SlideShare a Scribd company logo
CINCINNATI WINDOW SHADE
  TECHNOLOGY OVERVIEW
 TEAM 5: Alex Rippe, Justin Cline-Bailey, Rodney Phelps
                     INFO 357-01
Introduction
• Family-owned business since 1933

• They install and service everything from
  manual to high tech shade systems

• They sell, service, maintain, and provide
  warranty services for multiple manufacturers
Technology History
• Their initial intranet was wired as thin net

• Upgraded up to 1 GB ethernet and wireless
  access

• Using some cloud based servers, such as
  Google Calendar.
Technology in Use
• Full T1 supporting a network of 11 PCs, 2 laptops,
  2 desktop printers, a shared Fax/copier/printer,
  drafting plotter, and a digital phone system.
• They maintain video and motion sensor security,
  along with the ability to remote monitor their
  security camera feeds
• They help to maintain two websites
Physical Layout
• Using a full T1 to support digital phone system
  and data service
• Services extend from the CSU/DSU to the
  front office area
• The T1 is extended to the wireless router with
  a built-in switch.
• Services go from the router to a 36 port
  Gigabit switch
• Started with Thin net
• Currently running a combination of cat5 and
  cat5e
• Potential throughput issues with cat5 cable’s
  ability to handle the 1 Gigabit Ethernet
  connection
• Cable runs not tagged at switch
• Their setup uses a Wireless N router with a
  built-in 4-port switch
• Networked with 10/100 or 1 Gigabit Network
  Cards
• The wireless access point is both secured and
  encrypted
Networking
• Running a P2P network
• Using one workstation as a file share and data
  storage device
• Multifunction fax device is shared through
  that workstation.
Equipment
• Computers: Most work stations contain Power
  Spec computers. 1 IBM and 1 HP as well.
• Printers: Two directly connected printers and a
  plotter. One printer is a multi-use and is a fax
  machine as well
• Other: Two credit card terminals. Video
  recording and Security System
• Inventory: There is no system in place to track
  assets (serial numbers or asset tags)
Software
• OS: Most systems are running Windows 7 Pro,
  3 are running XP, XP Home, or XP Pro. Some
  laptops are using Vista
• Anti-Virus: Norton 360
• Other: Microsoft Office, Peach Tree, and an
  industry specific design program
• Licensing: All softwares are licensed and
  recorded
• Maintenance: All are set to automatic updates
File Storage
• Employees are given a share of a file server
• Server is backed up daily on an external hard
  drive and then to Iron Mountain weekly
• Some information is still stored in paper
  format
Email
• External email service provided by web host
• Google Calendar, synched with Outlook, is
  used to share calendars with Mason Location
Security
• Physical: Motion sensors and cameras ran
  through a cellular service
• Logical: Microsoft’s built-in firewall. Router
  software provides a firewall. Data encryption
  is not being used.
Network Diagram
Policies
• Currently there are no written information system
  policies.
• This could be an issue with employees not
  understanding issues related to information systems
  and security
• Potentially leaves the company exposed to loss and
  or down time
Merchant’s Concerns
• What are the government’s requirements for
  storage of email and protection of privacy of
  employee and customer information?
• Which side of the firewall should a VPN be
  placed?
Recommendations
•Cisco recommends placing the VPN on an
inbound port of the firewall.
•Remove the switch and router and mount it on
a shelf or place it in a closet
•Label cabling to simplify troubleshooting
•Best solution: place router, switch, back up
device, power backup, and file server all in one
closet
Recommendations Cont.
• Hide the SSID on the wireless access point
  from public view
• Install a mount in the wire closet for the
  CSU/DSU to remove from the floor
• Written policy should be created to give
  guidance for automation security and
  acceptable use for technology

More Related Content

PPT
Final project
PDF
Netop remote control 12.5 Brochure
PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
PPTX
Design Like a Pro: SCADA Security Guidelines
PPTX
Section c group2_firewall_ final
PPTX
10 Quick Cybersecurity Wins for Small Business
PPTX
Network Security: Protecting SOHO Networks
PPTX
Firewall
Final project
Netop remote control 12.5 Brochure
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Design Like a Pro: SCADA Security Guidelines
Section c group2_firewall_ final
10 Quick Cybersecurity Wins for Small Business
Network Security: Protecting SOHO Networks
Firewall

What's hot (20)

PDF
Industrial Internet
PDF
Et software brochure
RTF
Kevin Wilhite 2015-Resume
PDF
DESMI remote access internet uplink
PDF
Wireless Connections In The Or Display
PPTX
Practical Approaches to Securely Integrating Business and Production
PPTX
Top 10 Design & Security Tips to Elevate Your SCADA System
PPTX
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
PPTX
CyberSecurity Best Practices for the IIoT
PPTX
IIOT on Variable Frequency Drives
PPTX
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
DOCX
venky 123
PDF
Itir oct0714-network security-en
PPTX
Mesh Surveillance Camera | EnGenius
PPTX
Design Like a Pro: Alarm Management
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PPT
Security Framework for the IPv6 Era
PPTX
Data center maintenance
PPTX
Networking Trends
PDF
Understanding WhatData Center Security Is
Industrial Internet
Et software brochure
Kevin Wilhite 2015-Resume
DESMI remote access internet uplink
Wireless Connections In The Or Display
Practical Approaches to Securely Integrating Business and Production
Top 10 Design & Security Tips to Elevate Your SCADA System
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
CyberSecurity Best Practices for the IIoT
IIOT on Variable Frequency Drives
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
venky 123
Itir oct0714-network security-en
Mesh Surveillance Camera | EnGenius
Design Like a Pro: Alarm Management
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Security Framework for the IPv6 Era
Data center maintenance
Networking Trends
Understanding WhatData Center Security Is
Ad

Viewers also liked (14)

PPT
Bai 20 tin hoc 10
PDF
Sochi 2014 Opening Ceremony: A Picture Storybook
PPTX
Excess Sugar And Calories Ruin Your Weight Loss Efforts
PDF
Hemjigdehuun negj hicheel1
PPT
Alkaanid10 100618044137-phpapp01
PDF
Ta konsep aktiva
PPT
Konsep aktiva
PPTX
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
PDF
Hemjigdehuun negj hicheel1
PPTX
Tipos de redes.
PPT
Alkaanid10 100618044137-phpapp01
PDF
ns-3: History and Future
PPTX
Himiin holboo 3
PPTX
Hemjigdehuun 2
Bai 20 tin hoc 10
Sochi 2014 Opening Ceremony: A Picture Storybook
Excess Sugar And Calories Ruin Your Weight Loss Efforts
Hemjigdehuun negj hicheel1
Alkaanid10 100618044137-phpapp01
Ta konsep aktiva
Konsep aktiva
OPTIMIZATION OF THE FUZZY CONTROLLER FOR AN IMPLANTABLE INSULIN DELIVERY SYSTEM
Hemjigdehuun negj hicheel1
Tipos de redes.
Alkaanid10 100618044137-phpapp01
ns-3: History and Future
Himiin holboo 3
Hemjigdehuun 2
Ad

Similar to Cincinnati window shade technology overview (20)

PDF
Architecting Secure Web Systems
PDF
NetworkDesign.CommunityPartnership
PDF
Tapsoft network solutions
DOCX
GREAT MINDS
DOCX
Technolo Report
DOCX
EthernetSatellite dishInternational Plastics, Inc. - C
DOCX
Ethernet satellite dishinternational plastics, inc. c
DOCX
IT327-1404A-01 Implementing, Managing and Mainta.docx
PPTX
Pc technologies product
PDF
Isc2conferancepremay15final
PPTX
Designing It infrastructure
PPTX
IT Infrastructure Project
PDF
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
PPTX
Check Point75 Makes3 D Security A Reality Q22011
DOCX
Case Background Assessment2 (Updated)
PPTX
Cisco @ Canadian Construction Association 2012
PPTX
Testing cloud services - EuroSTAR
PDF
Jeffrey Marous Resume
PDF
Strategic Architecture Presentation Pdf
PDF
SIEM evolution
Architecting Secure Web Systems
NetworkDesign.CommunityPartnership
Tapsoft network solutions
GREAT MINDS
Technolo Report
EthernetSatellite dishInternational Plastics, Inc. - C
Ethernet satellite dishinternational plastics, inc. c
IT327-1404A-01 Implementing, Managing and Mainta.docx
Pc technologies product
Isc2conferancepremay15final
Designing It infrastructure
IT Infrastructure Project
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Check Point75 Makes3 D Security A Reality Q22011
Case Background Assessment2 (Updated)
Cisco @ Canadian Construction Association 2012
Testing cloud services - EuroSTAR
Jeffrey Marous Resume
Strategic Architecture Presentation Pdf
SIEM evolution

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Encapsulation theory and applications.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
August Patch Tuesday
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A comparative analysis of optical character recognition models for extracting...
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25-Week II
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Encapsulation theory and applications.pdf
Enhancing emotion recognition model for a student engagement use case through...
1 - Historical Antecedents, Social Consideration.pdf
Heart disease approach using modified random forest and particle swarm optimi...
WOOl fibre morphology and structure.pdf for textiles
Univ-Connecticut-ChatGPT-Presentaion.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Web App vs Mobile App What Should You Build First.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Artificial Intelligence
Chapter 5: Probability Theory and Statistics
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
August Patch Tuesday
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A comparative analysis of optical character recognition models for extracting...

Cincinnati window shade technology overview

  • 1. CINCINNATI WINDOW SHADE TECHNOLOGY OVERVIEW TEAM 5: Alex Rippe, Justin Cline-Bailey, Rodney Phelps INFO 357-01
  • 2. Introduction • Family-owned business since 1933 • They install and service everything from manual to high tech shade systems • They sell, service, maintain, and provide warranty services for multiple manufacturers
  • 3. Technology History • Their initial intranet was wired as thin net • Upgraded up to 1 GB ethernet and wireless access • Using some cloud based servers, such as Google Calendar.
  • 4. Technology in Use • Full T1 supporting a network of 11 PCs, 2 laptops, 2 desktop printers, a shared Fax/copier/printer, drafting plotter, and a digital phone system. • They maintain video and motion sensor security, along with the ability to remote monitor their security camera feeds • They help to maintain two websites
  • 5. Physical Layout • Using a full T1 to support digital phone system and data service • Services extend from the CSU/DSU to the front office area • The T1 is extended to the wireless router with a built-in switch. • Services go from the router to a 36 port Gigabit switch
  • 6. • Started with Thin net • Currently running a combination of cat5 and cat5e • Potential throughput issues with cat5 cable’s ability to handle the 1 Gigabit Ethernet connection • Cable runs not tagged at switch
  • 7. • Their setup uses a Wireless N router with a built-in 4-port switch • Networked with 10/100 or 1 Gigabit Network Cards • The wireless access point is both secured and encrypted
  • 8. Networking • Running a P2P network • Using one workstation as a file share and data storage device • Multifunction fax device is shared through that workstation.
  • 9. Equipment • Computers: Most work stations contain Power Spec computers. 1 IBM and 1 HP as well. • Printers: Two directly connected printers and a plotter. One printer is a multi-use and is a fax machine as well • Other: Two credit card terminals. Video recording and Security System • Inventory: There is no system in place to track assets (serial numbers or asset tags)
  • 10. Software • OS: Most systems are running Windows 7 Pro, 3 are running XP, XP Home, or XP Pro. Some laptops are using Vista • Anti-Virus: Norton 360 • Other: Microsoft Office, Peach Tree, and an industry specific design program • Licensing: All softwares are licensed and recorded • Maintenance: All are set to automatic updates
  • 11. File Storage • Employees are given a share of a file server • Server is backed up daily on an external hard drive and then to Iron Mountain weekly • Some information is still stored in paper format
  • 12. Email • External email service provided by web host • Google Calendar, synched with Outlook, is used to share calendars with Mason Location
  • 13. Security • Physical: Motion sensors and cameras ran through a cellular service • Logical: Microsoft’s built-in firewall. Router software provides a firewall. Data encryption is not being used.
  • 15. Policies • Currently there are no written information system policies. • This could be an issue with employees not understanding issues related to information systems and security • Potentially leaves the company exposed to loss and or down time
  • 16. Merchant’s Concerns • What are the government’s requirements for storage of email and protection of privacy of employee and customer information? • Which side of the firewall should a VPN be placed?
  • 17. Recommendations •Cisco recommends placing the VPN on an inbound port of the firewall. •Remove the switch and router and mount it on a shelf or place it in a closet •Label cabling to simplify troubleshooting •Best solution: place router, switch, back up device, power backup, and file server all in one closet
  • 18. Recommendations Cont. • Hide the SSID on the wireless access point from public view • Install a mount in the wire closet for the CSU/DSU to remove from the floor • Written policy should be created to give guidance for automation security and acceptable use for technology