Vandeven Medical Computer Support has hired you to implement a CRM system for th
ID: 3705736 • Letter: V
Question
Vandeven Medical Computer Support has hired you to implement a CRM system for their business. The CRM will track customer information and transactions ( action required, fee, field engineer, date, satisfaction rating & inventory used).
Currently, the hardware in use Dell PowerEdge R430 - rack-mountable - Xeon E5-2620V4 2.1 GHz - 8 GB - 300
A database (SQL server ) will be used to manage the customer and transaction information.
Vandeven Medical Computer Support has a main office located in Atlanta; there are 5 satellite locations located in Georgia each of which manage support locally. The locations should be able to share data with Atlanta in some fashion.
Recommend Linux should be selected and why it would be best. Be sure to cite any references used.
Explanation / Answer
Linux is one of the most used OS when it comes down to the servers. As it is one of the most secure and less costlier operating system half of the world is using it. It consists of faster hardware processing as compared to other operating systems and hence, I will recommend to make use of the Linux OS for the above scenario.
Advantages of Using Linux:
Hence, keeping in mind these advantages it can be helpful for the above scenario. A bit of the research on the OS is been done below so that to make you understand why and how to use this operating system in the current scenario.
Network Monitoring Using Security:
The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.
Linux Vulnerability:
Hence, this is how the linux security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Linux.
Exploiting The Vulnerabilities:
In Linux, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.
The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:
Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.
Methodologies:
The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.
The network if contains any of these vulnerabilities and if not focused on removing the vulnerability it can be exploited by anybody resulting in decrease in the privacy.
It will also result in getting the security of the network in trouble and can be compromised by anyone anytime.
Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.
Configuration:
?Determining the configuration of the network services is been done in the process. To get the services up and in running condition there is need of getting the procedures ready for the console serving process.
To get the operations such as shut down and start-up are been done in this part of the functioning of network services.
Performance:
?This process facilitates the evaluation of the behavior of most of the managed objects and there are variously effectiveness of the communication of the activities.
There are various parts of monitoring and controlling of the services. They check the services are running accordingly or not.
To handle the performance one must regularly have a check on the systems and get their hands on running the network models.
Security:
?The security protocols are been the driving forces in the network management models. This modelling of the network models is toally dependent on how strong is the security of the network working.
The modelling of the network is the least that can be tolerated. It ensures the generation, distribution and stroage of the encryption keys and passwords. So that the security is been maintained at it's most.
There are many effective maintainence of the logs activity and other such things in the recognition of the security of the netowrks.
Accounting:
?The process of accounting is known to facilitating the affirmation of the charges and the cost which can be assessed by the normal use of the network services.
The network services are been maintained on the basis of the areas which are mandatory to handle and costing of such areas.
Handling accounting problems is one of the crucial problems in the Network management and for this to neutralize we need to get the accounts of the network mangement been resolved.
Hence, these are "gey areas" in each of the above written functional areas which must be handled with utter care.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.