Critical Infrastructure
The State in Which I Live
I live in North Carolina State. Some sectors in this state include database hosting, NC identity management, and NCID password reset or unlock. Database hosting is concerned with providing organizations with physical and cloud database hosting solutions. Further, some critical services this sector offers include administration of database infrastructure and securing and protecting personal and organizational data. Consultation and monitoring databases are used to maintain service levels that accommodate the security concerns of individual citizens and organizations doing business (Rivenbark et al., 2001). The only IT threat regarding database hosting lies in permitting interoperability between applications running on different operating systems and allowing standard data exchange. The other sector of identity management provides organizations with the minimum set of principles that should be met to regulate access to the organizations’ information systems (Rivenbark et al., 2001). Organizations must ensure all parties’ authentication and authorization before granting them accessibility permissions.
For a copy of the “Critical Infrastructure” contact us at eminencepapers.com.
The last sector for consideration in my North Carolina State is identified as the NCID password reset or unlock. This sector allows North Carolina residents and businesses to manage the NCID effectively accounts they regularly use to log in to state websites in search of various websites. The NCID password reset grants users the ability to reset the passwords for their accounts using either their computers or mobile phones (Rivenbark et al., 2001). The threat here lies in the fact that third parties can access an individual’s phone and proceed to reset their passwords, giving room for the data breach. The information stolen from these accounts may compromise the future lives of these employees.
The City in Which I Live
Currently, I am residing in New Bern City, North Carolina. New Bern City comprises various sectors supporting the delivery of services to the end consumer. These sectors include enterprise active directory services, Microsoft 365 and collaboration services, and training and user resources. The active enterprise directory is essential since it provides organizations with a centralized, authoritative guide of network-based resources such as applications, file shares, and user data (Rivenbark et al., 2001). This sector enables organizations to reduce their infrastructure as well as operating costs while accessing network resources in the course of their operations. This sector is primarily owned and used by the IT department; thus, organizations stand to benefit by enforcing security policies and managing software installations with their respective updates.
Furthermore, Microsoft 365 and collaboration services foster collaboration among employees within the organization through Microsoft Teams. Employees can interact with each other via chat, audio calling, and audio and video conferences. Also, this sector avails a cloud-hosted contact center that enables Gloomdecor LLC to provide better customer service and experience than previous systems. Leveraging the contact center within the organization delivers state-of-the-art functionality that includes but is not limited to omnichannel routing, workforce optimization, and automation intelligence. Concerning the training resources, the city provides training on Lean Sigma, tableau, IT procurement, and agile foundations.
The House in Which I Live
The apartment I live in upholds some virtues that have been essential for protecting the real estate and encouraging the tenants to live longer within the facility. For instance, the customer service agents within my department are active listeners. Listening attentively to the issues raised by tenants has necessitated effective ways of handling problems whenever they arise. Furthermore, the customer service agents within my apartment also serve as intermediaries for other services. Customer service agents are accustomed to providing recommendations to new clients about dealers in electronic gadgets or even reliable firms that carry out Wi-Fi installation (Pang et al., 2014). Lastly, the customer service agents in my apartment also necessitate the protection of the facility by practicing the highest level of transparency. The customer service agents are exceedingly open with the tenants regarding the provision of various services. Upholding honesty has proven to be critical as it improves relationships in the long term.
The Car I Drive
Two primary systems can be utilized to enhance a vehicle’s safe driving. These systems are advanced driver assistance systems and in-vehicle information systems. The car I drive is installed with an in-vehicle information system. This system guarantees me safety in three broad disciplines: navigation, traffic and travel information, and driver information through vehicle-to-vehicle communication (Bryan, 2020). The navigation functionality of the system provides me with location and route guidance.
Additionally, this aspect may also provide traffic information to the routes I am using, including but not limited to real-time traffic conditions and calculations for the shortest paths to follow to my destination (Bryan, 2020). Furthermore, the travel information functionality provides me with local, regional, national, and international traffic information. This includes information related to routes, fuel cost, roadwork, road accidents, traffic control, and weather conditions.
The Computer I Use
Various tools on my computer guarantee the safety of the data stored on it. The first tool is the presence of anti-virus software that protects my data against any form of malware. The anti-virus software searches for, detects, and removes viruses with worms, Trojans, and adware (Pang et al., 2014). Also, my workplace has a firewall system that receives all the data from the organization’s computers and leaves my firm’s premises. The other personal initiative I have taken to keep my data safe from infiltration by third parties is establishing solid passwords. I am used to developing passwords that are difficult for hackers to guess by utilizing a combination of capital letters, numbers, and symbols (Pang et al., 2014). This has been effective because using more characters that I can easily recall keeps hackers at bay from accessing my confidential information on my computer.
References
Bryan, L. L. (2020). Effective information security strategies for small businesses. International Journal of Cyber Criminology, 14(1), 341-360.
Pang, M. S., Tafti, A., & Krishnan, M. S. (2014). Information technology and administrative efficiency in US State Governments. MIS Quarterly, 38(4), 1079-1102.
Rivenbark, W. C., FitzGerald, K. M., Schelin, S. H., Yates, W. H., & Runkle, T. (2001). Information Technology Investments: Metrics for Business Decisions. Institute of Government, University of North Carolina at Chapel Hill.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
In the private and public sectors, owners of services and assets are responsible for the protection of items or infrastructures used to deliver goods and services. For each of the following assets, identify the sector or sectors and the responsibilities of each industry as it relates to each hypothetical asset. Additionally, for each of the following assets, assign an owner, explain their duties, and identify IT threats with regard to protecting the investment. the state in which you live,
the city in which you live
the house in which you live,
the car you drive, and
the computer you use.
Your paper should be three to four pages in length and in APA format. You may use your textbook as source material for your assignment. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.