Preview

Riordan Section Three Paper

Good Essays
Open Document
Open Document
893 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Section Three Paper
Riordan Manufacturing

BSA/375

1 April 2013
Tim Groves

Riordan Manufacturing

Riordan is jumping head first into the 21st century and bringing all of the business systems currently used along with it. Those business systems will be upgraded so Riordan can continue to be an industry leader, but the 21st century is a very dangerous place. The world is full of groups of hackers who breach systems for profit, for a cause, or just to prove a point. Hackers were arrested in the Philippines for fraudulently charging AT&T customers and diverting the money to a group linked to Al Qaeda (UPI, 2011). This is one example of the threats that exist in the cyber world; one should not exclude rival companies from the security risks either.
Digital Security Measures Riordan has rare concept in the pyramid bottle and many manufacturing companies would be very grateful to get their hands on the blueprint. The same could apply to the artificial heart valve, especially in a society where heart disease is killing people every day. Corporate espionage is a real thing and multiple security measures need to be implemented in order to lockdown Riordan and protect it. First and foremost all files need to be encrypted and password protected. The Playstation Network was taken down easily because routers were left unprotected and the data belonging to users was not encrypted. Everything needs to be locked down digitally. Riordan conducts business in many places and hackers are everywhere. Finance and accounting use outdated systems and manually enter information. Integration of the systems through a secure pipeline will decrease the security risks but the files still need to be encrypted to secure ensure that all security holes are no longer open. Riordan also needs to invest in a firewall of some kind. The previously mentioned security measures will assist in



References: Kronos, Inc. (2011). Kronos Incorporated. Kronos for manufacturing workforce management software. Retrieved from: http://www.kronos.com/Industry/Manufacturing/Manufacturing-Workforce-Management-Events.aspx Moyer, E. (2011). iPhone latest power tool at Home Depot rival Lowe 's. Retrieved from http://news.cnet.com/8301-13579_3-20103723-37/iphone-latest-power-tool-at-home-depot-rival-lowes Sage Peachtree, (2011). Sage Peachtree. Sage peachtree premium accounting for manufacturing multi-user. Retrieved from: http://www.peachtree.com/productsservices/premium/manufacturing/MultiUser-Version UPI. (2011). Phone Hackers Tied to Terrorist Group. Retrieved from http://www.upi.com/Top_News/World-News/2011/11/27/Phone-hackers-tied-to-terrorist-group/UPI-46551322426606/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    Riordan Manufacturing is a global plastics manufacturer with 550 employees. The corporate headquarters are based in San Jose, CA, and its plants are located in Georgia, Michigan, and China. The company is owned by Riordan Industries. Its projected earnings are $46 million, and it holds revenues in excess of $1 billion. It manufactures plastics such as plastic beverage containers, custom plastic parts, and plastic fan parts.…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    I think that If Riordan changes to cloud computing It will help all the employees have access to the information that each of the employee needs. This way all employees of the company have access to log in and view any information that pertains to their position. By uploading all data to cloud computing will be easy for all the information being process and better for analyzing any information being inputted. This will increase all sales because with all the updated information with cloud computing they will be able to access from any smart phone or tablet also.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    3. Customer Service and Quality – Riordan strives to be a solution provider for its customer’s needs. The company has a long term relationship focus which drives it to rigorously control quality, provide innovative solutions, have reasonable pricing and provide responsive customer service solutions. Southwest and Chevron both aim to retain customers through good service and quality product offerings. Southwest also leverages its ability to provide low-price fairs and a good customer experience.…

    • 975 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Any company data, including Riordan 's procedures, practices, policies, employee and employment data, etc., will be held responsible and secured under Riordan Manufacturing. Any and all forms of the data that pertains to the company are classified and proprietary, and thus, passwords and data encryption will be fully utilized so that only the proper personnel are authorized to access this data. If any form of this data was to fall into unauthorized or wrong hands, this could be great liability to Riordan. "Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks" (Dennis, Wixom, & Roth, 2009).…

    • 938 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The supply chain for Riordan Manufacturing does consist of many different factors. From the ordering of the supplies and the shipping of different products, the resources can be stretched thin. In order to fix this the entire process, Riordan Manufacturing will need look at and review their current process to see if there are any areas that can be changed. In many cases, the products are being shipped internationally so in these instances there is little room for change due to the laws and regulations. With the other areas of shipping, especially in the China plant, the mode of shipping can be addressed. The Riordan uses two different companies for their shipments. To create a more streamlined process, Riordan can use FedEx solely. With this process, FedEx can make an agreement with Riordan for all of their shipping needs throughout the world. In some cases, FedEx would be able to offer discounts on the costs, lowering the costs to Riordan. Another area that can be addressed would be the motor ordering. There…

    • 1032 Words
    • 5 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Riordan currently operates four manufacturing plants; three located in the United States (San Jose, California; Pontiac, Michigan; and Albany, Georgia) and one overseas (Hang Zhou, China). Each plant contains the same basic departments, to include Sales and Marketing, Operations, Finance and Accounting, Information Technology (IT), Legal, and Human Resources. There are a few things we can do to make a good network even better, all four plants Sales and Marketing, Operations, Finance and Accounting, and Human Resources department netwoeks are all up to date with the latest equipment and software.…

    • 1877 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    Richman Investments has experienced an increase in security breaches that have resulted in the loss of company proprietary information and damage to systems due to many virus and Trojan Horse infections. The following outline contains some of the security mitigation proposals to be implemented shortly. This is just a basic plan for the moment and if security breaches continue, more stringent policies will be installed.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Information Systems

    • 3338 Words
    • 14 Pages

    Riordan Manufacturing and its use of information systems to increase efficiency will be the focus of this analysis and recommendation.…

    • 3338 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays