October 2, 2014941009200
October 2, 2014center300003017520CONTROLLING Access PaperCMGT/430
9410036300CONTROLLING Access PaperCMGT/430
Introduction
Riordan Manufacturing recently been advised of the potential benefits of utilizing a cloud based network. Implementing a cloud based network will allow employees, contractors and business partners to access information stored on Riordan’s servers. There are additional security risk that will be presented by implementing this technology. These security risk will need to be overcome in the form of access controls and other security tools. Ultimately, the ability to become a mobile enterprise and the ability to adapt to an agile environment …show more content…
Each stakeholder that is accessing the network in addition to their user id and password will be assigned a RSA secure id token. This token changes its six digit login pin every 15 to 30 seconds. In an event that someone’s user id and password is compromised they would also need the secure id in order to access the network. Next Riordan administrative team will force users to use a static IP address. This static IP address will have one IP address for each user. Ultimately this will allow the administrative team to trust that IP address through the firewall ports. In addition to our multi-layers of defense that we have established with the use of user ids and passwords, RSA secure id’s, and static IP addresses we will have certain information accessed only through special request. The stakeholder will have to obtain a special digital certificate to access a certain level of databases. An example may be seen in finance, in order to access the finance database the stakeholder accessing information through the use of mobile access will have to gain special digital certificates in order to be granted pass the …show more content…
Less information being processed and stored on the local machine will increase the speed. Through the cloud the server and other mainframe/super computers are processing the data being inputted into the application. A huge benefit to the organization and any stakeholder will be the reduction in redundancy. Since all information is stored in one location there is not going to be multiple copies of the same file. The database will only allow one file to be executed at a time.
Conclusion
Now that we have a understanding how cloud based computing work we can see that It is a risky move for the organization. However, with the risk comes a great reward if we have proper access control and tools to prevent penetration. Creating a multi-layer defense may very well make it harder and more of an inconvenience to access our VPN but ultimately will decrease the risk that a vulnerability will be exploited. This change in the network structure will allow us to reduce cost, keep up to date software and provide more flexibility to our stakeholders all while increasing the scalability of the network.