CIS 505/ Week 4 Case Study
Introduction In the early 1990s, the Florida Department of Management Services (DMS) had built up a large information systems network that served state government agencies in 10 regional sites and connected these to the data center in Tallahassee. The network was based on the use of the proprietary Systems Network Architecture (SNA) from IBM and a mainframe at the data center that housed most of the applications.
Body
1. Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.
Two security mechanisms needed to protect the DMS systems are Virtual Private Networks and IP Security. According to Stalling (2009) Virtual Private Networks (VPN) makes use of encryption and special protocols to provide security for those using the Internet or some other public network to interconnect sites. These public networks provide an access path for telecommuters and other mobile employees to log on to corporate systems from remote sites. The state employees would have to use the VPN to access the DMS by authenticating using their work credentials. IP Security (IPSec) provides the capability to secure communications across a LAN, across private and public WANs and across the Internet. Some examples of IPSec are: (1) Secure branch office connectivity over the Internet:
A company can build a secure virtual private network over the Internet or over a public WAN. This type of business rely heavily on the Internet and reduce its need for private networks, saving costs and network management overhead. (2) Secure remote access over the Internet: An end user whose system is equipped with IP security protocols can make a local call to an Internet service provider (ISP) and gain secure access to a company network. This reduces the cost of toll charges for traveling
References: Stallings, W. (2009). CIS 505: Business Data Communications: Custom edition (6th ed.). Upper Saddle River, NJ: Prentice Hall. Florida DMS http://www.dms.myflorida.com Manivannan, M. M. (2012). Building around IP. Engineering & Technology (17509637), 7(2), 78-81. doi:10.1049/et.2012.0211 Alexy, O., & Reitzig, M. (2012). Managing the business risks of open innovation. Mckinsey Quarterly, (1), 17-21. Sanni, M. L., Hashim, A. A., Anwar, F. F., Naji, A. W., & Ahmed, G. M. (2011). Mobile Multicast in Wireless Mesh Networks. Australian Journal Of Basic & Applied Sciences, 5(9), 957-966.