Table of Contents
Section 1: Phase 1- Computer Configuration & Components
Section 2: Phase 2- Critical Information Systems
Section 3: Phase 3- Network Design Models
Section 4: Phase 4- Database Tables
Section 5: Phase 5- Cybercrime Prevention
Sarah just graduated from high school, and is going on to college. Her parents
are willing to give her some money to get a good laptop. For Sarah I choose to go to
dell.com to search for a laptop for her. She was given $1000.00 for the laptop. I was
able to find a laptop for $899.99 at dell.
Here are the key components for the laptop I chose:
Processor: 3rd Generation Intel® Core™ i7-3632QM (6MB cache, up to 3.2 GHz)
Operating System: Windows 8, 64-bit, English
Display: 17.3” High Definition+(900p) LED Display with Truelife
Memory: 8GB4 Dual Channel DDR3 SDRAM at 1600MHz
Hard Drive: 1TB 5400 RPM SATA Hard Drive
Optical Drive: 8X Tray Load CD/DVD Burner (Dual Layer DVD+/-R Drive)
Video Card: Nvidia GeForce GT 630M 1GB
Warranty: 90 days Premium Phone Support + 1 Year In-Home Service after Remote
Weight: 7.23 lbs.
Len is a gamer and wants a new laptop that has good sound and high
quality graphics. He just received a $1500.00 bonus. Lens wants to build his own
gaming intensive pc. To be able to get the best quality pc he fist needs to get a CPU
and a processor. For $319.00 Len can buy an Intel Core i7-3770K Quad-Core
Processor 3.5 GHz 8 MB Cache LGA 1155 – BX80637I73770K. Next would be the
Gaming Card or GPU. For $550.00 Len can get a EVGA GeForce GTX670 Super
Clocked 2048MB GDDR5 256bit, 2x Dual-Link DVI, HDMI, Display Port, 4-Way SLI
Ready Graphics Card 02G-P4-2672-KR. After the Gaming Card, Len then needs to buy
the Memory or Ram. For the price of $85.99 Len could get 16 GB of Ram Corsair
Vengeance Blue 16 GB DDR3 SDRAM Dual Channel Memory Kit
CMZ16GX3M4A1600C9B. Once he has processor, gaming card, and ram, Len need so
get a mother board. A GIGABYTE GA-X79-UD3 LGA 2011 Intel X79 SATA 6 GB/s USB
3.0 ATX Motherboard will cost $244.00. The fasting gaming Hard Drive is going to cost
$ 94.00, Western Digital Caviar Black 1 TB SATA III 7200 RPM 64 MB Cache Internal
Desktop Hard Drive Bulk/OEM – WD1002FAEX. Purchasing a SATA II SSD so ideally
you’d just go with one that is SATA III, reliable, and with the fastest read/write times for
the money. So for $ 91.00 Len can get the Crucial 128 GB m4 2.5-Inch Solid State
Drive SATA 6 GB/s CT128M4SSD2. It’s still nice to have a Blu-Ray Drive or DVDRW,
Pioneer BDR-206DBK 12x Internal Blu-ray Disc/DVD/CD Writer (Black) OEM – No
software is $95.00. To be able to run the CPU Len needs to get a good power supply.
So it is recommended to buy the OCZ ModXStream Pro 700W Modular High
Performance Power Supply compatible with Intel Sandy Bridge Core i3 i5 i7 and AMD
Phenom for $80.00. To house all the components Len needs to buy a Gaming desktop
Tower. Len can purchase a Cooler Master HAF 932 Advanced Full Tower Case with
SuperSpeed USB 3.0 (RC-932-KKN5-GP) for $180.00. Len doesn’t have to go will the
components that I have listed, but it is recommend for the best gamming system.
Carl is looking for a computer that is capable of fast processing speed; high
sound quality; is capable of supporting multiple monitors; and has the capability to
download, upload, and stream large files, so Carl can work from home. Carl works
for a firm that creates computer generated movies. He can work from home if he can
buy a computer that fits his needs with the requirements of the firm. I also went to
dell.com for Carl. I was able to find a customizable XPS 8500 & High Performance XPS
8500 Special Edition. The Special Edition: This Windows™ 7 desktop features Intel®
SRT solid state drive (32GB) for fast boot up and extreme power. Recommended for
The componets for the XPS 8500 Special Edition:
3rd Generation Intel® Core™ i7-3770 processor (up to 3.90 GHz)
Windows® 7 Home Premium, 64Bit, English
12GB3 Dual Channel DDR3 SDRAM at 1600MHz
2TB 7200 RPM SATA Hard Drive + Intel® SRT 32GB SSD Cache
AMD Radeon™ HD 7770 2GB GDDR5
No Monitor and 1 Year Enhanced Support – America’s Best Standard Support
The Information Systems is the back bone of today’s businesses and critical part of
mid-size to large businesses like banks. The massive data and increasing volumes of
data needs organized storing and fast and effective processing for variety of purposes
from decision making to risk management, from transaction processing to state-the art
products. The large-scale businesses are globally distributed across the world which
needs stable and reliable infrastructure and network administration and the applications
which can run and handle simultaneous, real time and fast processing. The availability
of technology has enabled the businesses to offer variety of services which has made
Information Technology as part of the businesses today. What seems to be a simple
online banking transaction for instance, involves web-based programs which run on a
one platform and access the data in another platform like mainframe and make there
should be network communication and systems which can communicate to each other,
available 24 by 7. The more businesses grow the more dependent they become of
A good example of the information system is Wal-Mart that uses a Retail Link
system, which digitally links its suppliers to every one of Wal-Mart’s stores. As soon
as a customer purchase an item, the supplier is monitoring the item, knows to ship a
replacement to the shelf.
Another example is the Mandarin Oriental in Manhattan and other high-end hotels
exemplify the use of information systems and technology to achieve customer intimacy.
They use computers to keep track of guests’ preferences, such as their preferred room
temperature, check-in time, and television programs.
When firms achieve one or more of these business objectives (operational
excellence, new products, services, and business models, customer/supplier intimacy,
and improved decision making) chances are they have already achieved a competitive
advantage. Doing things better than your competitors, charging less for superior
products, and responding to customers and suppliers in real time all add up to higher
sales, and higher profits. Example: Toyota Production System focuses on organizing
work to eliminate waste, making continues improvements, and TPS is based on what
customers have actually ordered.
Computer networks consist of communications, media, devices, and software
need to connect two or more computer systems or devices. Networks are able to
transmit and receive information to improve organizational effectiveness and efficiency.
Assuming our company is not peer to peer networking; our company seems to
be a server based network side. With a server based network all accounts and data
files are stored on the server. However if the server goes down no one can access their
accounts or the files. The server based network offers an array of different services. The
services it offers are file and print, application, web, and directory.
One network design model is the bus topology. The bus uses on main cable
called the backbone, which connects the computer, printer, and everything to the
server. Some advantages of the bus topology are the cost. Also the installation,
because there is no additional devices required. If a computer fails along the bus
topology the rest of the system stays up and running. However a major disadvantage
of the bus topology is troubleshooting. Most problems in the bus are a break in the
Another network model is the mesh topology. In the mesh every computer has
a connection to all the components of the network. Advantage of the mesh topology is
if a cable breaks, the signals could and can be routed through different paths. With the
mesh it is nearly impossible for a network to go down. Some disadvantages of the mesh
topology are the cost, because of the extra cable used to connect the network with all
components. Troubleshooting is a large disadvantage because of all the numerous
Table 1: People
ID First Name Last Name Middle Initial
Table 3: People job
1 Mad Scientist Creates experiments
2 Football Coach teaches Students to play football $50,000
3 Police Officer Protects the community from crime $96,000
4 Fire Fighter
Cures the sick
Table 2: People address
State Zip Code
1 123 S. Crazy Lane
Thornton Co 80299
2 232 E. Bitme Ave
Brighton Co 80601
3 669 N. Nuttyside Cir
4 709 Whale Dr
Northglenn Co 80233
5 468 W. The Ave
Henderson Co 80642
The most common cybercrimes are spam, fraud, cyber bullying, drug trafficking,
cyber-terrorism, and piracy.
The most common of these crimes are spam. Spam is the sending of junk email
for a commercial purpose. However there is a new anti-spam law, which should limit the
use of unsolicited electronic communications.
Credit fraud is another common form of cybercrime. Certain computer viruses
can log keystrokes on your keyboard and send them to hackers, who can then take your
Social Security number, credit card number and home address. This information will be
used by the hacker for his own means.
The use of the internet to harass someone is a form of cyber bulling. Currently
cyber bulling is a growing problem among teenagers.
There are many forms of cyber terrorism. Sometimes it’s a rather smart hacker
breaking into a government website, other times it’s just a group of like-minded Internet
users who crash a website by flooding it with traffic. No matter how harmless it may
seem, it is still illegal.
And piracy is another form of a cybercrime. Downloading music or even movies
without paying for them is theft, which is called piracy.
In 2011 there has been 314,244 complaints reported to the Internet Crime
Complaint Center (IC3). According to the IC3 the most common Internet crimes online
are Non-delivery of payment or merchandise, Scams impersonating the FBI, and
Identity theft. The most reported is the FBI-Related scams are when a criminal poses
as the FBI to defraud victims. FBI Scams had 35,764 complaints in 2011. Identity Theft
is the unauthorized use of a victim’s personal identifying information to commit fraud
or other crimes. Identity Theft had 28,915 complaints. Non-Auction/Non-Delivery of
Merchandise is when the Purchaser does not receive items purchased. Non-delivery of
payment or merchandise had 22,404 complaints in 2011.
Another cybercrime needs to be address is Cyber bullying. During the 2008-2009
school years it is estimated that nearly 30% of students are involved in bullying either as
victims, perpetrators or both. Studies have found that 15 to 25% of children and youth in
the U.S. are bullied and 15 to 20% bully others. Forty-two percent of children and youth
have said they have been bullied while online. 8.4% were male victims and 3.7% were
female’s victims that have reported they were bullied almost every day.
Some tips to make your computer more secure while online are the antiviruses,
and a firewall. But beyond that there should be step to further protect you while online.
For instance to protect yourself from identity fraud, FBI Related Scams and Non-
delivery of payment or merchandise are:
Ensure websites are secure prior to submitting your credit card number.
Do your homework to ensure the business or website is legitimate.
Attempt to obtain a physical address, rather than a P.O. Box or mail drop.
Never throw away credit card or bank statements in usable form.
Be aware of missed bills which could indicate your account has been
Be cautious of scams requiring you to provide your personal information.
Never give your credit card number over the phone unless you make the
Monitor your credit statements monthly for any fraudulent activity.
Report unauthorized transactions to your bank or Credit Card Company as
soon as possible.
Review a copy of your credit report at least once a year.
Some habits can you start to make yourself more secure when you are on
the internet are making sure you are on a secure site when paying your bills. I pay
everything online, but I am cautions about the sites I am on before I submit my card
number. Also by avoiding Unnecessary Forms good Web safety rule of thumb is to
avoid filling out forms that require personal information in order to keep anything from
being entered into public.
Don’t share information that could identify you in public, especially if you are
a minor. Keep identifying details, like user names, passwords, first and last names,
addresses, and phone numbers, to yourself. Your email address should be kept as
private as possible, because an email address can be used to track other identifying
information. Keeping your personal information safe can prevent yourself from being the
target of a social engineering attack.