Table of Contents Section 1: Phase 1- Computer Configuration & Components Section 2: Phase 2- Critical Information Systems

Table of Contents

Section 1: Phase 1- Computer Configuration & Components

Section 2: Phase 2- Critical Information Systems

Section 3: Phase 3- Network Design Models

Section 4: Phase 4- Database Tables

Section 5: Phase 5- Cybercrime Prevention



Sarah just graduated from high school, and is going on to college. Her parents

are willing to give her some money to get a good laptop. For Sarah I choose to go to to search for a laptop for her. She was given $1000.00 for the laptop. I was

able to find a laptop for $899.99 at dell.

Here are the key components for the laptop I chose:

Processor: 3rd Generation Intel® Core™ i7-3632QM (6MB cache, up to 3.2 GHz)

Operating System: Windows 8, 64-bit, English

Display: 17.3” High Definition+(900p) LED Display with Truelife

Memory: 8GB4 Dual Channel DDR3 SDRAM at 1600MHz

Hard Drive: 1TB 5400 RPM SATA Hard Drive

Optical Drive: 8X Tray Load CD/DVD Burner (Dual Layer DVD+/-R Drive)

Video Card: Nvidia GeForce GT 630M 1GB

Warranty: 90 days Premium Phone Support + 1 Year In-Home Service after Remote


Weight: 7.23 lbs.

Len is a gamer and wants a new laptop that has good sound and high

quality graphics. He just received a $1500.00 bonus. Lens wants to build his own

gaming intensive pc. To be able to get the best quality pc he fist needs to get a CPU

and a processor. For $319.00 Len can buy an Intel Core i7-3770K Quad-Core

Processor 3.5 GHz 8 MB Cache LGA 1155 – BX80637I73770K. Next would be the

Gaming Card or GPU. For $550.00 Len can get a EVGA GeForce GTX670 Super

Clocked 2048MB GDDR5 256bit, 2x Dual-Link DVI, HDMI, Display Port, 4-Way SLI

Ready Graphics Card 02G-P4-2672-KR. After the Gaming Card, Len then needs to buy

the Memory or Ram. For the price of $85.99 Len could get 16 GB of Ram Corsair

Vengeance Blue 16 GB DDR3 SDRAM Dual Channel Memory Kit

CMZ16GX3M4A1600C9B. Once he has processor, gaming card, and ram, Len need so

get a mother board. A GIGABYTE GA-X79-UD3 LGA 2011 Intel X79 SATA 6 GB/s USB

3.0 ATX Motherboard will cost $244.00. The fasting gaming Hard Drive is going to cost

$ 94.00, Western Digital Caviar Black 1 TB SATA III 7200 RPM 64 MB Cache Internal

Desktop Hard Drive Bulk/OEM – WD1002FAEX. Purchasing a SATA II SSD so ideally

you’d just go with one that is SATA III, reliable, and with the fastest read/write times for

the money. So for $ 91.00 Len can get the Crucial 128 GB m4 2.5-Inch Solid State

Drive SATA 6 GB/s CT128M4SSD2. It’s still nice to have a Blu-Ray Drive or DVDRW,

Pioneer BDR-206DBK 12x Internal Blu-ray Disc/DVD/CD Writer (Black) OEM – No

software is $95.00. To be able to run the CPU Len needs to get a good power supply.

So it is recommended to buy the OCZ ModXStream Pro 700W Modular High

Performance Power Supply compatible with Intel Sandy Bridge Core i3 i5 i7 and AMD

Phenom for $80.00. To house all the components Len needs to buy a Gaming desktop

Tower. Len can purchase a Cooler Master HAF 932 Advanced Full Tower Case with

SuperSpeed USB 3.0 (RC-932-KKN5-GP) for $180.00. Len doesn’t have to go will the

components that I have listed, but it is recommend for the best gamming system.

Carl is looking for a computer that is capable of fast processing speed; high

sound quality; is capable of supporting multiple monitors; and has the capability to

download, upload, and stream large files, so Carl can work from home. Carl works

for a firm that creates computer generated movies. He can work from home if he can

buy a computer that fits his needs with the requirements of the firm. I also went to for Carl. I was able to find a customizable XPS 8500 & High Performance XPS

8500 Special Edition. The Special Edition: This Windows™ 7 desktop features Intel®

SRT solid state drive (32GB) for fast boot up and extreme power. Recommended for


The componets for the XPS 8500 Special Edition:

3rd Generation Intel® Core™ i7-3770 processor (up to 3.90 GHz)

Windows® 7 Home Premium, 64Bit, English

12GB3 Dual Channel DDR3 SDRAM at 1600MHz

2TB 7200 RPM SATA Hard Drive + Intel® SRT 32GB SSD Cache

AMD Radeon™ HD 7770 2GB GDDR5

No Monitor and 1 Year Enhanced Support – America’s Best Standard Support

The Information Systems is the back bone of today’s businesses and critical part of

mid-size to large businesses like banks. The massive data and increasing volumes of

data needs organized storing and fast and effective processing for variety of purposes

from decision making to risk management, from transaction processing to state-the art

products. The large-scale businesses are globally distributed across the world which

needs stable and reliable infrastructure and network administration and the applications

which can run and handle simultaneous, real time and fast processing. The availability

of technology has enabled the businesses to offer variety of services which has made

Information Technology as part of the businesses today. What seems to be a simple

online banking transaction for instance, involves web-based programs which run on a

one platform and access the data in another platform like mainframe and make there

should be network communication and systems which can communicate to each other,

available 24 by 7. The more businesses grow the more dependent they become of

Information Systems.

A good example of the information system is Wal-Mart that uses a Retail Link

system, which digitally links its suppliers to every one of Wal-Mart’s stores. As soon

as a customer purchase an item, the supplier is monitoring the item, knows to ship a

replacement to the shelf.

Another example is the Mandarin Oriental in Manhattan and other high-end hotels

exemplify the use of information systems and technology to achieve customer intimacy.

They use computers to keep track of guests’ preferences, such as their preferred room

temperature, check-in time, and television programs.

When firms achieve one or more of these business objectives (operational

excellence, new products, services, and business models, customer/supplier intimacy,

and improved decision making) chances are they have already achieved a competitive

advantage. Doing things better than your competitors, charging less for superior

products, and responding to customers and suppliers in real time all add up to higher

sales, and higher profits. Example: Toyota Production System focuses on organizing

work to eliminate waste, making continues improvements, and TPS is based on what

customers have actually ordered.

Computer networks consist of communications, media, devices, and software

need to connect two or more computer systems or devices. Networks are able to

transmit and receive information to improve organizational effectiveness and efficiency.

Assuming our company is not peer to peer networking; our company seems to

be a server based network side. With a server based network all accounts and data

files are stored on the server. However if the server goes down no one can access their

accounts or the files. The server based network offers an array of different services. The

services it offers are file and print, application, web, and directory.

One network design model is the bus topology. The bus uses on main cable

called the backbone, which connects the computer, printer, and everything to the

server. Some advantages of the bus topology are the cost. Also the installation,

because there is no additional devices required. If a computer fails along the bus

topology the rest of the system stays up and running. However a major disadvantage

of the bus topology is troubleshooting. Most problems in the bus are a break in the


Another network model is the mesh topology. In the mesh every computer has

a connection to all the components of the network. Advantage of the mesh topology is

if a cable breaks, the signals could and can be routed through different paths. With the

mesh it is nearly impossible for a network to go down. Some disadvantages of the mesh

topology are the cost, because of the extra cable used to connect the network with all

components. Troubleshooting is a large disadvantage because of all the numerous



Table 1: People

ID First Name Last Name Middle Initial
1 Tyler
2 Tim
3 Trenton
Gornton N
4 Bryson
5 Jordyn
Thomas L

Table 3: People job

job title
job description
1 Mad Scientist Creates experiments
2 Football Coach teaches Students to play football $50,000
3 Police Officer Protects the community from crime $96,000
4 Fire Fighter
Fights fires
5 Doctor
Cures the sick

Table 2: People address

Address 1
Address 2
State Zip Code
1 123 S. Crazy Lane
Thornton Co 80299
2 232 E. Bitme Ave
Brighton Co 80601
3 669 N. Nuttyside Cir
Co 80205
4 709 Whale Dr
Northglenn Co 80233
5 468 W. The Ave
Henderson Co 80642

The most common cybercrimes are spam, fraud, cyber bullying, drug trafficking,

cyber-terrorism, and piracy.

The most common of these crimes are spam. Spam is the sending of junk email

for a commercial purpose. However there is a new anti-spam law, which should limit the

use of unsolicited electronic communications.

Credit fraud is another common form of cybercrime. Certain computer viruses

can log keystrokes on your keyboard and send them to hackers, who can then take your

Social Security number, credit card number and home address. This information will be

used by the hacker for his own means.

The use of the internet to harass someone is a form of cyber bulling. Currently

cyber bulling is a growing problem among teenagers.

There are many forms of cyber terrorism. Sometimes it’s a rather smart hacker

breaking into a government website, other times it’s just a group of like-minded Internet

users who crash a website by flooding it with traffic. No matter how harmless it may

seem, it is still illegal.

And piracy is another form of a cybercrime. Downloading music or even movies

without paying for them is theft, which is called piracy.

In 2011 there has been 314,244 complaints reported to the Internet Crime

Complaint Center (IC3). According to the IC3 the most common Internet crimes online

are Non-delivery of payment or merchandise, Scams impersonating the FBI, and

Identity theft. The most reported is the FBI-Related scams are when a criminal poses

as the FBI to defraud victims. FBI Scams had 35,764 complaints in 2011. Identity Theft

is the unauthorized use of a victim’s personal identifying information to commit fraud

or other crimes. Identity Theft had 28,915 complaints. Non-Auction/Non-Delivery of

Merchandise is when the Purchaser does not receive items purchased. Non-delivery of

payment or merchandise had 22,404 complaints in 2011.

Another cybercrime needs to be address is Cyber bullying. During the 2008-2009

school years it is estimated that nearly 30% of students are involved in bullying either as

victims, perpetrators or both. Studies have found that 15 to 25% of children and youth in

the U.S. are bullied and 15 to 20% bully others. Forty-two percent of children and youth

have said they have been bullied while online. 8.4% were male victims and 3.7% were

female’s victims that have reported they were bullied almost every day.

Some tips to make your computer more secure while online are the antiviruses,

and a firewall. But beyond that there should be step to further protect you while online.

For instance to protect yourself from identity fraud, FBI Related Scams and Non-

delivery of payment or merchandise are:

Ensure websites are secure prior to submitting your credit card number.

Do your homework to ensure the business or website is legitimate.

Attempt to obtain a physical address, rather than a P.O. Box or mail drop.

Never throw away credit card or bank statements in usable form.

Be aware of missed bills which could indicate your account has been
taken over.

Be cautious of scams requiring you to provide your personal information.

Never give your credit card number over the phone unless you make the

Monitor your credit statements monthly for any fraudulent activity.

Report unauthorized transactions to your bank or Credit Card Company as
soon as possible.

Review a copy of your credit report at least once a year.

Some habits can you start to make yourself more secure when you are on

the internet are making sure you are on a secure site when paying your bills. I pay

everything online, but I am cautions about the sites I am on before I submit my card

number. Also by avoiding Unnecessary Forms good Web safety rule of thumb is to

avoid filling out forms that require personal information in order to keep anything from

being entered into public.

Don’t share information that could identify you in public, especially if you are

a minor. Keep identifying details, like user names, passwords, first and last names,

addresses, and phone numbers, to yourself. Your email address should be kept as

private as possible, because an email address can be used to track other identifying

information. Keeping your personal information safe can prevent yourself from being the

target of a social engineering attack.

Leave a Reply