Network_Group_6

How do networks improve the sharing of resources within these organizations?

Government

Sarah: Structure of networks http://gcn.com/portals/networks-communications-systems.aspx This site is about rating certain things for the government's computer uses. http://ask.slashdot.org/article.pl?sid=01/04/16/161248 This site shares with me how the government utilizes the internet. http://blog.wired.com/defense/2008/04/pentagon-looks.html This page relates information technology to the network science they are working with.

__Government Network Structure__ The government network structure is similar to local network area structures. They start with an internet connection in the form of a cloud. It uses a method of connection either via cable or digitally to connect with computers. Then the government uses cloud-computing in order to share their information with other branches of the government. This is how the government utilizes the internet and network structures. My first source was []. This site tells me how the government uses the internet. Even though it is a blog, it is helpful to me in that it shares with me how the government usefully goes on the internet. My second source is []. This source adds to my research that that the Stimulus package put forth by President Obama includes money to be used for better energy distribution. this energy distribution money will also be used to improve the infrastructure used in the government.

Montserrat: New Technologies

http://www.barackobama.com/issues/technology/#solve-problems

http://www.govtech.com/gt/articles/634446 Cloud computing not a new technology but a new service the government will use.

Jonathan: Security vs. Access

Sources:
Agencies are responsible for the security of and access to agency program data, consistent with legislative or administrative restrictions. Agencies are also responsible for securely operating their own local area networks and servers. Unsecure operating practices, which expose other connected State networks to malicious security violations, are not acceptable.-http://www.state.mi.us/adminguide/1400/1410-17.htm

Weakness in the security of a system is not a license to penetrate or abuse a system. Unauthorized access to a networked computer is explicitly a violation of the State Acceptable Use Policy. Likewise, users are prohibited from breaking into other user accounts or files without their permission or maliciously disrupting their service. Users are individually responsible for all network resources assigned to them; hence the sharing of accounts, passwords or assigned resources is prohibited. Users must power down their desktop PC workstations or log off from their local area network when leaving for the day.-http://www.state.mi.us/adminguide/1400/1410-17.htm http://www.state.mi.us/adminguide/1400/1410-17.htm this is a very important

=Government: security vs. access=

the security of the government is a very complex system. the government has many files that are really valuable so they restrict the access to view these files by the government by setting up special codes and passwords that need to be unlocked to move forward. the government use a special techniques to lessen the access and the heighten the security of the files that need to be protected that are on the internet or are passing through the internet to a new destination. they protect files that they are holding by setting up passwords. when sending valuable files across the internet they use special codes to type up the files so they are not intersected and stolen by someone else. once the file reaches its destination the files are decipher by a special machine.