Case Study – Director’s Requirements/Director’s Request for PCs

Case Study – Director’s Requirements/Director’s Request for PCsCase Study- Director’s Request for PCs using MS Word Table, MS Access, and MS PowerPoint

Case Study – Using MS Office 2010 / 2013 / 365

Please use the document “READ FIRST – Case Study Instructions – Director’s Requirements” for each of the parts described below.

Part 1: Specifications Table (MS Word)
For a review of the complete rubric used in grading this exercise, click on the Assignments tab, then on the title Case Study Part 1 – PC Specs (Word)– click on Show Rubrics if the rubric is not already displayed.

For the case study provided to you, create MS Word tablesthat identify and contain the hardware and software requirements to meet the director’s requirements. TheMS Word document in its final form will include 6 MS Word tables. It will includea two-paragraph narrative summary that classifies the user type and identifies the PC categorythat will be recommended. The specific instructions are found in the table at the end of this file.

Students are expected to conduct external research to adequately address all aspects of the assignment requirements. It is suggested that students use a computer manufacturer’s site (i.e., Apple, Dell, Toshiba) to help in identifying all the components needed to meet the director’s requirements. Remember, although there are 5 computers to be purchased, you are required to configure only one, as the same onemay be purchased for all 5 employees.Any outside sources should be correctly cited in APA style at the end of the table.Students will need to include specific requirements from the case study to show why each item is being recommended.Each element listed below must be incorporated into the assignment. Omissions will result in loss of points.

Make and model and description are required, when at all possible.. For example, if the solution suggested is a 32” IBM Monitor, say so.Do not just say monitor because that does not provide sufficient information for a purchase.It is not necessary, for example, to identify the make and model of a USB port.

You must also consider components that may be a part of a machine or device. For example, the System Unit table will require elements such as USB ports. The monitor and mouse are typically separate devices on a desktop, but on a laptop or tablet they are often integrated. You should identify the various forms of input and output for your computer(s) on the Hardware table, whether they are separate devices or integrated elements.

There should be sufficient detail in this case study for procurement/purchasing personnel to buy the systems. Details are crucial.

Don’t focus on web references as to where the equipment can be found, although you may include your source(s). Focus on a solution to specific requirements.

Do not ‘number’ requirements in your table, even though they are numbered in the “Case Study – Director’s Requirements’ document. In many cases there are several requirements expressed in a single numbered listing. It’s important that you are clear about which requirement is addressed by a specific piece of hardware or software.

All identified hardware and software and relevant requirements must be listed in the tables. Mentioning an item or a requirement in the two paragraph narrative is perfectly ok, but it must also be in the tables.

Additional information:

You are supposed to tie back your recommended specs to all of the original requirements. Spell out the requirements that apply to your selection of hardware, etc and do so in the tables. Your customer would not appreciate having to go guess as to which requirement is being met by your items.
Suggested layout for the tables (other layouts are possible):
Four columns: Group (Input, Output, Etc), Device, Requirement; then one row for each Device. Arrange your tables so that you don’t leave lots of blank rows. See the Sample Tables for suggested layouts.
Include details where it makes sense. For example:
Scanner. This isn’t enough information to tell what the device is capable of. The customer wants to know how it’s “tricked out”. What model is it? Is it an All-In-One or standalone (why?)? How much RAM does it have? Does it have wireless capability? Can it accept camera memory cards? What resolution can it handle?
Adapter Cards. Your customer wants to create and edit high quality photos and videos. This usually means you’ll need a beefed-up graphics adapter. Be prepared to answer these questions: What model is it? How much RAM does it have? Is it integrated or discrete? This means you need to understand a little about graphics cards. Integrated means it is a chip (not an actual card) that is part of the motherboard. Typically, integrated video is ok but not as powerful as discrete video cards. These are actual adapter cards that have lots more circuitry and dedicated RAM than the smaller integrated chips. So they are more powerful and better for the customer’s requirements.
Monitor. While the software applications actually enable video creation and editing, the hardware enables the “high quality” requirement. You can hook up a display to the standard VGA port on the computer. However, the newer machines come with HDMI ports, which enables High Definition displays. If the recommended desktop or laptop has an HDMI port the user can get full 1080p on the video display unit. These specifications may satisfy the customer’s requirement to create and edit high quality digital photos and videos.
Ports. Everybody needs ports, right? I just described an important one – HDMI. How about Ethernet, SATA, FireWire, USB (2.0 or 3.0), media cards? Think of the data transfer/exchange requirements and what kind of speeds are necessary to make them work effectively.
External Storage. The customer may want users to exchange data quickly. Are CDs or DVDs the way to go? What about USB flash memory cards? Or some kind of network storage?
Here are the specific instructions:

# Requirement Points Allocated Comments
01 Open and save an MS Word document with the following name:
“Student’s Last Name Specs”
Example: Smith Specs
Set normal text to Arial, 12 point.
Create a Title Page which shows title, your first and last name, course and due date. 0.2 This is the font in normal paragraphs. Heading and title fonts may be a larger size.
The title must be
Specification for the Director
your name
the course
due date.
Center the title on the page
02 Use a footer to create page numbers for all pages except the title page.
Place the page numbers on the right side of the footer. 0.2
Take a look at the Sample Tables for ideas on how to best layout your tables.
03 Table #1 – Create a table that identifies the manufacturer, type (desktop, laptop, tablet) and model of computer being recommended for purchase. If you are recommending a computer that is being built from components rather than purchased as a unit, indicate that in the type column. The table must be labeled “Recommended Computer.” 0.5 Remember that the requirement is to identify and configure only a single computer.
04 Table #2 – Create a table that shows all of the required Hardware devices. The table must be labeled “Hardware Devices.”User requirements are posted in the case study. 0.1
Remember to include any items that might be integrated with the system you have chosen.The table should have all the necessary columns, rows, and column headings to show the following:
05 • Input Devices – Identify each device type, including make/model, and show which specific user requirements are met.
0.5 For example, you might include the following information in your table to describe one Input Device:
Input Device – 1.2 Megapixel video camera, model, from xxxx supplier.
Requirements met – create video files.
06 • Output Devices – Identify each device type, including make/model, and show which specific user requirements are met. 0.5 Make, model and description are required.
07 • Communication Devices – Identify each device type, including make/model, and show which specific user requirements are met. 0.5 Make, model and description are required.
08 • Storage Devices – External (including portable) storage devices and show which specific user requirements are met 0.5 Make, model and description are required.
09 • Other Peripheral Devices – Identify each device type, including make/model, and show which specific user requirements are met.
• 0.5 Make, model and description are required.
10 Table #3-Create a table that shows the various required System Unit Components. The table must be labeled “System Unit Components.” 0.1
The System Unit Components must reflect the type of system identified for purchase by the Hardware devices table.
The table should have all the necessary columns, rows, and column headings to show the following:
11 • Processor – Include type and clock speed and state how processor type and clock speed meets the Director’s specific user requirements. 0.5 Identify manufacturer – Intel, AMD, Apple, etc.
12 • RAM – Include type and amount and state how RAM type and amount meets the Director’s specific user requirements. 0.3 Type and amount are sufficient.
13 • Adapter Cards – Identify each type and show which specific user requirements are met. 0.5 Types sufficient unless an unusual adapter card is required.
14 • Ports – Include types, how many of each type, and show which specific user requirements are met. 0.3 Types and number are sufficient. Be sure to include all that are integrated with the system you are configuring.
15 • Storage Devices – Identify internalsystem unit storage devices, size of hard drive, and state how each storage device and the hard drive size recommended meets specific user requirements. 0.5 Types and sizes are sufficient. Remember, this is internal storage, including the hard drive.
16 Table #4-Create a table that shows the various required Application Software. The table must be labeled “Productivity Software.” Specific product names MUST be listed. 0.1
Review the user requirements to ensure that software has been selected to meet each need.
The table should have all the necessary columns, rows, and column headings to show the following:
17 • Identify types of software, recommended specific product names, and how this software meets specific user requirements. 2.0 Be sure to include product name and version.
18 Table #5-Create a table shows that the various required System Software. The table must be labeled “System Software.” Include one operating system and at least three utility programs. 0.1
The table should have all the necessary columns, rows, and column headings to show the following, and each component must be tied to the computers in your Recommended Computers table:
19 • Operating System – Identify a specific operating system and version 0.75 Identify company supplying the OS (Intel, AMD, Apple, etc.). Include version #. Identify to which computer(s) this component will be assigned.
20 • Utility Programs – Include at least 3 utility programs that do not typically come installed with the OSand state how each utility program meets specific user requirements. 0.75 Identify utility programs that do not come installed with the OS. For example, choose and include a particular security program such as Norton or McAfee, etc.
21 Table # 6-Create a table that shows the required Internet connectivity and Web-hosted applications and services. The table must be labeled “Internet Connectivity & Web Services” 0.1
Review what specific user requirements related to online work or file sharing that have been included in the Director’s list of requirements.
The table should have all the necessary columns, rows, and column headings to show the following:
22 • Identify the specific ISP that should be used for Internet connectivity. 0.5 ISP type meets specific user requirements in the case study.
23 • Identify the specific Web services that should be used. 0.5 State how the Web services that were identified meet specific user requirements in the case study
24 Write a brief two-paragraph narrative that categorizes the user type, identifies the category of PC (s) required, and summarizes your recommendations.
NOTE: There are 13 office requirements listed in the case study. Each one will need the appropriate hardware and software that will improve the productivity in the office. The users are the people working in the office that will be affected by the 13 requirements. The type of PC could be anything from alaptop to a server. It is essential that you connect the requirements with your recommendations. 1.0 Two well-written, concise and organized paragraphs not to exceed one-half a page.Place narrative after the title page but before the tables.

25 Grammar, syntax, punctuation, spelling, and APA formatting as necessary. Points WILL be deducted if errors are found in the summary or in the tables. 0.5 Proofread your entire file before submitting.

Case Study Instructions
Director’s Request for PCs
Completion of the Case Study will utilize (1) an MS Word Table, (2) an MS Access database, and (3) an MS PowerPoint Presentation

You will meet the Director’s requirements that are described on this page by creating and submitting aWord Table (Part 1), an Access Database (Part 2); and a PowerPoint Presentation (Part 3). These 3 assignments are due on separate dates. See the Course Schedule for due dates.

NOTE: the standard applications to use for these 3 assignments are those within Microsoft Office. MS Access is available only in the Professional OFFICE package. If you are a MAC user OR if you have absolutely no way to use a machine on which MS Access has been loaded, you may download and use OpenOffice/Open Libre – for the database project only. Please inform your instructor if you are going to use Open Office for the database assignment.
Instructions for installing Open Office can be found in “Open Office – Database Alternative for Mac OS X”under the Office Resources topic.

Case Study – Director’s Requirements
Your office has outgrown its old desktop machines and is in the market for new PCs, but would like some guidance on what to purchase. The Director wants to ensure that the office obtains PC machines that meet the requirements stated below. You, as an employee of a small educational company, have been tasked to buy 5 PCs and associated equipment for the office. You only need to determine the specifications for ONE PC, not five. The office will likely buy five of the same computer model/configurations you propose.
The Director has defined some capabilities that the PCs will need to have to ensure optimal performance. These tasks and system needs are collectively the office’s requirements. The requirements are as follows:

1. Create documents, spreadsheets, presentations, and send and receive email.

2. Participate in online video conferences, web courses and forums (the Director is a part-time professor at a local university).

3. Create and edit audio and video files and share video and audio files via emails, instant messaging, and in chat rooms via mobile devices.

4. Create small databases to manage all audio, video and photo data.

5. Take high quality digital photos and videosand download them to the PC as well as scan and edit the photos and videos. Manipulate/edit various image and video formats (in the relevant table,please specify at least two image and two video formats that can be accommodated by your solution(s)). .

6. Print documents to include photo quality color printing.

7. Manipulate pdf files, including editing pdfs, conversion from pdf to Word and vice versa.

8. Transfer information (audio, video and photos) between PC machines.

9. Manage the Director’s schedule by using an online calendar and day planner.

10. Utilize the internet to make online purchases, conduct banking services and research new audio, video and photo editing methods using a broadband service (in the relevant table,please specify service provider).

11. Connect all required peripheral devices you deem necessary to the system unit.

12. Protect the PC and all components from dirty electrical power including under voltage (brownout or blackout) and overvoltage (power surge or spike).

13. Manage and protect the system, data, and information while working on the Internet including scanning all incoming emails, email attachments, and files downloaded from Web-based sources; firewall, virus and spyware (security) protection; and checking websites for phishing and fraudulent activities.

Your specification must address each of the 13 items listed in the requirements.
Information Security

Give a summary of the article this Article below;

Issues in Informing Science and Information Technology Volume 4, 2007
Framing the Corporate Security Problem:
The Ecology of Security
Robert Joseph Skovira
Robert Morris University, Moon Twp, PA, USA
Security and information systems are intertwined.
The costs of secure systems are in the billions
of dollars. In the digital world, security vulner
abilities and threats work c
ontrary to the security
goals of confidentiality, integrity
, and availability of informati
on systems. The essay describes a
view of organizations and their policies, networ
k systems, operating systems, software applica-
tions, information, and people joined interactivel
y and dependently in an environment. The paper
presents an ecological conception of security.
: Security, Information security, Secure pr
ogramming, Secure computing, Ecology
Security and information systems are intertwined.
The complex interacti
ons and interconnections
among people, software applications, networks,
operating systems, and organizational policies
create myriads of exploitable points. Daily newspa
pers present accounts of intrusions, stolen lap-
tops, and other security breakdowns. The global im
plications of a security meltdown of apocalyp-
tic proportions has been the guise of a novel (Bro
wn, 1998). Intrusions and attempts at intruding
are happening continuously at every moment of
an information system’s life. According to
sumer Reports
(2006), in any given 24 hour period th
ere are approximately 60 million intrusion
attempts. The estimated cost of security defenses
in the face of attacks is approximately $7.8 bil-
lion for 2004-2006; the costs of spamming and viruses are approximately $5.2 billion; the costs of
spyware intrusions are approximately $2.6 b
illion. Phishing intrusions
amount approximately
$630 million (
Consumer Reports
, 2006). There are other estimates (Bodin, Gordon & Loeb,
2005; Kros, Foltz & Metcalf, 2004-2005). What the co
st is now or will be in a year’s time is any-
one’s guess. In the Information Age, where in
terconnectivity and information access and avail-
ability are paramount, malware and malicious expl
oitation of information system vulnerabilities
have become epidemic (Seshadri, Luk, Perri
g, Van Doorn, & Khosla, 2006; Whitman, 2003).
Security and security awareness are necessary elements of a secure environment, even as people
have access to required information and inform
ation resources. “Information security involves
making information accessible to those
who need the information, while main-
taining integrity and confidentiality”
(Carstens, McCauley-Bell, Malone, &
DeMara, 2004, p. 68).
Security Vulnerabilities
In the digital world, where an individ-
ual’s desk top computer is networked
not only within the organization but also
to the world via the WWW, it is safe to
Material published as part of this
publication, eith
er on-line or
in print, is copyrighted by the Informing Science Institute.
Permission to make digital or pape
r copy of part or all of these
works for personal or classroom use is granted without fee
provided that the copies are not made or distributed for profit
or commercial advantage AND that
copies 1) bear this notice
in full and 2) give the full citation on the first page. It is per-
missible to abstract these works so
long as credit is given. To
copy in all other cases or to re
publish or to post on a server or
to redistribute to lists requires specific permission and payment
of a fee. Contact Publisher@In to request
redistribution permission.
Framing the Corporate Security Problem
say that everything: the computer and its opera
ting system, the network and web site, the infor-
mation on it or in corporate databases, the soft
ware used to conduct business and query the data-
bases, and the person, is vulnerable and subject to
some kind of malicious attack. “A vulnerability
is a weakness…that might be exploited to
cause loss or harm” (Pfleeger, 1997, p. 3).
Hardware is vulnerable to interruptions (also
called “denial of service”) and interceptions (by
stealing) (Pfleeger, 1997; Graff & van Wyk, 2003). The accessibility and visibility of computers
(laptops are stolen), printers, even cables, and
equipment (hard drives are recycled) of all kinds
make them vulnerable to security breakdowns (Pfleeger, 1997; Whitman, 2003; Volonino & Rob-
inson, 2004).
Software is open to interruptive (b
eing deleted) threats. Software, at
least in part, and its function-
ality can be captured and used without appropria
te permissions. Software
can be changed in un-
permitted ways by unauthorized pe
rsons (Pfleeger, 1997; Whitman, 2003).
Information can be subject to unauthorized capture
and use. Use of information can be disrupted.
Unauthorized access to an information system ca
n lead to information being inappropriately
changed, even made up, or a
ppropriated contrary to privacy laws (Pfleeger, 1997; Whitman,
2003; Volonino & Robinson, 2004).
People are especially prime points of exploita
tion for unpermitted access to and use of informa-
tion and its system. People become opened gates fo
r incursions into applications, operating sys-
tems, and networks (Carstens et al., 2004; Ba
iles & Templeton, 2006; Campbell, 2006). Informa-
tion systems become vulnerable when key person
nel are unavailable and are not reliable. This
happens in many possible ways, but the chief
manner is framed by and works through people’s
mental models of trust. There is also a problem
with usability designs of systems. For the user,
security ought to be transparent. People will try
to bypass system security whenever confronted
with an accessibility choice allowed by an easy
security routine as opposed to a difficult security
check (Pfleeger, 1997; Howard, LeBlanc, & Viega, 2005; Mercuri, 2006).
Security Threats
Information systems and their components are threatened in at least four different ways. An in-
formation system suffers an “interruption” wh
en a breakdown of functionality and use happens
because of an unauthorized intrusion into the
information system (Pfleeger, 1997; Volonino &
Robinson, 2004). An “interception” occurs as the
“hijacking” or “piracy” of an information sys-
tem or one of its components in order to gain una
uthorized rights to and use of available software
applications or stored information (Pfleeger, 1997; Volonino & Robinson, 2004). A “modifica-
tion” is the changing of informational content or
software code without the correct permissions as
a consequence of intrusions (Pfleeger, 1997; Sc
hneier, 2000). A “fabrication” is the unpermitted
change of software code or stored informati
on as a result of an exploitative intrusion. The
changes may be additive or subtractive
(Pfleeger, 1997; Volonino & Robinson, 2004).
Security Goals
There are three goals which security plans and pr
actices attempt to meet: confidentiality in the
system, the system’s integrity, and the system’s
continual ability to make information and other
system resources available to users. Users ought to
be confident about the proper use of the in-
formation system. This means that only the prope
r personnel are allowed to use the information
system and its resources in the proper manner, namely information system access with permission
(Hartman, Flinn, Beznosov, & Kawamoto, 2003). “C
onfidentiality” refers to the availability of
system resources only to people permitted to access
them. Having permission to use an informa-
tion system’s resources means that the user must
be authenticated—checked
to see if the user is
“legal”–in order to be authorized to use the syst
em. Only authorized persons have permissions to

find the cost of your paper