Preview

Riordan Security Issues

Powerful Essays
Open Document
Open Document
1371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Security Issues
Running head: WEB SECUIRTY ISSUES AND CONCERNS

CMGT 440 - Introduction to Information Systems Security
University of Phoenix

Abstract

Introduction

Riordan manufacturing is a plastic injection molding company based in San Jose. The company also has various operations in 3 other Michigan cities as well as one overseas office in China. “Riordan has a 46 million annual earning” and their major customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers, bottlers, and appliance manufacturers”, (UOP Virtual Organization, 2006). This company was started by a chemistry professor in 1993 and has expanded over the last 7 years. In 2006 Riordan has projected to increase their sales from 46 million to 50 million dollars but in order for Riordan to keep pace with its competitors they will need to look at choosing a better method of reporting and collecting their sales and marketing information technology system. Each plant has an enterprise resource planning server. Its data store centralizes the management each plant’s resource applications (University of Phoenix, 2006). These applications hold vital information of customers, vendors and internal assets which must be secured. Various cryptographic and encryption standards are valuable tools in achieving this goal. Governmental regulatory compliance also asserts demands on data security. The following will evaluate each plant’s data security issues.

Riordan Manufacturing Locations
San Jose, California Plant During company research, it has become evident that the San Jose and Hangzhou network are strikingly similar; each houses approximately 35 - 40 users which connect to each plants two Cisco 5920 switches. “Cisco routers use the different communication protocols (Ethernet, TCP/IP, for instance) and have their own programming languages” (Cisco). The switches are not able to function to their fullest ability because of they are



References: Cisco. (2009). Cisco Networking. Retrieved October 5, 2009, from http://www.astahost.com/info.php/Cisco-Networking_t19362.html. Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440. Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from       http://www.faulkner.com.ezproxy.apollolibrary.com/products/faccts/00018555.htm University of Phoenix. (2006). Riordan Manufacturing. Virtual Organizations. Retrieved on September 27, 2009, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm. Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440. Wikipedia. (2009). Enterprise Resource Planning. Wikipedia. Retrieved on October 4, 2009, from http://en.wikipedia.org/wiki/Enterprise_resource_planning.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Cis/207 Team Final

    • 4177 Words
    • 17 Pages

    Riordan Manufacturing is a worldwide fortune 1000 enterprise manufacturer of plastics with sole ownership by Riordan Manufacturing Industries. Custom plastic product parts akin to beverage containers and fan parts help generate company revenue of one billion. Riordan development and research carries out at the company’s R&D headquarters location in San Jose, California. Three additional Riordan production plants include locations in Pontiac, Michigan and Albany, Georgia with an international joint venture in Hang Zhou, China. Riordan employs a mere approximate of 550 people with company projections at $46 million a year. The U.S. Department of Defense rounds off Riordan’s primary customer basis in conjunction with aircraft and automotive manufacturers in addition to beverage makers.…

    • 4177 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    References: Information security: why the future belongs to the quants, Security & Privacy Magazine, IEEE, July-Aug. 2003, Volume 1, Issue 4, Page 24 –32…

    • 30867 Words
    • 124 Pages
    Satisfactory Essays