Mathews-Dickey Boys' & girls' Club

Mathews-Dickey Boys' & girls' Club

S W E H MAT & S Y O B

Y E K C I D B U L C

S GI RL D P U O R G Y B

D E T PRESEN PRESENTATION OUTLINE Identified Problem System Description Survey Results Prototype Cost & Benefit Study

System Specification IDENTIFIED PROBLEM 1. Outdated Operating Systems 2. Old software and hardware 3. Lack of a secure network SYSTEM DESCRIPTION Environment

Internet your clients the volunteers (coaches, instructors, umpires, etc.) sensitive information about your clients and volunteers),, Investors KidTrax software the Payment Card Industry Data Security Standard (PCI DSS)

Interfaces - interactions that relay personal information and/or schedule information They include 1) with e-mails, face-to-face contact or phone calls. 2) Internet (i.e. e-mail) 3)entering of that information into Internetlinked KidTrax software

Inputs: schedule information for volunteers and stakeholders capital inputs from investors payments for programs from the stakeholders. Outputs: schedule information for volunteers, employees, the kids, parents and sports field organizations the teachers and coaches output educational information or athletic concepts to the stakeholders (the children)

General Internal Processes: The activities department receives the payment information (amount and form of payment) from the stakeholders, then enters it into an excel database and KidTraxs record for accounts receivables. The CFO then processes this information using KidTrax's record and the excel database to incorporate paid receivables into the accounting records. (Schedule information concerning volunteers, stakeholders participating in certain programs, and sports field availability are handled similarly) Subsystems

the financial department activities department the program coordinating department the different programs the technology (the operating systems) WHAT OPERATING SYSTEM ARE YOU CURRENTLY USING ON YOUR WORK PC? 100% 90% 80%

70% 60% 50% 40% 30% 20% 10% 0% s w

o d in W 100 100 60

40 XP i W s w o d n

7 Abo u the t 20 o f k com ids wer puters e no

acc oun t ted for. HOW IMPORTANT IS IT TO KEEP PERSONAL INFORMATION SAFE? 100% - percent of responders marked very important

HOW EASILY CAN SOMEONE GET PERSONAL INFORMATION ABOUT A STUDENT? Targeted at five groups of people: Employees, Volunteer, Parent/Guardian, Another Student, Outsider (Hacker) Ranted on a scale one through five Results that stood out Employee, Volunteer, Outsider 60% of respondents believe It could be done

80% of respondents Outsider could get or easily get information HOW OFTEN DO YOU CHANGE YOUR PASSWORD? PROTOTYPE SOLUTIONS Windows 10 Office 2016 Norton Security Suite Internet Browser

New Windows 10 logon screen Windows 10 Desktop Windows 10 Start Menu Office 2016 Interface Internet Browser Interface

COST/BENEFIT Windows vs Other OS Comodo Internet Security SolarWind Microsoft Security Essentials SYSTEM SPECIFICATIONS Updating to Windows 10

Latest OS: Windows 7 Service Pack 1 OR Windows 8.1 Processor: 1 gigahertz or faster processor RAM: 1 GB for 32-bit version of Windows 10 OR 2 GB for 64-bit version of Windows 10 Hard disk space: 16 GB for 32-bit Windows 10 OR 20 GB for 64-bit Windows 10 Graphics card: DirectX or later with WDDM 1.0 driver Display: 800x600 resolution display Proposed Schedule

Replacing Old PCs Any machine that not meeting requirements EPC Computers in St. Charles Acquire Office 2016 Microsoft donation page Install Norton Small Business Security Solution Helps to ensure data is secure Estimated

Costs 30 refurbished machines for ~$2,500 One year of Norton Security ~$100 Total for the first year ~$3,000 Yearly maintenance and fees ~$500/year Business need Prevent costly data breaches Helps prevent lawsuits Too much personal information for these

risks Peace of mind Helps improve student use of technology Consistent setup through organization CONCLUSION Improvement of cybersecurity Peace of mind Improve childrens learning experience Spark new interest in technology

Recently Viewed Presentations

  • Emotions and Perception - Teaching Psychology

    Emotions and Perception - Teaching Psychology

    Caution again. 1. Similar-sounding terms, different concepts: Emotion Perception. Perception Emotion. Perception of emotions. 2. It can be difficult (or meaningless) to distinguish "perception" from "cognition"
  • Chemistry 1.1 - Education Perfect

    Chemistry 1.1 - Education Perfect

    A 5x5x5cm cube is cut into 125 1x1x1cm cubes. Calculate the total surface area exposed before and after the cutting? ... List all the variables that would need to be controlled in the Mg + HCl concentration experiment and give...
  • The relevance of equations when looking at ocean acidification

    The relevance of equations when looking at ocean acidification

    This has caused an increase in the amount of CO2 gas being emitted in the air. One million tonnes of CO2 is released every hour, and 30% of these omissions are absorbed by the ocean. ... Calcite and argonite are...
  • Saves Lives A R D T F Oklahoma

    Saves Lives A R D T F Oklahoma

    Drug overdose is now the leading cause of injury death in the United States.1. Opioid analgesics, such as prescription painkillers, account for about 80 percent of those deaths.1. Overdose rates have increased five-fold since 1990.1
  • Chapter 6

    Chapter 6

    Biotic potential increases. The Balance (density dependant) The Balance. Carrying Capacity. Predator- prey relationships. Migration (emigration) Carrying capacity—the maximum number the environment can support. Host specific parasites. Disease.
  • Behavior Models of Leadership - Siue

    Behavior Models of Leadership - Siue

    ABILITY TO MAKE GOOD DECISIONS NORMAL LEADER BEHAVIOR Lewin, Lippit, Whyte Satisfaction Productivity LEADER BEHAVIOR Ohio State INIATING STRUCTURE: STRESS GOALS DEFINES, STRUCTURES ROLES CONSIDERATION CONCERN FOR SUBORDINATE'S NEEDS, FEELSINGS BEHAVIOR MODELS OF LEADERSHIP LIFE CYCLE Hersey & Blanchard PATH...
  • Evidence-Based E-Mail Management at UNC: A Search for Best ...

    Evidence-Based E-Mail Management at UNC: A Search for Best ...

    Selection Framework Tried to apply Samuels' Varsity Letters model: Confer credentials Convey knowledge Foster socialization Conduct research Sustain the institution Provide public service Promote culture Samuels' Model Did Not Work We could not break all the individuals we had from...
  • Chapter 2: Iterative, Evolutionary, and Agile

    Chapter 2: Iterative, Evolutionary, and Agile

    For the POS: Implement a basic, key scenario of the Process Sale use case: entering items and receiving a cash payment. Implement a Start Up use case as necessary to support the initialization needs of the iteration. Nothing fancy or...