Preview

Case Study 1 Florida Department Of Management Services

Powerful Essays
Open Document
Open Document
1348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study 1 Florida Department Of Management Services
Case Study 1: Florida Department of Management Services, Part I Gwendolyn Harris Strayer University
CIS 505/ Week 4 Case Study

Introduction In the early 1990s, the Florida Department of Management Services (DMS) had built up a large information systems network that served state government agencies in 10 regional sites and connected these to the data center in Tallahassee. The network was based on the use of the proprietary Systems Network Architecture (SNA) from IBM and a mainframe at the data center that housed most of the applications.
Body
1. Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.
Two security mechanisms needed to protect the DMS systems are Virtual Private Networks and IP Security. According to Stalling (2009) Virtual Private Networks (VPN) makes use of encryption and special protocols to provide security for those using the Internet or some other public network to interconnect sites. These public networks provide an access path for telecommuters and other mobile employees to log on to corporate systems from remote sites. The state employees would have to use the VPN to access the DMS by authenticating using their work credentials. IP Security (IPSec) provides the capability to secure communications across a LAN, across private and public WANs and across the Internet. Some examples of IPSec are: (1) Secure branch office connectivity over the Internet:
A company can build a secure virtual private network over the Internet or over a public WAN. This type of business rely heavily on the Internet and reduce its need for private networks, saving costs and network management overhead. (2) Secure remote access over the Internet: An end user whose system is equipped with IP security protocols can make a local call to an Internet service provider (ISP) and gain secure access to a company network. This reduces the cost of toll charges for traveling



References: Stallings, W. (2009). CIS 505: Business Data Communications: Custom edition (6th ed.). Upper Saddle River, NJ: Prentice Hall. Florida DMS http://www.dms.myflorida.com Manivannan, M. M. (2012). Building around IP. Engineering & Technology (17509637), 7(2), 78-81. doi:10.1049/et.2012.0211 Alexy, O., & Reitzig, M. (2012). Managing the business risks of open innovation. Mckinsey Quarterly, (1), 17-21. Sanni, M. L., Hashim, A. A., Anwar, F. F., Naji, A. W., & Ahmed, G. M. (2011). Mobile Multicast in Wireless Mesh Networks. Australian Journal Of Basic & Applied Sciences, 5(9), 957-966.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Cordeiro, C., Gossain, H., and Agrawa, D. "Multicast over wireless mobile ad hoc networks: present and future directions", IEEE Network, 17(1), 2003.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    open innovation

    • 1409 Words
    • 5 Pages

    “Open innovation is a paradigm that assumes that firms can and should use external ideas as well as internal ideas, and internal and external paths to market, as the firms look to advance their technology”. Alternatively, it is "innovating with partners by sharing risk and sharing reward." The boundaries between a firm and its environment have become more permeable; innovations can easily transfer inward and outward.…

    • 1409 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    cisco del monte

    • 1840 Words
    • 9 Pages

    Del Monte Foods is one of the largest, most wellknown producers and distributors of premium food…

    • 1840 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    he open innovation phenomenon has developed from a small club of innovation practitioners, mostly active in high-tech industries, to a widely discussed and implemented innovation practice. Simultaneously, a small community of management researchers has recently developed into an established research field. This is reflected by several special issues on open innovation, for example, R&D Management 2006, 2009, and the International Journal of Technology Management 2010a, b. Consequently, single lectures by early proponents have been supplemented by large management seminars on open innovation, which are often fully booked. Once a field grows rapidly, there is a danger that it may become a short-term fashion and hype. This special issue reports on recent research evidence to further develop the open innovation research field. Open innovation has been defined as ‘. . . the use of purposive inflows…

    • 6038 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Loan monitoring system RRL

    • 6033 Words
    • 25 Pages

    In this age of information, almost all fields of endeavor such as education, manufacturing, research, games, entertainment, and business treat information systems as a need. Indeed, every activity in our daily life today requires people to get involved in the use of information systems. Many organizations today use information systems to offer services with greater satisfaction to customers, to access a wider range of information, to handle Business changes at a greater speed, and to increase the productivity of workers. Based on a number of researches, an effective information system should be able to exceed customer expectations and fulfill business needs.…

    • 6033 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Digitization of records

    • 8465 Words
    • 44 Pages

    West, J. and Gallagher, S. (2006), “Challenges of open innovation: the paradox of firm investment…

    • 8465 Words
    • 44 Pages
    Powerful Essays