Preview

Riordan Manufacturing Enterprise Security Analysis

Good Essays
Open Document
Open Document
628 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Manufacturing Enterprise Security Analysis
Riordan Manfacturing Enterprise Security Analysis
CMGT/430 Version 3
October 31, 2011
Dave Perkins

Riordan Manufacturing Enterprise Security Analysis Riordan Manufacturing has offices in 4 locations. The corporate office is located in San Jose California. The review of all locations revealed that each location utilized Windows based products for processing of email. Below are the findings of server equipment at the various locations. 1) San Jose, CA a. Windows Exchange Server 2) Pontiac, MI a. Windows NT Exchange Server 3) Albany, GA a. Windows NT Exchange Server 4) Hangzhou, China a. Windows Exchange Server There are multiple vulnerabilities related to the Windows Exchange Servers that need to be address prior to establishing an enterprise security policy. Although all locations are capable of sending and receiving e-mail, they are very susceptible to attack from outside sources.
Recommendations to correct the problems associated with the Windows Exchange Server include upgrading to the latest Exchange Server, inclusion in enterprise wide backup plans, and adherence to government regulations regarding e-mail archiving and retention.
Risks versus Vulnerabilities Matrix
An assessment of Riordan Manufacturing E-mail Exchange Servers identified high impact vulnerabilities. If these vulnerabilities are not address they can hinder the speed of e-mail delivery and could also cause a denial of service (DoS) to users.
Asset Probability Impact Security Level Mitigation
Windows Exchange Server (E-Mail) High High High Keep up-to-date on patches for software and the underlying operating system; Install safeguards at various points of entry into the server; Upgrade to latest up-to-date version of Exchange Server.
Windows NT Exchange Server (E-Mail) High High High Use NTFS file system; Review all files to eliminate unnecessary shares; Add share permissions to shares to prevent anonymous access; Apply anti-virus solution



References: http://www.us-cert.gov/cas/techalerts/TA05-284A.html http://msdn.microsoft.com/en-us/library/ms913208(v=winembedded.5).aspx

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    Riordan Manufacturing expanded operations to include a new China plant in 2000. This expansion caused a shift in some of the manufacturing operations between plants and required retooling at the Michigan plant. Each of these facilities has its own Financial and Accounting Systems. That input is consolidated at the corporate office in San Jose.…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    upgrade its IT infrastructure to ensure it is capable of handling the requirements of the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Another SMTP Server security threat is denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Answers

    • 617 Words
    • 3 Pages

    One other security countermeasure to use if I did not want to encrypt e-mail from my corporate account would be to use a digital signature to ensure message integrity. I know this because I use it on a daily basis.…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 260 Final Exam Review

    • 300 Words
    • 2 Pages

    4. Know diff Exchange server roles and what it allows you to access -=n B…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Printing and Photocopier

    • 2280 Words
    • 6 Pages

    When it is a computer fault the IT department are responsible if it is a hardware failure, they will be able to pinpoint the problem and fix it more easily as they are experts in this field. I am not qualified in this area and could make things worse if I tried to fix it myself therefore it is my responsibility to report it to the IT department. However if it is a software failure it is the responsibility of e-know as they are our network providers and all our documents and software such as outlook are provided through e-know. They are specially trained to help talk us through how to fix the fault if it is just for an individual computer they can also take control of the computer session and fix the problem that way. However if there is a fault with everyone’s computer this could be a fault with e-know and that is their responsibility to fix and to let us know if the system isn’t working, they liaise with our IT department to ensure they are able to contact and inform us of these faults.…

    • 2280 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Inform employees about the existence of the Exchange and give a description of the services provided by the Exchange;…

    • 5324 Words
    • 22 Pages
    Good Essays
  • Good Essays

    The threat that can arise are if an employee downloads a virus, malware, or Trojan to their mobile phone, laptop, and even desktop. This is especially so for the remote devices because when these are connected to the Exchange server, it can infect the corporate network. If an employee is using their desktop to surf the Internet for personal usage and they open an email sent by a friend that has a virus attached, it can infect the network. Another example is if an employee registers for something personal online, such as a sweepstakes, this…

    • 880 Words
    • 4 Pages
    Good Essays