Michael Elion, Bill Dillavou, Heather Baldwin, Mike Grasvik
University of Phoenix
CMGT/441
Alexander Pons
August 8, 2011
Learning Team B Riordan Manufacturing Service Request SR-rm-013 An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.
Sarbanes-Oxley Compliance
The Sarbanes-Oxley Act of 2002 (SOX) was enacted because of the actions of corporations during the 1990s (e.g. – WorldCom & Enron), and commands a higher level of accountability. This law changes the way companies manage financial reporting, auditors, internal controls, and executive responsibility.
Without a comprehensive and integrated finance and accounting (F&A) system, the effective management and decision-making of the organization is at risk. The data from each location requires manual consolidation every month that can result in lost or compromised data, typographical errors, and missed deadlines. Also the required external monthly
References: Riordan Manufacturing Intranet. (2006). Retrieved July 15, 2011, from Riordan Manufacturing Intranet: https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm Sima, C Business Continuity Planning. (2009, July 19). University of Massachusetts System – Umass Home DRG (2002). The Disaster Recovery Guide; Disaster Recovery Planning from A – Z. Retrieved on July 22, 2011 from http://www.disaster-recovery-guide.com/ Riordan Manufacturing Intranet. (2006). Retrieved July 23, 2011, from Riordan Manufacturing Intranet: https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm Rodriguez, E Slater, D. (2010, July 1). Business Continuity and Disaster Recovery Planning: The Basics – CSO Online - Security and Risk Riordan Manufacturing Intranet. (2006). Retrieved July 15, 2011, from Riordan Manufacturing Intranet: https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm SA4500 SSL VPN Appliance Virtual Private Network. (2011, July 30). Retrieved July 30, 2011, from Wikipedia.org: http://en.wikipedia.org/wiki/Virtual_private_network Best Practices and Tools Cyper Optic Group, LLC. (n.d.). How To Implement An ERP System. Open Source Enterprise Applications Development & Consulting - ERP, CRM, EDI & More!. Retrieved August 2, 2011, from http://www.cyop.net/how_to_implement_an_erp_system.html