SlideShare a Scribd company logo
1 of 18
CINCINNATI WINDOW SHADE
  TECHNOLOGY OVERVIEW
 TEAM 5: Alex Rippe, Justin Cline-Bailey, Rodney Phelps
                     INFO 357-01
Introduction
• Family-owned business since 1933

• They install and service everything from
  manual to high tech shade systems

• They sell, service, maintain, and provide
  warranty services for multiple manufacturers
Technology History
• Their initial intranet was wired as thin net

• Upgraded up to 1 GB ethernet and wireless
  access

• Using some cloud based servers, such as
  Google Calendar.
Technology in Use
• Full T1 supporting a network of 11 PCs, 2 laptops,
  2 desktop printers, a shared Fax/copier/printer,
  drafting plotter, and a digital phone system.
• They maintain video and motion sensor security,
  along with the ability to remote monitor their
  security camera feeds
• They help to maintain two websites
Physical Layout
• Using a full T1 to support digital phone system
  and data service
• Services extend from the CSU/DSU to the
  front office area
• The T1 is extended to the wireless router with
  a built-in switch.
• Services go from the router to a 36 port
  Gigabit switch
• Started with Thin net
• Currently running a combination of cat5 and
  cat5e
• Potential throughput issues with cat5 cable’s
  ability to handle the 1 Gigabit Ethernet
  connection
• Cable runs not tagged at switch
• Their setup uses a Wireless N router with a
  built-in 4-port switch
• Networked with 10/100 or 1 Gigabit Network
  Cards
• The wireless access point is both secured and
  encrypted
Networking
• Running a P2P network
• Using one workstation as a file share and data
  storage device
• Multifunction fax device is shared through
  that workstation.
Equipment
• Computers: Most work stations contain Power
  Spec computers. 1 IBM and 1 HP as well.
• Printers: Two directly connected printers and a
  plotter. One printer is a multi-use and is a fax
  machine as well
• Other: Two credit card terminals. Video
  recording and Security System
• Inventory: There is no system in place to track
  assets (serial numbers or asset tags)
Software
• OS: Most systems are running Windows 7 Pro,
  3 are running XP, XP Home, or XP Pro. Some
  laptops are using Vista
• Anti-Virus: Norton 360
• Other: Microsoft Office, Peach Tree, and an
  industry specific design program
• Licensing: All softwares are licensed and
  recorded
• Maintenance: All are set to automatic updates
File Storage
• Employees are given a share of a file server
• Server is backed up daily on an external hard
  drive and then to Iron Mountain weekly
• Some information is still stored in paper
  format
Email
• External email service provided by web host
• Google Calendar, synched with Outlook, is
  used to share calendars with Mason Location
Security
• Physical: Motion sensors and cameras ran
  through a cellular service
• Logical: Microsoft’s built-in firewall. Router
  software provides a firewall. Data encryption
  is not being used.
Network Diagram
Policies
• Currently there are no written information system
  policies.
• This could be an issue with employees not
  understanding issues related to information systems
  and security
• Potentially leaves the company exposed to loss and
  or down time
Merchant’s Concerns
• What are the government’s requirements for
  storage of email and protection of privacy of
  employee and customer information?
• Which side of the firewall should a VPN be
  placed?
Recommendations
•Cisco recommends placing the VPN on an
inbound port of the firewall.
•Remove the switch and router and mount it on
a shelf or place it in a closet
•Label cabling to simplify troubleshooting
•Best solution: place router, switch, back up
device, power backup, and file server all in one
closet
Recommendations Cont.
• Hide the SSID on the wireless access point
  from public view
• Install a mount in the wire closet for the
  CSU/DSU to remove from the floor
• Written policy should be created to give
  guidance for automation security and
  acceptable use for technology

More Related Content

What's hot

Industrial Internet
Industrial InternetIndustrial Internet
Industrial InternetAlex Lavell
 
Kevin Wilhite 2015-Resume
Kevin Wilhite 2015-ResumeKevin Wilhite 2015-Resume
Kevin Wilhite 2015-ResumeKevin Wilhite
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink AndreAndrzejSzadzins
 
Wireless Connections In The Or Display
Wireless Connections In The Or DisplayWireless Connections In The Or Display
Wireless Connections In The Or Displaygreatorrn
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...Golars Networks
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drivesmuthamizh adhithan
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusEngi Admi
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementInductive Automation
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 EraShinsuke SUZUKI
 
Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Ismanoharparakh
 

What's hot (20)

Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Kevin Wilhite 2015-Resume
Kevin Wilhite 2015-ResumeKevin Wilhite 2015-Resume
Kevin Wilhite 2015-Resume
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink
 
Wireless Connections In The Or Display
Wireless Connections In The Or DisplayWireless Connections In The Or Display
Wireless Connections In The Or Display
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
venky 123
venky 123venky 123
venky 123
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGenius
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 Era
 
Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Networking Trends
Networking TrendsNetworking Trends
Networking Trends
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Is
 

Viewers also liked

Bai 20 tin hoc 10
Bai 20 tin hoc 10Bai 20 tin hoc 10
Bai 20 tin hoc 10novemberha
 
Sochi 2014 Opening Ceremony: A Picture Storybook
Sochi 2014 Opening Ceremony: A Picture StorybookSochi 2014 Opening Ceremony: A Picture Storybook
Sochi 2014 Opening Ceremony: A Picture Storybookmattmusick
 
Excess Sugar And Calories Ruin Your Weight Loss Efforts
Excess Sugar And Calories Ruin Your Weight Loss EffortsExcess Sugar And Calories Ruin Your Weight Loss Efforts
Excess Sugar And Calories Ruin Your Weight Loss EffortsHWLXPAB
 
Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1zenhee
 
Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01zenhee
 
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEMOPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEMYousef Sardahi
 
Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1zenhee
 
Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01zenhee
 
ns-3: History and Future
ns-3: History and Futurens-3: History and Future
ns-3: History and Futuremathieu_lacage
 
Himiin holboo 3
Himiin holboo 3Himiin holboo 3
Himiin holboo 3zenhee
 
Hemjigdehuun 2
Hemjigdehuun 2Hemjigdehuun 2
Hemjigdehuun 2zenhee
 

Viewers also liked (14)

Bai 20 tin hoc 10
Bai 20 tin hoc 10Bai 20 tin hoc 10
Bai 20 tin hoc 10
 
Sochi 2014 Opening Ceremony: A Picture Storybook
Sochi 2014 Opening Ceremony: A Picture StorybookSochi 2014 Opening Ceremony: A Picture Storybook
Sochi 2014 Opening Ceremony: A Picture Storybook
 
Excess Sugar And Calories Ruin Your Weight Loss Efforts
Excess Sugar And Calories Ruin Your Weight Loss EffortsExcess Sugar And Calories Ruin Your Weight Loss Efforts
Excess Sugar And Calories Ruin Your Weight Loss Efforts
 
Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1
 
Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01
 
Ta konsep aktiva
Ta konsep aktivaTa konsep aktiva
Ta konsep aktiva
 
Konsep aktiva
Konsep aktivaKonsep aktiva
Konsep aktiva
 
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEMOPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
 
Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1Hemjigdehuun negj hicheel1
Hemjigdehuun negj hicheel1
 
Tipos de redes.
Tipos de redes.Tipos de redes.
Tipos de redes.
 
Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01Alkaanid10 100618044137-phpapp01
Alkaanid10 100618044137-phpapp01
 
ns-3: History and Future
ns-3: History and Futurens-3: History and Future
ns-3: History and Future
 
Himiin holboo 3
Himiin holboo 3Himiin holboo 3
Himiin holboo 3
 
Hemjigdehuun 2
Hemjigdehuun 2Hemjigdehuun 2
Hemjigdehuun 2
 

Similar to Cincinnati window shade technology overview

construct a network
construct a networkconstruct a network
construct a networkAbeera Naeem
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkRohini SharmaOhlan
 
HOME AUTOMATION USING INTERNET OF THINGS.pptx
HOME AUTOMATION USING INTERNET OF THINGS.pptxHOME AUTOMATION USING INTERNET OF THINGS.pptx
HOME AUTOMATION USING INTERNET OF THINGS.pptxKhanArshidIqbal
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 
Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip Carey
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
Suresh_ System administrator.doc
Suresh_ System administrator.docSuresh_ System administrator.doc
Suresh_ System administrator.docSuresh Annadurai
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
Design computer system group a
Design computer system group aDesign computer system group a
Design computer system group aRaheem Mohamed
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 

Similar to Cincinnati window shade technology overview (20)

construct a network
construct a networkconstruct a network
construct a network
 
GRANT DELP724
GRANT DELP724GRANT DELP724
GRANT DELP724
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer network
 
HOME AUTOMATION USING INTERNET OF THINGS.pptx
HOME AUTOMATION USING INTERNET OF THINGS.pptxHOME AUTOMATION USING INTERNET OF THINGS.pptx
HOME AUTOMATION USING INTERNET OF THINGS.pptx
 
Vp ns
Vp nsVp ns
Vp ns
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
Suresh_ System administrator.doc
Suresh_ System administrator.docSuresh_ System administrator.doc
Suresh_ System administrator.doc
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Sathish Resume New_New
Sathish Resume New_NewSathish Resume New_New
Sathish Resume New_New
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Design computer system group a
Design computer system group aDesign computer system group a
Design computer system group a
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
PPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptxPPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptx
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Cincinnati window shade technology overview

  • 1. CINCINNATI WINDOW SHADE TECHNOLOGY OVERVIEW TEAM 5: Alex Rippe, Justin Cline-Bailey, Rodney Phelps INFO 357-01
  • 2. Introduction • Family-owned business since 1933 • They install and service everything from manual to high tech shade systems • They sell, service, maintain, and provide warranty services for multiple manufacturers
  • 3. Technology History • Their initial intranet was wired as thin net • Upgraded up to 1 GB ethernet and wireless access • Using some cloud based servers, such as Google Calendar.
  • 4. Technology in Use • Full T1 supporting a network of 11 PCs, 2 laptops, 2 desktop printers, a shared Fax/copier/printer, drafting plotter, and a digital phone system. • They maintain video and motion sensor security, along with the ability to remote monitor their security camera feeds • They help to maintain two websites
  • 5. Physical Layout • Using a full T1 to support digital phone system and data service • Services extend from the CSU/DSU to the front office area • The T1 is extended to the wireless router with a built-in switch. • Services go from the router to a 36 port Gigabit switch
  • 6. • Started with Thin net • Currently running a combination of cat5 and cat5e • Potential throughput issues with cat5 cable’s ability to handle the 1 Gigabit Ethernet connection • Cable runs not tagged at switch
  • 7. • Their setup uses a Wireless N router with a built-in 4-port switch • Networked with 10/100 or 1 Gigabit Network Cards • The wireless access point is both secured and encrypted
  • 8. Networking • Running a P2P network • Using one workstation as a file share and data storage device • Multifunction fax device is shared through that workstation.
  • 9. Equipment • Computers: Most work stations contain Power Spec computers. 1 IBM and 1 HP as well. • Printers: Two directly connected printers and a plotter. One printer is a multi-use and is a fax machine as well • Other: Two credit card terminals. Video recording and Security System • Inventory: There is no system in place to track assets (serial numbers or asset tags)
  • 10. Software • OS: Most systems are running Windows 7 Pro, 3 are running XP, XP Home, or XP Pro. Some laptops are using Vista • Anti-Virus: Norton 360 • Other: Microsoft Office, Peach Tree, and an industry specific design program • Licensing: All softwares are licensed and recorded • Maintenance: All are set to automatic updates
  • 11. File Storage • Employees are given a share of a file server • Server is backed up daily on an external hard drive and then to Iron Mountain weekly • Some information is still stored in paper format
  • 12. Email • External email service provided by web host • Google Calendar, synched with Outlook, is used to share calendars with Mason Location
  • 13. Security • Physical: Motion sensors and cameras ran through a cellular service • Logical: Microsoft’s built-in firewall. Router software provides a firewall. Data encryption is not being used.
  • 15. Policies • Currently there are no written information system policies. • This could be an issue with employees not understanding issues related to information systems and security • Potentially leaves the company exposed to loss and or down time
  • 16. Merchant’s Concerns • What are the government’s requirements for storage of email and protection of privacy of employee and customer information? • Which side of the firewall should a VPN be placed?
  • 17. Recommendations •Cisco recommends placing the VPN on an inbound port of the firewall. •Remove the switch and router and mount it on a shelf or place it in a closet •Label cabling to simplify troubleshooting •Best solution: place router, switch, back up device, power backup, and file server all in one closet
  • 18. Recommendations Cont. • Hide the SSID on the wireless access point from public view • Install a mount in the wire closet for the CSU/DSU to remove from the floor • Written policy should be created to give guidance for automation security and acceptable use for technology