Summary
Penzil Vintage Autoparts supplies automotive parts to mechanics, dealers and lately to the mining industry. There are 4 offices and 1 warehouse from where all stock is sourced. Currently the inventory system located at the warehouse is accessed on expensive fixed 512Kbit lines. They are geographically spread out as per this map (Not to Scale). These are in Hillarys, Osborne Park (being the main warehouse), Alexander Heights, Kewdale and Melville. Penzil Vintage Autoparts has recently had some issues and you have been assigned by your boss to assess and report on resolution strategies for the customer.
The 4 stores generate a base turnover of $100 million per year with 150 employees. Over 50% of business revenue is from credit
…show more content…
Police have been unable to respond or provide any detail. The person supporting the issue with the SQL inventory system has been unable to provide any data to explain the shipping errors. The account passwords and other traces of the old IT administrator have been cleansed from the system.
Current Wireless Installation Details
• All sites are using 16Dbi omni-directional antennae’s on 16 meter towers with 2 Watt injectors that connect to 200mw APs (Linksys WRT54G)
• The APs in the store are a mix of Cisco 1200 series APs
• Managerial AP is Cisco 1200 series at 100mW
• Inventory AP is Netgear WG602 at 100mW with 6dBi antenna
• Wireless cards are a mix of 802.11b and g cards from Netgear, Proxim and DLink
• There are some wireless tills
• WEP Encryption is being used
• SSID is Penzil Vintage Autoparts and is broadcasting
• No Firewall, VPN or other countermeasure except virus protection
• All Infrastructure is running on 172.16.0.0/16 network
Network Analysis and Vulnerabilities
Here we will analyze each component of installation, and will discuss risk, countermeasures, update of hardware or software individually .By analyzing the above network , there were lot of vulnerabilities . The network contains many loop holes which are to be considered and should be updated wherever necessary. There are lot of vulnerabilities which are hidden and not known to users and company
* Closing stores operation the labour cost (4 employees) and space can provide $200,000 savings per year.
Rob Pettigrew is the manager of technical systems and help desk center of Wyoming Medical Center in Casper, Wyoming. Protecting networks are getting harder as there are different types of devices being used by companies. An example of this is Wyoming Medical Center has four different classifications of PCs, PCs in the hallways for the staff to use, PCs at the nursing stations, PCs in offices, and PCs on that move between patient rooms. Pettigrew deployed Novell ZenWorks to 850 of the medical centers 900 PCs to ensure each one has the right software. With having multiple applications, medical software systems, and the different machine types, and restrictions make it difficult for Pettigrew to ensure proper protection for the network. Another concern is the
There are multiple aspects of security in this network, which I have tried to implement as much as possible. This is where the CIA triangle comes into play, confidentiality, rules and limits to access information; Integrity, making sure the data is accurate and trustworthy; Availability, having reliable access to the information. I am going to talk about each aspect in a list format and explain how it’s used in my network. One thing that will be performed on all network devices is system updates and patches. They will happen on a monthly basis, on a weekend when the networks are not being used.
The First World Bank Savings and Loan network infrastructure update will be Linux based. The bank will utilize a custom kernel designed with the input of a Linux Security consultant. This proprietary kernel is adaptable, scalable and modular to readily handle the bank’s network. This kernel was collaboratively developed by the bank’s Security and IT directors with a consulting firm that specializes in Linux network security.
The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very
During the years of 1969 and 1973, the company created majority of its 600 new stores in an effort to outpace its competitors; however, this period of rapid growth happened just prior to the company’s final year and was clearly a major factor that led to the company’s bankruptcy. On the company’s financial statements, it indicated that the fixed assets grew, on average, almost 15% a year during that time period between 1969 and 1973. This was substantially higher than the previous years’ fixed asset growth rates and should have been seen as a red flag by company executives and analysts. The executives and analysts at Grant should have questioned how the rapid growth rate in fixed assets was being financed, as well as figured out if the company truly could finance the growth. The company’s plan to finance the rapid growth will be discussed below.
The inventory and production departments also have issues. Currently, inventory is done by the receiving area supervisor confirming the shipping documents against incoming orders by hand. This allows for human error and is not a quick or efficient way to do inventory. The same process is used when production takes items from inventory. The inventory system is only updated once daily when new raw materials arrive and then again once daily from production when the raw material is used. The lack of tracking and checking in a timely manner leaves the organization’s processes at a higher risk of failure. The inventory system does not currently communicate with the sales or with the Finance and Accounting applications. This may lead to a
Step 3 – In this step WTC will deploy and install the necessary equipment for the wireless broadband that will connect all the stores and the WLAN that will be used within the stores.
Current funds allocated to advertising and sales promotion is 3% of net sales ($80,000,000) = $360,000
Established in 1984, 210 full-time employees, 200 part-time employees. 2006 sales = $1.9 Billion. Dealing with an
To finish the network set up Pat Aquila installed the Access Point. We connected it to port 23 in both switches and made the wireless network available. We made a small site survey and found a good place to install the AP, and as a result we got a good signal in all environments. Picture 5 shows the Access Point of Valencia, which is located on the second floor, immediately above the stairs.
It can be assumed that the wrong item is either freighted back at Newtons cost or accepted as a loss. The consequence of each error is very damaging to the reputation and financial stability of the company, alarmingly no records are kept on error rates. Without the analysis of records, it is difficult to focus on the cause and develop solutions, inevitably remaining in a cycle of repeated errors until it has catastrophic repercussions for the companies’
Once the device would be introduced to the network it would immediately be vulnerable to remotely executed critical vulnerabilities. Our device baseline images should be updated and validated on a regular basis to update their security configuration according to current best practices.
We have about 450 employees. We have 17 retail locations and our wholesale business delivers to
Each store had a single-user Point-of-Sale (POS) system that was used to record sales. Each store received deliveries once a month. The sales and profit at each store was manually printed out from the POS software once a month by the supervisor. He/She held the physical copy of the report in the store for several days until the regional manager came to pick it up. After picking up all the physical reports from stores in his/her region,, the regional manager then travelled to the head office to enter all the sales data in a single user sales management system. The store supervisor also sent physical copies of the inventory counts to the senior managers of the warehouse and the senior manager of the accounting department. Each of these senior managers had access to single-user inventory management software and accounting software respectively. Sarah, a Regional VP for mall operations, is aware of some of the problems of the operations: