Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems, software, and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors, including financial services, manufacturing, transportation, and public services.
Information is an organization’s most valuable asset, yet traditional security practices have either not provided adequate protection of information or have been so restrictive that they have prevented organizations from making the maximum use of information to innovate, collaborate, and achieve competitive advantage. This is primarily due to the reactive approach to security that many organizations have been forced to take in the past. Rather than viewing information security as a business enabler, they have tended to view it as a business inhibitor—a defensive strategy, designed to prevent bad things from happening.
Analysis of the strengths and weaknesses of the steps taken by the organization
The problem is that good efforts in one area can be quickly nullified by failures in another. For example, a bank may protect its online banking portal from fraud only to have a privileged user copy confidential customer data to an unsecured laptop, which they then leave in a restaurant. These days, however, forward-thinking organizations like Global recognize the benefits of moving away from reactive “silo security” to take a more proactive and holistic approach to information security and compliance, based on the established discipline of risk management.
Global called upon the expertise of CIS-its own Security Division. CIS’s information risk management (IRM) strategy brings together, within a global framework, all the components that an organization needs to plan and implement an end-to-end approach for protecting a business’s most critical information assets.
Assessment of access control/IT domains given in the business problem for data confidentiality, integrity, and availability
Global, through CIS, prioritizes its business initiatives and protects the most valuable information at the point where it is most vulnerable. Once the information has been located and the risk assessment performed, Global implements controls, including policies, technologies, and tools to mitigate that risk. Repeatability and reuse of security controls is central to CIS·s strategy.
Evaluation of how layered security proved to be a positive solution in the given problem, including the impacts of layered security
CIS CompScan provides Global with a centralized view of the log information from thousands of security devices, including data generated by CIS DLP Suite, security tokens, and intrusion detection systems (lDSs). Identifying correlations between logs from all these sources can help in the early identification of potential security threats via Global Cadence. CompScan also helps the company to identify important cost efficiencies ensuring that Global will lead the market in infrastructure information systems provision.
You May Also Find These Documents Helpful
-
Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…
- 406 Words
- 2 Pages
Satisfactory Essays -
Do you have a DNS Server set up with your company? If so, what kind?…
- 128 Words
- 1 Page
Satisfactory Essays -
Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…
- 383 Words
- 2 Pages
Satisfactory Essays -
The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…
- 299 Words
- 1 Page
Satisfactory Essays -
The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.…
- 479 Words
- 2 Pages
Good Essays -
1. Research the following organizations and explain their involvement with the Internet public IP addresses:…
- 375 Words
- 2 Pages
Good Essays -
5. How long do you think it will take before the IPv4 addresses are completely exhausted? It could possibly become exhausted within the next two years or so.…
- 310 Words
- 1 Page
Satisfactory Essays -
4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…
- 1061 Words
- 5 Pages
Better Essays -
Program I’m studying is Associate Degree in Network System Administration. In order to get career working with computers I need more knowledge of wide area networks/ local area networks, configuring, troubleshooting, client-server networking, and Linux networking.…
- 447 Words
- 2 Pages
Satisfactory Essays -
During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…
- 499 Words
- 2 Pages
Satisfactory Essays -
Living with Hodgkin’s disease is not easy. Being diagnosed with Hodgkin's disease changes everything in your life, and the lives of those around you. People living with cancer may worry about what the future holds. They may worry about holding their jobs, caring for their families, personal relationships, or continuing with daily activities. Concerns about tests, treatments, hospital stays, and medical bills are also common. Doctors, nurses, and other members of the health care team can answer questions about treatment, working, or other activities. Meeting with a social worker, counselor, psychologist, or member of the clergy can be helpful to people who want to talk about their feelings or discuss their concerns. Often, a social worker can suggest groups that can help with rehabilitation, emotional support, financial aid, transportation, or home care.…
- 260 Words
- 1 Page
Satisfactory Essays -
Head injuries can be very serious, even causing death. A concussion is a traumatic brain injury that occurs with a blow to the head, causing the brain to hit the sides of the skull. Concussions can occur when participating in high-risk sports, being involved in a motor vehicle accidnet, or even just by falling. Concussions can temporarily affect brain functions such as concentration, balance, and memory.…
- 246 Words
- 1 Page
Good Essays -
Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)…
- 1647 Words
- 7 Pages
Powerful Essays -
The first step an organization must take in creating a security policy is to determine which assets to protect from which threats; a company that stores its customers’ credit card numbers might decide that those numbers are an asset that must be protected from eavesdroppers; then the organization must determine who should have access to various parts of the system; next, the organization determines what resources are available to protect the assets identified. Using the information it has acquired, the organization develops a written security policy. Finally, the organization commits to resources to building software, hardware, and physical barriers that implement the security policy.…
- 312 Words
- 2 Pages
Satisfactory Essays -
As observed at the 4th International Conference on Global e-Security in London in June 2008, Information Security Risk Management (ISRM) is a major concern of organizations worldwide. Although the number of existing ISRM methodologies is enormous, in practice a lot of resources are invested by organizations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organizations, but in most cases it is addressed in an ad hoc manner. The existence of a systematic approach for the development of new or improved ISRM methodologies would enhance the effectiveness of the process (Papadaki et al, 2008). In this review, we examine existing ISRM methodologies, analyse trends in the development of new or improved methods and highlight gaps in research on the subject. The overarching research questions that form the foundations for this study were consequently formulated as follows:…
- 2806 Words
- 12 Pages
Powerful Essays