Preview

Riordan Sr-Rm-013

Good Essays
Open Document
Open Document
722 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Sr-Rm-013
Riordan SR-RM-013

Riordan SR-RM-013

Hector, Victor, Ricardo, Jesse, Ismael

University of Phoenix

Abstract

Preventing attacks on your networks can be something that is stressful and very time consuming. Riordan has a Service request (SR-rm-013) in which the company shows concern about various security aspects within the company and the requirements of the Sarbanes-Oxley. Multiple different aspects of the company’s current security structure should be revised and updated to meet the standards of Sarbanes-Oxley Act.

Riordan SR-RM-013

Technology has been growing for the past years. With most of the world population relying on smart phones, computers, tablets for day to day operations, making it easier for one to multitask, it also makes it easier for people with bad intentions to get ahold of information that one wouldn’t want shared. Riordan being a manufacture for multiple products like plastic, heart valves, among others, has become concerned with recent talks about the Sarbanes-Oxley Act. This act also known as “Public Company Accounting Reform and Investor Protection Act” is in short words, enhanced standards for all United States Company to provide accurate of financial information. The company would like to know and conduct security reviews and recommend security issues within the company regarding network, data, and web security issues.

Antivirus

As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you



References: Larkin, E. (2009, December). Bugs and Fixes. PC World, 27(12), 38. Heatherly, R., Kantarcioglu, M., & Thuraisingham, B. M. (2012, June). Preventing Private Information Inference attacks on Social Networks. IEEE Transactions on Knowledge and Data Engineering Sommer, R. (2009, July). An architecture for exploiting multi-core processors to parallelize network intrusion prevention..Concurrency & Computation: Practice & Experience, 21(10)

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Data: All data must be kept secure and confidential. Any company data including company policies and procedures, as well as, employee data containing employment information will be held responsible under Riordan Manufacturing. Any forms of data that belong to the company are proprietary; therefore, data encryption and passwords will be utilized to allow authorization to access the data. If any form were to be intercepted into the wrong hands, this can be detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks” (Dennis, Wixom, & Roth, 2009).…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sr-Rm-004, Bsa/375

    • 2975 Words
    • 12 Pages

    References: • Exforsys Inc.: Execution for system. (2000-2010). Feasibility Study – Why needed before Programming. http://www.exforsys.com/tutorials/programming-concepts/feasibility-study-why-needed-before-programming.html…

    • 2975 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    If a company or organization’s data and systems are not secure, be it from lack of proper controls or improper physical security, then they would be out of compliance with industry standards. According to the SOX act a company is supposed to have internal controls in place to prevent and detect unauthorized access of financial data.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Riordan wants to resolve the additional issues regarding the implementation and processes of the final changes, as soon as possible. There will be a meeting next week to discuss this very issue, and this author will work as hard as possible to ensure that all this companies needs will be satisfied and met, and in secure and safe manner as…

    • 938 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Riordan is jumping head first into the 21st century and bringing all of the business systems currently used along with it. Those business systems will be upgraded so Riordan can continue to be an industry leader, but the 21st century is a very dangerous place. The world is full of groups of hackers who breach systems for profit, for a cause, or just to prove a point. Hackers were arrested in the Philippines for fraudulently charging AT&T customers and diverting the money to a group linked to Al Qaeda (UPI, 2011). This is one example of the threats that exist in the cyber world; one should not exclude rival companies from the security risks either.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    Richman Investments has experienced an increase in security breaches that have resulted in the loss of company proprietary information and damage to systems due to many virus and Trojan Horse infections. The following outline contains some of the security mitigation proposals to be implemented shortly. This is just a basic plan for the moment and if security breaches continue, more stringent policies will be installed.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays