CMGT 440 - Introduction to Information Systems Security
University of Phoenix
Abstract
Introduction
Riordan manufacturing is a plastic injection molding company based in San Jose. The company also has various operations in 3 other Michigan cities as well as one overseas office in China. “Riordan has a 46 million annual earning” and their major customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers, bottlers, and appliance manufacturers”, (UOP Virtual Organization, 2006). This company was started by a chemistry professor in 1993 and has expanded over the last 7 years. In 2006 Riordan has projected to increase their sales from 46 million to 50 million dollars but in order for Riordan to keep pace with its competitors they will need to look at choosing a better method of reporting and collecting their sales and marketing information technology system. Each plant has an enterprise resource planning server. Its data store centralizes the management each plant’s resource applications (University of Phoenix, 2006). These applications hold vital information of customers, vendors and internal assets which must be secured. Various cryptographic and encryption standards are valuable tools in achieving this goal. Governmental regulatory compliance also asserts demands on data security. The following will evaluate each plant’s data security issues.
Riordan Manufacturing Locations
San Jose, California Plant During company research, it has become evident that the San Jose and Hangzhou network are strikingly similar; each houses approximately 35 - 40 users which connect to each plants two Cisco 5920 switches. “Cisco routers use the different communication protocols (Ethernet, TCP/IP, for instance) and have their own programming languages” (Cisco). The switches are not able to function to their fullest ability because of they are
References: Cisco. (2009). Cisco Networking. Retrieved October 5, 2009, from http://www.astahost.com/info.php/Cisco-Networking_t19362.html. Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440. Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from http://www.faulkner.com.ezproxy.apollolibrary.com/products/faccts/00018555.htm University of Phoenix. (2006). Riordan Manufacturing. Virtual Organizations. Retrieved on September 27, 2009, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm. Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440. Wikipedia. (2009). Enterprise Resource Planning. Wikipedia. Retrieved on October 4, 2009, from http://en.wikipedia.org/wiki/Enterprise_resource_planning.