you or me they are a person with feelings. I personally have learned new thing out about my own family history. After a few weeks in the class I decided to join ancestry.com to see if I could learn more out about my family. I most certainly did learn new things out. At the family reunion we like to have everyone to bring a dish and a dessert to the function. We like to do this that not one person or family is responsible and to also exchange all the different ways that each family cooks foods. I believe that the United States population we greatly increase in the year 2050. I believe this because of the population increase that we have already experienced in the last 50 years. According to the United States Census Bureau in the 1960 census population was estimated at 179,323,175. In the 2010 census population was estimated at 308,745,538. (U.S. Department of Commerce, 2014).Thus being a......

Words: 1248 - Pages: 5

Free Essay

Nt2580 Research Project Part 2

...Project Part 2: Security Domain and Strategies Now that Richman Investments has expanded with more offices, locations and clients, the need for protection of assets are greater. We have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now......

Words: 1544 - Pages: 7

Premium Essay

Nt2580- Project Part 1

...Project Part 1 Multi-Layered Security Plan Outline The following outline is to document the general security solutions for Richman investments, for all locations including head-quarters, for the safety of data and information that belongs to Richman Investments. This plan will be updated and submitted, every month by the networking division, to senior management along with a security plan for the month. 1. User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. ...

Words: 779 - Pages: 4

Premium Essay

Final Project

...Discussion Questions for Gillette Case (Final Project) Adv. Topics in Int. Biz 1. What were the possible synergies and forces propelling the merger between P&G and Gillette – as well as the history of other takeover attempts for Gillette? 2. In light of Gillette’s large increase in value during James Kilt’s tenure, was his compensation reasonable? Was his pay package in the best interest of shareholders? 3. Evaluate the P&G offer. Make a list of the positive and negative aspects of receiving shares or cash from both the perspective of P&G and Gillette shareholders. 4. Compare the valuation analyses in Case Exhibits 6 and 7. Why are they different? Support and defend the validity of using each valuation method. 5. Should investment bankers and companies spend their time appeasing politicians worried about the effects of possible merger? Are politicians representing the interests of the American public when they question the merits of a deal? Also evaluate the role played by federal and international regulators. Is there any better solution to the complicated regulatory process? 6. Evaluate the role played by Warren Buffet in the merger. Should the support of one investor be a deciding factor in the completion of an M&A transaction? * You are required to answer these discussion questions. The due date for this case analysis is by Dec. 16 by 5 PM (in class). The length of the report is expected to be 8-10 pages (excluding......

Words: 262 - Pages: 2

Free Essay

Final Project

...April 26, 2015 BUS-260-WA-Final Project Describe your company: La Boutique chic I am the owner of a chain of boutiques that specializes in catering to the taste of sophisticated, higher income women. My boutiques carry expensive jewelry, purses, shoes and clothing that appeals to the taste of _____________. Some of the boutiques even include spa services. My company has become successful and profitable enough to open 15 stores in the last ten years, and currently employ over 100 employees in both North and South Carolina. Without the hard work and dedication of my employees, we would not be successful. My employees are given extensive training on how to cater to and satisfy our customers to keep them coming back again and again. Write a memo to your employees: To the employees of La Boutique chic: Let me begin by saying that because of your hard work and commitment to the company, we have had a very successful year. We have not only met the goals set for this year but we have exceeded them. Our company’s success is all due to your hard work and dedication. Because of our current success we are looking to open two new stores in the next 15 months. We could not do this without you! Our employees are our greatest asset! We want to thank you for all that you do for us by giving you a token of our appreciation. We are pleased to announce that we will be giving each employee a Christmas bonus this year. Your bonus will be included with your first paycheck in December......

Words: 298 - Pages: 2

Free Essay

Final Project

...Project Final Proposal Document Project Proposal This is the project proposal from Team EMC to Best Buy Bonsai for Website Project. Requirements from Best Buy Bonsai: The project proposal is based upon the requirements provided by Best Buy Bonsai as follows: Create an online website that provides online ordering and payment option, Online inventory list with photos and price Contact information and store locations listed Proposal from Team EMC Team EMC proposes to provide a website to Best Buy Bonsai by providing the following: Creating a public facing website for the company that allows online view of inventory and purchasing of products and payment option through PayPal. Provide Contact information and location of physical Stores Option for company to pay for online advertising of website Design Methodology: Team EMC will provide an Agile approach to the project with weekly iterations for Best Buy Bonsai to review each phase of the build out of the product for approval. Website Overview and Layout The URL to the website will be: http://www.bestbuybonsai.com/Index.html The website will show the following links: Home Page Link : http://www.bestbuybonsai.com/index.html The home page has links to Inventory, About Us, Payment Center and Contact us link The home page will show the name of the company Best Buy Bonsai, main phone number for the business and a Welcome message.est Buy Bonsai © 20 | 2007. Let us help you Inventory Link : ......

Words: 793 - Pages: 4

Premium Essay

Final Project

...ACC 610 Milestone One Guidelines and Rubric This is the first of three milestone assignments that will lead to completion of your course project. In this assignment, you will complete Critical Element III: GAAP vs. IFRS. Recall that, due to the sequencing of content for the modules, the critical elements are being prepared out of order. For the complete sequence, see the Final Project Guidelines and Rubric document. This milestone addresses the following course outcome:  Differentiate between the Generally Accepted Accounting Principles and the International Financial Reporting Standards for their impact on financial statements. If you have not already done so, select the company that you will use to build your portfolio. For detailed instructions, see the ACC 610 Final Project Document located in your Blackboard course. Specifically, the following critical elements must be addressed: III. GAAP vs. IFRS A. Explain the steps that would be needed for your selected portfolio company to transition from GAAP to IFRS. For example, what would this transition entail? What would your chosen company need to do? B. Explain how a financial statement would differ under IFRS as opposed to GAAP. i. How is a financial statement under IFRS different from GAAP? How is it the same? ii. What would the statements for your chosen company look like? Guidelines for Submission: Prepare your paper using Microsoft Word. It should be 2 to 3 pages in length, not including the...

Words: 598 - Pages: 3

Premium Essay

Final Project

...IT 510 Final Project Guidelines and Rubric Overview The final project for this course is the creation of a System Proposal Document. In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document. The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine. In this assignment, you will demonstrate your mastery of the following course outcomes:     Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information technology systems Communicate the paradigms, processes, and activities of systems development to diverse audiences Apply structure and object oriented analysis modeling techniques to analyze, design,......

Words: 2901 - Pages: 12

Premium Essay

Final Project

...Date: [2/23/2012] To: Lead Economist Laura From: [Tony Randall] Subject: Final Project Paper After completing this course in Microeconomics, I have learned quite a few things about this subject. It is my hope that what I have learned can be relayed to others and be beneficial to whoever decides to take this subject. I have learned how our economy works on a small scale and a large scale. There are many different kinds of economies in our world and each have an important role for running their respective countries. The first is the Centrally planned economy in which the government of that respective country decides how economic resources will be allocated. The second economy is a market economy in which the decisions of households and firms interacting in markets allocate economic resource. The third and final in the mixed economy in which most economic decisions come from buyers and sellers in markets but where the government plays a major role in allocating resources. our economy is slightly a mixed one .(Hubbard,R& O Brian,A, 2009) Supply and demand is one of the most basic Ideas of economics and it is the core of the market economy. Demand simply means how of a product or service is wanted by a consumer. The quantity demanded is the amount that people are willing to buy at a given cost. Supply represents how much the market can offer. The quantity supplied refers to the amount of a certain good producers are willing to supply when receiving a......

Words: 1239 - Pages: 5

Dark Phoenix | 1x83 Casa de muñecos | 50 mejores películas según IMDb 5