Strayer University
CIS 502
December 15, 2013
Risk Assessment
Describe the company network, interconnection, and communication environment. In order to support their growing business, Global Finance, Inc. (GFI) has taken necessary actions to ensure their network remains fault tolerant and resilient from any network failures. GFI has acquired network devices in order to support their network and maintain interconnection among their employees and customers.
The World Trade Organization defines interconnection as:
“Linking with suppliers providing public telecommunications transport networks or services in order to allow the users of one supplier to communicate with users of another supplier and to access services provided by another supplier, where specific commitments are undertaken.” (Blackman & Srivastava, 2011) As technology has changed and competition has intensified, many forms of interconnection have evolved. All involve the linking of networks to enable customers of one network to communicate with customers of another network or to have access to services offered by another network operator. GFI’s network interconnects their employees to their customers through Internet and telecommunications. GFI employees are able to connect to their customers through two adjacent, non-competing telephone networks that interconnect so that subscribers on one network can call those on the other. Traditional wireline telephone and new wireless mobile carriers interconnect so that subscribers of the traditional phone service can call wireless subscribers, and vice versa. New competitive local telephone carriers allows GFI to interconnect with the incumbent carrier so they can attract subscribers in the common service territory, and enable those subscribers to call subscribers on the incumbent‘s network. (Blackman & Srivastava, 2011) GFI’s successful communication with their customers is required in order to conduct
References: Beaver, K. (2013, July 31). The Top 5 Network Security Vulnerabilities that Are Often Overlooked. Retrieved December 15, 2013, from Acunetix Web Application Security: http://www.acunetix.com/blog/featured/the-top-5-network-security-vulnerabilities/ Blackman, C., & Srivastava, L. (2011). Telecommunications Regulation Handbook. Washington, DC: The World Bank. Cernauskas, D., & Tarantino, A. (2011). Essentials of Risk Management in Finance. Hoboken: John Wiley & Sons, Inc. Duato, J., & Pinkston, T. M. (2006, July 14). Interconnection Networks. Retrieved December 15, 2013, from MIT.edu: http://web.mit.edu/6.173/www/currentsemester/readings/R07-interconnection-networks-hennessy-patterson.pdf Meritt, J. W. (n.d.). A Method for Quantitative Risk Analysis. Vanderburg, E. (2010, December 10). Criteria for Selecting an Information Security Risk Assessment Methodology: Qualitative, Quantitative, or Mixed. Retrieved December 15, 2013, from Jurinnov: http://www.jurinnov.com/criteria-for-selecting-an-information-security-risk-assessment-methodology-qualitative-quantitative-or-mixed