
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Global Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing. Employees can use traditional desktop computers in their offices. They can also use a variety of personal mobile computing devices such as tablets, smartphones, and laptops. The new computing model introduces some security risks that GUTS is attempting to address. The company wants to ensure that any devices connecting to their servers are properly registered and approved by the Information Technology department.
- Create a complete ERD to support the business needs described below:
- Every employee works for a department that has a department code, name,mail box number, and phone number. The smallest department currently has5 employees, and the largest department has 40 employees. This system willonly track in which department an employee is currently employed. Veryrarely, a new department can be created within the company. At such times,the department may exist temporarily without any employees. For everyemployee, an employee number and name (first, last, and middle initial) arerecorded in the system. It is also necessary to keep each employee’s title.
- An employee can have many devices registered in the system. Each device isassigned an identification number when it is registered. Most employees haveat least one device, but newly hired employees might not have any devicesregistered initially. For each device, the brand and model need to be recorded.Only devices that are registered to an employee will be in the system. Whileunlikely, it is possible that a device could transfer from one employee to However, if that happens, only the employee who currently owns thedevice is tracked in the system. When a device is registered in the system, thedate of that registration needs to be recorded.
- Devices can be either desktop systems that reside in a company office or mobile Desktop devices are typically provided by the company and areintended to be a permanent part of the company network. As such, eachdesktop device is assigned a static IP address, and the MAC address for thecomputer hardware is kept in the system. A desktop device is kept in a staticlocation (building name and office number). This location should also be keptin the system so that, if the device becomes compromised, the IT departmentcan dispatch someone to remediate the problem.
- For mobile devices, it is important to also capture the device’s serial number,which
operating system (OS) it is using, and the version of the OS. The ITdepartment is also verifying that each mobile device has a screen lock enabledand has encryption enabled for data. The system should support storinginformation on whether or not each mobile device has these capabilities - Implement the above in a DBMS specifically using MySQL. Perform some
queries and save them in your implementation
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps with 1 images

Knowledge Booster
Similar questions
- The advantages of cloud computing are many, but what are some of the more notable ones? Is cloud computing safe? What security issues must be considered. Consider the pros and cons of cloud computing and tell me whether you agree or disagree. I don't understand why you think that. When would you utilize cloud storage?arrow_forwardplease elaborate on what you see as the benefits of automated installs - both from a technical and business standpoint. You should explore how an automated install can solve business problems, benefit end-users, and change the way IT services are delivered in your post. (This is for my SVAD 121 Enterprise Computing class FYI)arrow_forwardGlobal Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing. Employees can use traditional desktop computers in their offices. They can also use a variety of personal mobile computing devices such as tablets, smartphones, and laptops. The new computing model introduces some security risks that GUTS is attempting to address. The company wants to ensure that any devices connecting to their servers are properly registered and approved by the Information Technology department. Create a complete ERD to support the business needs described below:arrow_forward
- What are the challenges and solutions related to licensing and compliance in virtualized environments?arrow_forwardCaseSaudi Arabia is making a rapid progress in implementing computing solutions for facilitating its citizens and residents to use the electronic platforms and various mobile as well as web applications for various services. The users of those applications are required to take appropriate appointment or order for something of their choice while avoiding hustle, fatigue and long waiting hours. But at the same time, it requires addressing various information security related issues like communication security, authentication, privacy.Suppose that your company has won a contract to develop a mobile application for Saudi Arabia called “All- in-one-app” for providing all study related services in one application. In this case study, you are required to identify and judge such issues for your application and list the steps that you will take to ensure that you successfully fulfill the following requirements by following the ethical guidelines that you learned in corresponding topics in the…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY