Professional Documents
Culture Documents
PEACE-WORK-FATHERLAND PAIX-TRAVAIL-PATRIE
PRESENTED BY
CHICK POOH CONRAD JORDAN
This piece of work has been written to fulfill the requirements of obtaining a Higher National
Diploma (HND) in Computer Science and Networks.
PRESIDENT
Date
EXAMINER
Date
SUPERVISOR
Date
ii
DEDICATION
iii
ACKWOLEDGEMENTS
Firstly, I wish to thank my supervisor Mr. Difouo Jean Patrice who was patient enough to
guide me throughout this research session and who gave me some information needed for the
realization of this research. Secondly, I wish to appreciate Mr. Mbah Sinclair my field supervisor
who guided me on what to do as an intern during the period of internship. Special to my school
for providing me with the knowledge needed for this course. My regards also goes to my
classmates and course collaborators for their contributions in various ways towards the
completion of this work. I finally give thanks to my family members for their financial and moral
support.
iv
TABLE OF CONTENTS
CERTIFICATION ........................................................................................................................ ii
DEDICATION.............................................................................................................................. iii
ACKWOLEDGEMENTS ........................................................................................................... iv
TABLE OF CONTENTS ............................................................................................................. v
TABLE OF ABBREVIATION .................................................................................................. vii
CHAPTER ONE ........................................................................................................................... 0
INTRODUCTION......................................................................................................................... 0
General Introduction................................................................................................................................. 0
1.1 Background Of The Study.............................................................................................................. 0
1.2 Objective Of The Study ................................................................................................................. 1
1.2.1 General Objectives ................................................................................................................ 1
1.2.2 Specific Objectives ....................................................................................................................... 2
1.3 Definition Of Key Terms ................................................................................................................ 2
CHAPTER TWO .......................................................................................................................... 4
PRESENTATION OF THE ORGANIZATION ........................................................................ 4
2.1 Historical Background ......................................................................................................................... 4
2.1.1 Date And Content Of Creation ..................................................................................................... 4
2.1.2 Geographical Location ................................................................................................................. 4
2.1.3 Lay Out And Equipment ............................................................................................................... 4
Layout.................................................................................................................................................... 4
2.1.4 Working Condition ....................................................................................................................... 5
2.2 Organigram Of The Organization ........................................................................................................ 5
.................................................................................................................................................................. 5
2.3 Products And Services ......................................................................................................................... 6
2.4 Administration .................................................................................................................................... 7
2.5 Objectives............................................................................................................................................ 8
CHAPTER THREE ...................................................................................................................... 9
v
INTERNSHIP ACTIVITIES ....................................................................................................... 9
3.1 Reports on activities............................................................................................................................ 9
3.2 Problems Or Difficulties Encountered During The Attachment ........................................................ 20
CHAPTER FOUR ....................................................................................................................... 21
SITUATION ANALYSIS ........................................................................................................... 21
4.1 Organizational strength and weaknesses ......................................................................................... 21
4.1.1 Strengths .................................................................................................................................... 21
4.1.2 Weaknesses................................................................................................................................ 21
4.2 Organizational opportunities and threats ........................................................................................ 22
4.2.1 Opportunities ............................................................................................................................. 22
4.2.2 Threads....................................................................................................................................... 22
CHAPTER FIVE ........................................................................................................................ 24
SUMMARY OF FINDINGS AND RECOMMENDATION ................................................... 24
5.1 Summary and conclusions ................................................................................................................ 24
5.2 Benefits from the attachment .......................................................................................................... 24
5.3 Recommendation.............................................................................................................................. 25
REFERENCES ............................................................................................................................ 26
vi
TABLE OF ABBREVIATION
RJ-45…………………………………………..REGISTERED JACK 45
MODEM……………………………………..MODULATOR-DEMODULATOR
vii
CHAPTER ONE
INTRODUCTION
General Introduction
This will provide context to the information discussed throughout the research. It links the
introduction of your research topic and ensures a logical flow of ideas.
Computer and network security breaches are commonplace, and several occur around the
world every day. Some are considered minor, with little loss of data or monetary resources, but
many of them are considered major or even catastrophic. As the world becomes increasingly
dependent on the internet to do everything, we are part of a growing computer networks. Data
become one of the biggest dilemmas we need to face today. One of the ways your data may be
vulnerable, is if your network is insecure.
When you are working on a network, all of the data that passes through it relies on the
network itself to be secured enough not to let anyone one but the intended recipient access the
data. Whether you are over a wired LAN network or WIFI, both are susceptible to being
attacked.
If you are working over a network that isn’t secure, a hacker can potentially hack the entire
network and that will give them access to everything that is being communicated over the
network and they can alter the data in the network if they desire. But if you have a secured
network, not only will it filter out spyware, but it also adds layers of protection against any
potential cyber-attacks. It does so by breaking down all the data that’s travelling in and out of the
network into several small packets. It then encrypts each packet separately and then sends it out
through multiple channels. This way, even if some tries to get into your system, they will never
have access to all of your data in one place.
You might have heard of the 2014 hacking of Sony Pictures’ network, which the FBI
attributed to the North Korean government. More recently, Russian attacks have been accused of
tempering with voting systems in the 2016 U.S. presidential election and with Ukrainian
businesses and governmental agencies.
The objective is what the researcher wants to find out or investigate. In research we have
general and specific objectives.
This topic was chosen with main objective to examine the importance of network
security to organizations. The world is becoming more and more digitalized and also relies on
networks, so having a secured network system as an organization is already a step to a successful
1
business. Some of the following security majors could be used to secure an organization
networks.
Access Control: This refers to controlling which users have access to the network or especially
sensitive sections of the network. You can restrict network access only to recognized users and
devices or grant limited access to noncompliant devices or guest users.
Antivirus And Anti-Malware Software: Malware or malicious software is a common form of
cyber-attack that comes in many different shapes and sizes. Some variations work quickly to
delete files or corrupt data, while others lie dormant for a long period of time and quietly allow
hackers a back door into your system. The best anti-virus software will monitor network traffic
in real time for malware, scan activity log files for signs of suspicious behavior or long-term
patterns, and offer thread remediation capabilities.
Email Security: Email is an essentially important factor to consider when implementing
networking security tools. Numerous threat vectors, like scams, phishing, and suspicious links,
can be attached to or incorporated into emails. Because so many of these threats will often use
elements of personal information in order to appear more convincing, it is important to ensure an
organization’s employees undergo sufficient security awareness training to detect when an email
is suspicious. Email security software works to filter out coming threats and can also be
configured to prevent outgoing messages from sharing certain forms of data.
Firewalls: They are another common element of a network security model. They essentially
function as a gatekeeper between a network and the wider internet. Firewalls filter incoming and,
in some cases, outgoing traffic by comparing data packets against predefined rules and policies,
thereby preventing threat from accessing the network.
Those are some few of the many that exist.
2
Computer Network
This refers to the interconnection of computer devices so that they can exchange data and
share resources with each other. These networked devices use a system of rules, called
communication protocols, to transmit information over physical or wireless technologies.
Network Security
According to the SANS Institute, network security is the process of taking preventative
measures to protect the underlying networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction or improper disclosure. Implementing these measures
allows computers, users and programs to perform their permitted critical functions within a
secure environment.
Cyber Attacks
It is an attempt to gain unauthorized access to a computer, computing system or network
with the intent to cause damage. Cyber-attacks aim is to disable, disrupt, destroy or control
computer systems or to alter, block, delete, manipulate or steal the data held within these
systems.
3
CHAPTER TWO
PRESENTATION OF THE ORGANIZATION
Fire software is found in the center region of Cameroon that is Yaounde located precisely
at Marche central sharing a boundary with avenue Kennedy in the south and Hilton hotel at the
west.
2.1.3 Lay Out And Equipment
Layout
Fire software operates in a duplex, precisely the second floor which is made up of three
offices which are the manager, secretary and cashier and one general hall were the companies
activities takes place and a room or say a store where their goods are being sold.
Equipment
The company is made up of seven computers all connected to a central point that is a
router using both wired and wireless medium with CAMTEL being their ISP.
4
The company has an installed air conditional that provides a conducive atmosphere for
work to take places.
The company also has network printer were documents and exams questions are usually
printed.
IT also has a projector which is usually used by the boss during training classes.
The working condition of fire software is generally very good this because the company
is made up of equipment like air conditional, comfortable chairs and tables with a clean
environment which creates a favorable environment for working.
2.2 Organigram Of The Organization
MANAGER
ASSISTANT MANAGER
CLEANER
5
2.3 Products And Services
Graphics Designing
The company produces posters for churches, musicians and business cards for
individuals.
Maintenance
The company is good in the maintenance of Pc and laptops, the author of the most good
works in the area as concern maintenance of brand new and second handed laptops of most
recent and renowned laptop mark and quality. With it qualified staff and technicians Fire
Software maintains all kind of laptops and PC by using the following services
Computer Update
Antivirus installation
Memory
Hard Drive capacity
Video or Graphic card capacity
Repair
The repairs of IT equipment use by many offices in the region amongst all have in their
name Fire Software for its compliments of good work, accuracy and better organization. They
6
are equipped with most sophisticated tools for repairs and as such do repairs on the following
equipment:
PC (CPU)
Laptops
Printers
Distribution
Distribution in Fire Software is done as per demand, command and purchase. Many
enterprises affiliated to Fire Software uses the wide knowledge of information Technology know
how of Fire Software to purchase computers and equipment out or around town.
2.4 Administration
The administration of FS is made up of the Manager, Assistant Manager and the workers/staffs.
Staff
The Fs company has around 12 personnel qualified in the following spatiality
7
Development of GIS
Website and application development
Computer maintenance
Establishment of cooperate network infrastructure
There are 2 personnel in the graphic design department, 4 in the website and application
development, 2 skilled personnel in the maintenance department, and four personnel in the
networking department.
There also include a manager, a secretary, a cashier and a sales person. Making the total
number of 16personnel in the company.
2.5 Objectives
FS objective is to establish a forum where IT problems could be understood and resolved,
also to better understand the need from the public and its newly produced IT equipment
demanded by numerous customers. FS is dedicated to better organization in IT support services.
Thus improving and impacting on the IT sensitization, with its goals of facilitating the usage of
IT products like laptops, PC and many other accessories with which the demand rises in our day
by day activities. FS will bring you closer ans closer to understanding usage, exploitatiom and
improving practical usage of IT products. It is based on these factors that the staffs of FS work
really hard to develop and develop new strategies to improving industrial benefits and as
companies also do improve their revenues, with FS gets better to serve and preserve its
customers.
8
CHAPTER THREE
INTERNSHIP ACTIVITIES
These are the various activities carried out by the intern during the period of the
internship.
3.1 Reports on activities
The following activities were carried out during my internship period.
In order to reassemble the computer again, we inserted back all the other parts saving the
RAM, HDD, ODD and finally the lead for the last.
It should be noted that when dismantling a computer all the screws should be kept carefully
to avoid any screw from getting lose.
9
Installing A Network Printer
In most cases what you have to do to setup a printer is to connect it to your PC. Simply
plug the USB cable from your printer to the available USB port on the PC and turn on the PC
and also turn on the printer. While connecting on a network, you need to know the name of the
printer. To connect an HP printer with series name of office jet pro 8720 to a network do the
following.
Click the start button and open the control panel in the control panel menu, click on
hardware and sound
Click on devices and printers
Click add printer
In the add printer menu that appears, choose the type of printer that is to be installed that
is either a local or a network printer and it will be a network printer.
Choose the printer port and click next
You then choose the printer manufacturer and the printer series model.
In the printer sharing windows that appear choose to share the printer with others and
click next
Click on print a test page and click finish.
Cable Preparation
We prepared a cable in order to connect a switch to a computer (straight through cable)
and another to connect computer to computers or switch to switch (cross over cable). We used
the following for the creation: CAT 5 cable, RJ-45 connectors, crimping tool and wire striper. To
create these cables we did the following:
We started by stripping the cable ends at half inch so as to expose the inner wire.
After stripping the cables, separate the wires so they can be arranged in order.
The CAT 5 twisted paired cable consist of 4 pairs of twisted wire all colored with one
color and one stripped color. To create a straight through cable we the cables by placing
orange white, orange, green white, blue, blue white, green, brown white, brown on one
end the repeat the same combination on the other end of the cable which standard T568B
on both sides or green white, green, orange white, blue, blue white, orange, brown white,
brown on both sides of the cable which is standard T568A.
10
For a cross over cable, we place the cables in the following order green white, green,
orange white, blue, blue white, orange, brown white, brown that is standard T568A on
one end and orange white, orange, green white, blue, blue white, green, brown white,
brown that is standard T568B on the end of the cable.
After separating and paring the cables, insert the cables into the RJ-45 connectors
carefully and crimp using the crimping tool. Do this on both sides of the cable.
11
Log into one of the computers, click start and type network and sharing center in the
search box and click on it when it appears. While there allow all access for file sharing to
other machines and save the settings.
Go to the folder you want to share, right click and click properties, while there click on
share then advanced then enable to share the folder and allow access to the other
computer. Then do same to the other computer then share the files. Each computer will
then be able to access the file or folder shared by the other computer on their monitor.
12
You will be prompted to press any key. So, press any key as you wish.
13
Select the operating system Bit that is x86(for 32 bit) or x64 (for 64 bit). It should be
noted that while choosing the bit you should take into consideration the RAM of the
computer, if the RAM is less than or equal to 2GB then you should go for x86 that is 32
bit and if it is more than 2GB then go for x64 that is 64 bit operating system.
Now, accept Terms and Condition as you do for normal programs installation and click
next
14
It is better to choose customize install than upgrade because you get option for formatting
the specific Drive
Select drive C but if had renamed the drive select the drive name representing drive C
15
Click drive option (advanced) and then format to format the select drive. After that click
next.
Your installation will begin. You will have to wait until everything loads up.
It takes about 20-30 min to complete installation. Wait until your computer restarts.
16
You will be prompt for computer name and click next after providing the name
Now, select customize and fill all the required information and click “Next” when done.
You are about to get installation finished when we’re getting your PC ready is displayed
17
And you are done.
18
Location: Choose whether you’re working at home or work (safe) or in public (less safe), and
Vista automatically adds the proper security level to protect you.
19
Activities With The Cashier
The cashier of FS keeps record of all financial transactions carried out in the
organization.
20
CHAPTER FOUR
SITUATION ANALYSIS
4.1.2 Weaknesses
On the contrary, it explains why the company might not survive or is not surviving. Some
factors which lie as weaknesses include:
Noise
Since they are located beside the road, during working hours sometimes the noise from
the vehicles turns to distract the workers
21
Late coming
Workers of FS mostly come to very late sometimes keeping customers to wait for them
which is not good for them.
Difficulties in accessing the company’s location by new customers
The location of fire software is not easily accessible which usually makes it difficult for
new customers to locate it coupled with the fact that it is located on the second floor of a duplex.
4.2 Organizational opportunities and threats
These are the external things that are going on outside the company. You can advantage
of the opportunities and protect against threats, but you can’t change them.
4.2.1 Opportunities
These are external factors in your business environment that are likely to contribute to
your success.
Loyal customers
They have loyal and faithful customers who turn to refer more customers to the
organization due to their good work done
Large population
Due to the large population of the city (Yaounde), and the increase growth in the use of
electronics, it makes it easier for FS to sell out their product and services to the population.
Competition
FS faces little or no competition in the area since they offer the best services around the
place.
4.2.2 Threads
These are external factors you have no control over. You may want to consider putting in
place contingency plans for dealing with them if they occur.
Declining economic conditions
Since the country is experiencing some fall in the economic standards, FS is forced to
suffer from that as well
Increase in Taxes
22
Due to the increase in business taxes fire soft is also going through some pain in getting
everything done right.
Breach of data
FS has a weak and nearly unsecured network which could be accessed and hacked by
intruders or unknown competitors.
23
CHAPTER FIVE
SUMMARY OF FINDINGS AND RECOMMENDATION
24
Integrity: This refers to having a sense of moral understanding. FS staffs are well known
for their nice ways to talk and approach customers.
Self-upgrading: I did seek out ways of upgrading my skills thanks to this attachment.
Being positive: No matter how challenging work may be, I have learnt to always be
positive while hoping for change in future.
Team work: during this internship I also learnt that team is really essential for
organizations growth.
5.3 Recommendation
I will like the recommend the following for the company FS and other companies out
there.
The manager of FS should put in place a system which will help reduce late coming by
the workers. This could be in a form of sanctions or a reduction in salaries of the workers
who come late of absent work without valid reasons.
Due to the location of FS they should put in place notice boards around town that will
help new customers locate them
FS should also advertise their services and products through brochures and flyers and
also through radio station. This will increase the customers.
They should endeavor to install and configure a good security system for their network.
25
REFERENCES
26
SATELLITE LOCATION OF FS
Fire software
27