Explain the design approach and rationale:
To address these issues the management of Riordan Manufacturing we conducted a survey of these problems. Various users were interviewed and some recommendations were attained to improve on the entire network performance.
In the report from most users conducted from across all the branches users complained of frequent power loss and information lost. As a result, the company has decided to equip all the server rooms with Uninterrupted Power Supply (UPS) to enable users to save their files in various servers during power losses. Every workstation also must have a UPS to automatically pick up during power loss.
In addition, frequent denial of services attacks was also reported which indicated insecurity
…show more content…
From research on our network the external threats come from the internet majorly. Internet is a universal network that enables sharing of resources internationally. However, resource sharing can be greatly prone to attacks because the internet encompasses a lot of users with different motives. In addition, such attacks come from eavesdropping during transit but WebTechMsn has been able to address this issues by using fiber optic cables which are resistant to tapping of information a long communication channel.
Internal attacks come from employees working in the organization or those who have left. Employees tend to be trusted and they end up misusing this trend. WebTechMsn has put in place policies such as passwords policy to ensure restriction to some sensitive information to some employees. Employees have been given a form to fill as an ought between him and the organization information to keep them safely at all times possible. This comes with huge penalties if found violating.
Identify the predominant electronic and physical threats to communications
…show more content…
Security polices equally provides ways of handling network security in organization. They give employees guidelines on how to approach network security matters, handle tasks in an ethical way and maintain the standard network security of an organization.
In addition, these policies provide solutions to management on tackling issues that pertains to the security problems that arises from daily operation of the company. Such cases include what to do to an employee who is found compromising the security breaches of the company.
Describe how firewalls mitigate some network attack scenarios:
A firewall works by filtering all the information getting into a given network or leaving. It then blocks those that it considers harmful or unclear such as no source address from getting into the private network. (Beal, 2015)
Hardware firewalls are found in network processors such as routers and switches. These devices usually have firewalls ports usually a minimum of four which are programmed by network administrators according to the security restrictions of an organization. (Beal,
The firewall comes in hardware or software form and acts as a filter for all data
The reason for this project is to help come up with a new Human Resources Client-Server Database system. The capabilities of the new system will be to centralize Riordan Manufacturing’s data and will help improve the overall security of the data within. This was conveyed to the IT department due to the increased volume of personal data currently being sent across unsecure data-lines, within Riordan. An employee’s information is treated with the care and securing that information is priority one. Because Riordan has several locations around the country, a centralized database system is needed to secure the employee’s information, but also remain accessible to the employee’s that need access to this informatio.
Riordan Manufacturing is an industry leader in the field of plastic injection molding that has earned them international acclaim. (Apollo Group, Inc., 2004,). The mission that Riordan Manufacturing has embarked on will lead the company into the 21st century with a sound footing in the plastics manufacturing industry. In order for Riordan Manufacturing to be able to meet its customer 's needs and expectations, there needs to be systems in place that not only focuses on the quality but also the management of the manufacturing
Although Riordan has used a few different companies for its shipping needs, the company will benefit by taking a different approach, which will increase operational efficiency and competitive advantage. Certainly one area of concern is the less than optimal on-time delivery performance average of 93%, which affects negatively on the Riordan brand and customer satisfaction. Riordan will outsource its logistical requirements to the most qualified marketing partners. “Outsourcing is the act of moving some of a firm’s internal activities and decision responsibilities to outside providers.” Riordan will maintain its core competencies in-house, including the intellectual property of manufacturing high performance fans and outsource other logistical “non-proprietary” standardized processes.
Firewall controls the data traffic between internal and external non trusted networks. All systems must be protected from unauthorized access from non trusted networks.
Firewalls are software or hardware appliances that allow, prevent, detect, and warn about data packets being sent to and from the specified network(s). Generally, these are set up as rule-based devices, where administration configures these rules to allow or deny certain types of data, depending on source and destination IP address and port numbers. Dr. Porter, a security architect with Avaya's Global Managed Services division, explains typical firewall properties. The first firewalls were basically just gateways between two networks with IP forwarding disabled. Most contemporary firewalls share a common set of characteristics, as laid out by Dr.
reason why they need a firewall as it will not let certain data in by unknown sources.
Riordan manufacturing employs a total of 550 people. Forming several quality improvement teams will benefit the organization. Internal auditing groups, quality development teams, process review groups, and safety committees can provide information that assists in continual improvements. Representatives need to possess the following attributes:
In reviewing the current and historical sales and marketing information for Riordan Manufacturing, Inc., it became clear that there is a need for a new streamlined system to track the past and present workings of the company. There are past marketing plans being stored in one location in a file cabinet, limiting the personnel that has access to it (Riordan Manufacturing, Inc., 2012). Sales employees are using different methods to track their numbers, in some cases using pencil and paper (Riordan Manufacturing, Inc., 2012).
Firewalls are used in businesses to help prevent attacks, mitigate security issues, and provide a sense of known security for the organization. Firewall characteristics are generally the same from firewall brand or vendor to another in that they provide authorized access only into a network. This review will look into the common security features that are present within firewalls and how they are used in daily functions to help prevent issues that threaten organizations.
A firewall is a system or group of systems that enforces an access control policy between two or more networks. The means by which this control is accomplished varies widely, but in principle, the firewall is a pair of mechanisms, one that blocks traffic and one that permits traffic. Some firewalls emphasize blocking traffic, while others emphasize permitting traffic. The most important thing to recognize about a firewall is that it implements an access control policy. If you don't know what kind of access you want to permit or deny, or you let someone else or some product configure a firewall based on judgment other than yours, that entity is making policy for your whole organization.
An organizational response would be to create policies to deter internal attacks, which can be done in multiple ways. The first method would require creating a training program to educate employees and discourage such behavior. The second would be to create procedures outlining their different levels of access that employees can have depending on their job
Firewall is software that checks information coming from the internet or a network, and then either blocks it or allow it to pass through to my computer, depending the firewall setting.
Organizations which rely on network infrastructure for their business operation must utilize security technology to protect the network from harmful actions of automated attacks as well as malicious human activity. It is also important to enact policies and guidelines for the employees of the organization, which in many regards can be the weakest link in the chain of security. According to a survey by The Ponemon Institute (2012), “78 percent of respondents said their organizations have experienced a data breach as a result of negligent or malicious employees or other insiders” (p.1). A statistic like this points to the need for comprehensive policies that detail the company’s expectations and mandates for specific situations relating to
For an organization to run smoothly, organizations must utilize polies and procedures. Furthermore, to ensure a smooth operation those policies and procedures must be enforced. Unfortunately, one of the most difficult aspects of ensuing policies are effective within the organization is through policy enforcement. Users themselves have the ability stress the boundaries of policy guidelines. There are those within an organization who at times have a problem with the policies within the organization who dislike guidelines before them to include top performers. However, an equal treatment from management is important if the organization is to assure users throughout organizations understand the enforcement of organizational policy will levied equally to all individuals. However, security professionals will are not able to reach the point of enforcement if the policy presented to the executive