1,896 research outputs found
Recommended from our members
MANAGING AND SECURING ENDPOINTS: A SOLUTION FOR A TELEWORK ENVIRONMENT
This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage endpoints, the IT Department was focused on being able to carry out their responsibilities for providing software deployments, software updates, operating system support, and remote support or troubleshooting. Regarding the security of their endpoints, the IT Department was concerned with being able to properly ensure endpoint compliance and provide adequate threat protection.
Ultimately a decision was made to utilize various cloud services from Microsoft to assist the IT Department with carrying out their responsibilities in the new telework environment. The project analyzed the cloud technology used, e.g., Microsoft Azure Active Directory, Endpoint Manager, a Cloud Management Gateway, Intune, and Microsoft Defender for Endpoint; and examined some of the current on-premises infrastructure technology such as Microsoft Endpoint Configuration Manager, Active Directory, VPN, and Group Policy. The project also documented the implementation steps for configuring the cloud services and onboarding the endpoints to be properly managed and secured.
The contribution of this project is: (i) to show how the H2O district examined the H2O district’s current infrastructure, (ii) identified any shortcomings with their current technological solutions, (iii) developed an understanding of the IT Departments service level agreements, and (iv) ultimately created a solution that allowed H2O to carry out its core responsibilities in the new telework environment. The project proved successful upon implementation and the IT Department was able to gain significant benefits by migrating some of their workloads to the cloud. The project also reports on some of the potential challenges the organization may face. Those include keeping up with the growing trend in hybrid remote work, managing the flow of information, and establishing zero trust. The solution implemented in this project can serve as an example for IT Departments facing similar challenges; namely, effectively managing and securing their endpoints in a telework environment
Precognition: Automated Digital Forensic Readiness System for Mobile Computing Devices in Enterprises
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity of the system. In this research, the authors have designed a security analysis and digital forensic readiness system targeted at smartphones and wearables in an enterprise environment. The proposed system detects applications violating security policies, analyzes Android and iOS applications to identify possible vulnerabilities on the server, apply machine learning algorithms to improve the efficiency and accuracy of vulnerability prediction. The System continuously learns from past incidents, proactively collect required information from the devices which can help in digital forensics. Machine learning techniques are applied to the set of features extracted from the decompiled Mobile applications and applications classified based on consisting of one or more vulnerabilities. The system was evaluated in a real-world enterprise environment with 14151 mobile applications and vulnerabilities was predicted with an accuracy of 94.2%. The system can also work on virtual instances of the mobile devices
Дослідження системи операційного менеджменту організації, на прикладі Apple Computer, Inc
The object of investigation is the process of managing of operating activities of Apple, Inc.
The aim of the work is to formulate theoretical approaches and to develop practical recommendations on directions of improvement of operating management at the organization.
Research methods cover methods of analysis, synthesis, comparison, detailing, system approach.
This master’s research paper analyzes the operational management of Apple, Inc. and provides recommendations for it’s improvement. In particular, the main directions of solving the problems of operational management of the company have been outlined, the proposals on improvement of expansion distribution network and organization of innovative activity of the Apple Inc. have been made.Об'єкт дослідження ‒ процес управління операційною діяльністю компанії Apple, Inc.
Мета дослідження - формування теоретичних підходів та розробка практичних рекомендацій щодо напрямів вдосконалення системи операційного менеджменту компанії Apple, Inc.
Методи дослідження: методи аналізу, синтезу, порівняння, деталізації, системний підхід.
У роботі проведено аналіз операційного менеджменту Apple, Inc., а також викладені рекомендації щодо його вдосконалення. Зокрема, окреслено основні напрями вирішення проблем операційного менеджменту компанії, внесено пропозиції щодо розширення дистриб’юторської мережі, а також вдосконалення організації інноваційної діяльності Apple Inc.Introduction 6
CHAPTER 1 THE THEORETICAL FRAMEWORK OF OPERATIONAL
MANAGEMENT 8
1.1 Meanings and definition of operational management 8
1.2 Principles and methods of operations management 12
1.3 Factors affecting the Operations activity of Apple Inc. company 21
CHAPTER 2 RESEARCH AND ANALYSIS 31
2.1 Сompany introduction 31
2.2 SWOT - analysis of Apple Inc. Company 46
2.3 Analysis of operation management at Apple Inc 50
CHAPTER 3 RECOMMENDATIONS FOR IMPROVING OF OPERATIONAL MANAGEMENT AT THE APPLE INC 63
3.1 The main directions of solving operational management problems of the company 63
3.2 Recommendations concerning improvements of Distribution in the organization 65
3.3 Recommendations concerning improvements of innovative activity at the organization 67
CHAPTER 4 SPECIAL PART 73
4.1 Current trends in the field 73
4.2 Company policy in the market 75
CHAPTER 5 RATIONALE FOR RECOMMENDATIONS 77
5.1 Statement for recommendations at Company 77
CHAPTER 6 OCCUPATIONAL HEALTH AND SAFETY AT THE ENTERPRISE 79
6.1 The aim of occupational health 79
6.2 Organization of occupational health and safety at the enterprise 86
CHAPTER 7 ENVIRONMENTAL ISSUES 92
7.1 Environmental issues in the field 92
7.2 Еnvironmental factors 94
Conclusions 96
References 98
Appendices 10
Dark clouds on the horizon:the challenge of cloud forensics
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Mobile Learning at ACU
On Your Wish List: The Latest Toys for Your System
Virtual Hands-on Learning: The Aesthetic Camera in Second Life
Unified Communications-Coming Soon to the University of the Pacific
Reality Check on Virtualization
Fixed Wireless at NYULMC
lnstitutional Excellence Award
Bill D. Morris Award
ACUTA Ruth A. Michalecki Leadership Award
Interviews
President\u27s Message
From the Executive Directo
Digital Security & Grantcraft Guide : an Introduction Guide for Funders
Digital security breaches can cause harm to grantees, as well as their clients, beneficiaries, and partner organizations. These threats also pose a risk to grantmakers and to the larger strategies of impacted organizations. Security leaks can compromise an organization's ability to carry out its work, and can erode trust between civil society actors.This guide is to help grantmakers both assess and address digital security concerns. It explores the types of digital threats against civil society and the obstacles to addressing them. It explains how to conduct a digital security "triage" of grants to elevate the digital security of your whole grant portfolio; while playing special attention to the highest risk grantees. And it provides suggestions for pathways to think more systematically about digital security
Policy framework for adoption of bring your own device (BYOD) by institutions in Nigeria
Mobile computing makes access to data and services available anytime and anywhere. The recent increase in the number of mobile devices like smartphones and tablets has given rise to a phenomenon known as “IT Consumerization” that focuses on satisfying the needs of the consumers to improve their productivity for the benefit of their organization. Recent report from mobile trends indicates that in 2014 alone, manufacturers will ship more than a billion Android devices. It is estimated that seven out of every ten employees (7/10) will use their mobile devices for work in corporate environments. Mobile devices according to studies are known to be more vulnerable compared to laptops and PCs due to their small size, mobility and general lack of protection against viruses and malware. The use of these devices therefore can impact negatively on corporate networks unless properly and effectively managed. Organizations are now adopting a program known as „bring your own device‟ (BYOD) that will enable them capture, register, and manage the mobile devices that connect and use their corporate infrastructure to guarantee the security of the infrastructure and data of the organization. They achieve this by putting in place strategies and policies that involves all stakeholders. This paper surveys literature to extract useful information that serve to enlighten the community of workers and IT leaders on the current and rapid growing phenomenon of BYOD, including the strategies for deployment, BYOD models, benefits, security threats on corporate and user data and infrastructure. The study presents guidelines and a framework for adoption of BYOD by institutions of higher learning in Nigeria in order to improve learning and provide a better workplace. The study will enable IT leaders formulate policies and guidelines that will guarantee smooth adoption and usage of BYOD by their various organizations
Fairphone a social enterprise on its challenging way to expand beyond the niche market and make fairer smartphones an attractive alternative for mass consumers
The purpose of this work project is to give students insights into a pioneering social enterprise in the consumer electronics industry, a sector that is often associated with negative social and environmental impacts and involves very complex supply chains which make the establishment of sustainability measures in lower tiers difficult. This work aims to describe and analyse Fair-phone’s history, its approach towards increasing its phones’ “fairness”, and tensions that the company has encountered in the course of its growth-process. Through a case study format, students also learn about sustainability issues in the consumer electronics industry and related political reactions, and about Fairphone’s competitors and their sustainability approaches
- …