Preview

North Shore Medical Research Proposal Paper

Better Essays
Open Document
Open Document
1007 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
North Shore Medical Research Proposal Paper
CMIT 321
Executive Proposal
Aicha Doudou
UMUC
May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)
…show more content…

After five years of extraordinary success in the development of innovative medical and pharmaceutical products, NSMR is on its way to becoming a major player in the medical research and development industry. However, due to its success, NSMR has also become a major target of cybercriminals. NSMR has been the victim of cybercriminal attempts to steal intellectual property and sell it to NSMR’s competitor. Management suspects the corporate network has been infiltrated from unauthorized sources more than once. In 2011, NSMR was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of NSMR’s public website and several Denial of Service attacks at different times over a 9-month period that brought the corporate network to its knees. These attacks had a major impact on NSMR’s ability to conduct business and resulted in undesirable publicity for the company. Even with all the attack, NSMR has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company. NSMR’s innovative research and development information is vital to its continued success as a company. The security of NSMR’s network and intellectual property is a major concern for the company but management has been hesitant to spend expense on network security projects, due to the fact that NSMR is still a start up company. But that all change when NSMR’s learn of the attack on one of NSMR’s major competitors in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves. NSMR needs to monitor network traffic in order to recognize and identify DDOS attacks and any other available attacks in real

You May Also Find These Documents Helpful

  • Good Essays

    We recommend purchasing at least 4.3 beds; since we cannot have a 0.065 bed, we conclude 5 beds are required at a cost of 22,000*5=110,000. A graph of the probability follows, on Graph I.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    “the Carers” had 372 volunteers to answers calls. In reality they must have 900 volunteers to answer calls to be effective. It means that there is a lack of human potential of 528 people.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Manufacturing conducts an information systems security review over IT security issues that exist in different plants to prepare for an upcoming audit in accordance to the Sarbanes-Oxley Act. Several elements of the organization 's information systems require revisions and updates to optimize physical and network security, data security, and Web security.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    The purpose of this paper is to outline policies, standards, and procedures to improved NextGard’s Technologies organizational network. By implementing a successful security strategy we will give recommendations and guidance in areas of Access Control, Cryptography Methods, Malicious Virus Countermeasure, Monitoring and Analysis, Proxy Server and Internet Access Control to NextGard Technologies. All implementation outlined in this model should be used across all NextGard’s Technologies location, networks, and devices to better secure of information and protection against attacks. We will also provide NextGard with an awareness programs ensuring Nextgard’s 250,000 employees are up to date on cyber awareness. This model will improve over organization security, and protection of information NextGard provides to its customers.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Whoever conducts the investigation does so in a previously mandated, official, and legally recognized manner.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    There is this bright determined girl who is very motivated, ambitious and has the key to success. This girl is pure African, a true Muslim who was raised in a highly respectable way. She has bright eyes to determine who she truly wants to be. A vision without action is merely a dream. Action without vision just passes the time. Vision with action can change my life and my life changes others. I have a dream that truly discovers who I am but others cant determine who I want to be in the future. Who can this girl be ? Well her name is Hawa Kante, the one who could brighten your eyes and make her future a better dream.…

    • 1012 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Preventing attacks on your networks can be something that is stressful and very time consuming. Riordan has a Service request (SR-rm-013) in which the company shows concern about various security aspects within the company and the requirements of the Sarbanes-Oxley. Multiple different aspects of the company’s current security structure should be revised and updated to meet the standards of Sarbanes-Oxley Act.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Health Proposal Paper

    • 557 Words
    • 3 Pages

    Health promotion is defined as a dynamic process in which behaviors are intended to expand the positive health potential by increasing well being of the individual and actualizing human potential through participation in a lifestyle that supports a holistic perspective of health (Pender, Murdaugh, & Law, 2011). Health promotion programs helps build on encouraging and empowering individual to take more control of their health and reduce their risk of diseases as well as disabilities that might arise. The primary goal of a health proposal strategy is to expand, increase awareness, and improves health among a targeted, vulnerable population. Health promoting is an utmost primary concern for Federal, State, and County level. Residents in the state…

    • 557 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Java

    • 1218 Words
    • 5 Pages

    Mohd Fadzli Marhusin PhD (CompSc) UNSW (Cyber Security) Master (Info Tech) CompSc UKM BSc Info Studies (Info Systems Mgnt) UiTM American Associate Degree (Mgnt Info Systems) KYPM MCSE & MCTS Microsoft Faculty of Science and Technology (Information Security & Assurance Program) Universiti Sains Islam Malaysia Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia fadzli@usim.edu.my +606 798 8000 ext 6663…

    • 1218 Words
    • 5 Pages
    Satisfactory Essays