Tayla DaSilva
IT 244
September 23, 2012
James Lemaster
Week 1 Assignment The company I have chosen is The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. I think Program-Framework security policy is the best overall for this type of company. As the Bloom Design Groups network stands right now it is at a high risk for potential hackers and overall business continuity. The company has one website for both the employees and the customers to gain access to which creates a significant security risk. The company should have a secured intranet complete with a firewall and a secondary form of login credentials such as a key-fob, which randomly generates a series of numbers that will allow the employees to gain access to the website. Then the network administrators should restrict access to certain employees that don’t need access to sensitive data such as the customers’ financial data. Then I would create a separate secured website where the customers can register and then be able to login with their own user credentials. Having a dedicated server that would back up the company’s financial, and customer records, would also assist in making this company a stronger and more secure establishment. Having a
References: • Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 2. Retrieved from Mark S. Merkow, Jim Breithaupt, IT244- Intro to IT Security. • Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 4. Retrieved from Mark S Merkow, Jim Briethaupt, IT244-Intro to IT Security.