Preview

Controlling Access Papercmgt/430: A Case Study

Better Essays
Open Document
Open Document
1434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Controlling Access Papercmgt/430: A Case Study
center23002311409410012100center818008227695
October 2, 2014941009200
October 2, 2014center300003017520CONTROLLING Access PaperCMGT/430
9410036300CONTROLLING Access PaperCMGT/430

Introduction
Riordan Manufacturing recently been advised of the potential benefits of utilizing a cloud based network. Implementing a cloud based network will allow employees, contractors and business partners to access information stored on Riordan’s servers. There are additional security risk that will be presented by implementing this technology. These security risk will need to be overcome in the form of access controls and other security tools. Ultimately, the ability to become a mobile enterprise and the ability to adapt to an agile environment
…show more content…
Each stakeholder that is accessing the network in addition to their user id and password will be assigned a RSA secure id token. This token changes its six digit login pin every 15 to 30 seconds. In an event that someone’s user id and password is compromised they would also need the secure id in order to access the network. Next Riordan administrative team will force users to use a static IP address. This static IP address will have one IP address for each user. Ultimately this will allow the administrative team to trust that IP address through the firewall ports. In addition to our multi-layers of defense that we have established with the use of user ids and passwords, RSA secure id’s, and static IP addresses we will have certain information accessed only through special request. The stakeholder will have to obtain a special digital certificate to access a certain level of databases. An example may be seen in finance, in order to access the finance database the stakeholder accessing information through the use of mobile access will have to gain special digital certificates in order to be granted pass the …show more content…
Less information being processed and stored on the local machine will increase the speed. Through the cloud the server and other mainframe/super computers are processing the data being inputted into the application. A huge benefit to the organization and any stakeholder will be the reduction in redundancy. Since all information is stored in one location there is not going to be multiple copies of the same file. The database will only allow one file to be executed at a time.
Conclusion
Now that we have a understanding how cloud based computing work we can see that It is a risky move for the organization. However, with the risk comes a great reward if we have proper access control and tools to prevent penetration. Creating a multi-layer defense may very well make it harder and more of an inconvenience to access our VPN but ultimately will decrease the risk that a vulnerability will be exploited. This change in the network structure will allow us to reduce cost, keep up to date software and provide more flexibility to our stakeholders all while increasing the scalability of the network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Part of the client-server architecture is to house all software in one location; this will in turn increase the security on the mainframe operating systems. Other techniques Riordan Manufacturing would be able use are advanced authentication and…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Any company data, including Riordan 's procedures, practices, policies, employee and employment data, etc., will be held responsible and secured under Riordan Manufacturing. Any and all forms of the data that pertains to the company are classified and proprietary, and thus, passwords and data encryption will be fully utilized so that only the proper personnel are authorized to access this data. If any form of this data was to fall into unauthorized or wrong hands, this could be great liability to Riordan. "Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks" (Dennis, Wixom, & Roth, 2009).…

    • 938 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan is jumping head first into the 21st century and bringing all of the business systems currently used along with it. Those business systems will be upgraded so Riordan can continue to be an industry leader, but the 21st century is a very dangerous place. The world is full of groups of hackers who breach systems for profit, for a cause, or just to prove a point. Hackers were arrested in the Philippines for fraudulently charging AT&T customers and diverting the money to a group linked to Al Qaeda (UPI, 2011). This is one example of the threats that exist in the cyber world; one should not exclude rival companies from the security risks either.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Satisfactory Essays

    With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each of the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Users will be able to login to the VPN by using their local username and password. By making use of a VPN connection, users should be able to easily access the network assets. VPN connections are protected by SSL encryption which provides communication security over the internet. Each of the remote access laptops will be encrypted with McAfee safeboot encryption and all local data will remain encrypted until a valid login is entered. McAfee safeboot encryption requires additional login information to access the IDI internal network.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Preventing attacks on your networks can be something that is stressful and very time consuming. Riordan has a Service request (SR-rm-013) in which the company shows concern about various security aspects within the company and the requirements of the Sarbanes-Oxley. Multiple different aspects of the company’s current security structure should be revised and updated to meet the standards of Sarbanes-Oxley Act.…

    • 722 Words
    • 3 Pages
    Good Essays