Describe the organizational authentication technology

Assignment Help Computer Networking
Reference no: EM131316550

GLOBAL ASSET, INC. (GAI)

Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial management, loan application approval, wholesale loan processing, and investment of money management for their customers. GAI employs over 1,600 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; GAI
was only recently profiled in Fortune Magazine.

The executive management team of GAI:

CCO
Andy Murphy
Vice Presidnet
Trey Elway
Executive
Assistant
Julie Anderson
COO
Mike Willy
CEO
John Thompson
CFO
Ron Johnson
Executive
Assistant
Kim Johnson
Executive
Assistant
Michelle Wang
Director of
Marketing
John King
Director of HR
Ted Young

Figure 1 GAI Management Organizational Chart

BACKGROUND AND YOUR ROLE

You are the Computer Security Manager educated, trained, and hired to protect the physical and operational security of GAI's corporate information system.

You were hired by COO Mike Willy and currently report to the COO. You are responsible for a $5.25m annual budget, a staff of 11, and a sprawling and expansive data center located on the 5 floor of the corporate tower. This position is the pinnacle of your career - you are counting on your performance here to pave the way into a more strategic leadership position in IT, filling a vacancy that you feel is so significantly lacking from the executive team.

There is actually a reason for this. CEO John Thompson believes that the IT problem is a known quantity that is, she feels the IT function can be nearly entirely outsourced at fractions of the cost associated with creating and maintaining an established internal IT department; the CEO's strategy has been to prevent IT from becoming a core competency since so many services can be obtained from 3rd parties. Since the CEO has taken the reigns two years ago, the CEO has made significant headway in cutting your department's budget by 30% and reducing half of your staff through outsourcing. This has been a political fight for you:

maintaining and reinforcing the relevance of an internal IT department is a constant struggle. COO Willy's act of hiring you was, in fact, an act of desperation: the increasing operational dependence on technology combined with a diminishing IT footprint gravely concerned Jacobson, and he begged to at least bring in a manager to whom these obligations could be delegated to. Jacobson's worst nightmare is a situation where the Confidentiality, Integrity, and Availability of the information system was compromised bringing the company to its knees - then having to rely on vendors to pull him out of the mess.

GAI has experienced several cyber-attacks from outsiders over the past a few years. In 2012, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. GAI ended up paying its customers a large sum of settlement for their loss of data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.700, 000 in revenue and intangible customer confidence.

There's no question that the company's CEO sees the strategic importance of technology in executing her business plan, and in this way you share a common basis of principle with her: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels she can acquire that capability immediately and on the cheap through the open market. You're told that CEO Thompson reluctantly agreed to your position if only to pacify COO Willy's concerns.

CORPORATE OFFICE NETWORK TOPOLOGY

Wireless Antenna

Figure 1 Global Asset Inc. Network Topology

You are responsible for a corporate WAN spanning 10 remote facilities and interconnecting those facilities to the central data processing environment. Data is transmitted from a remote site through a VPN appliance situated in the border layer of the routing topology; the remote VPN connects to the internal Oracle database to update the customer data tables. Data transaction from the remote access to the corporate internal databases is not encrypted.

A bulk of the data processing for your company is handled by Oracle database on a high end super computer. The trusted computing based (TCB) internal network is situated in a physically separated subnet.

This is where all corporate data processing is completed and internal support team has its own intranet web server, a SUS server, an internal DNS, an e-mail system, and other support personnel workstations. Each corporate department is segregated physically on a different subnet and shares the corporate data in the TCB network.

OTHER CONSIDERATIONS

1. Ever since the article ran in Fortune about GAI, your network engineers report that they've noted a significant spike in network traffic crossing into the internal networks. They report that they cannot be certain what or who is generating this traffic, but the volume and frequency of traffic is certainly abnormal. The management is very concerned over securing the corporate confidential data and customer information.

2. Increasingly, GAI's CEO Thompson attempts to outsource IT competency. In fact, you've been told of a plan from COO Willy to outsource network management and security functions away from your department and to a service integrator. COO Willy warns you that the political environment will only become more contentious over time; you must make a compelling case as to what value your department can bring over an integrator that can provide secure services at 40% less annual cost than you.

3. The interrelationship between data and operations concerns you. Increasingly, some of the 10 remote sites have been reporting significant problems with network latency, slow performance, and application time-outs against the Oracle database. The company's business model is driving higher and higher demand for data, but your capability to respond to these problems are drastically limited.

4. Mobility is important for the organization to interact with the customers and other co-workers in near real-time. However, the CEO is concerned with the mobility security and would like to research for the best practice for mobility computing. The CEO is willing to implement a BYOD policy if security can be addressed.

5. Employees enjoy the flexibility of getting access to the corporate network using a WiFi network.

However, the CEO is concerns over the security ramifications over the wireless network that is widely open to the company and nearby residents.

6. The company plans to offer its products and services online and requested its IT department to design a Cloud Computing based e-commerce platform. However, the CEO is particularly concerned over the cloud computing security in case the customer database is breached.

ASSIGNMENTS

• Identify and describe the organizational authentication technology and network security issues.

• Make a list of access points internal and external (remote).

• Design a secure authentication technology and network security for GAI.

• Make assumptions for any unknown facts.

• List all known vulnerabilities you can identify in this environment and address them by proposing a new design. You may use any combination of technologies to harden authentication process and network security measures.

• Address the CEO's concern over the mobility security and design a secure mobile computing
(smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

Reference no: EM131316550

Questions Cloud

What is the after tax salvage value : Your firm needs a machine which costs $240,000, and requires $39,000 in maintenance for each year of its 7 year life. After 3 years, this machine will be replaced. If this machine can be sold for $24,000 at the end of year 7, what is the after tax sa..
What is the firms value of operations in millions : Zhdanov Inc. forecasts that its free cash flow in the coming year, i.e., at t = 1, will be -$10 million, but its FCF at t = 2 will be $20 million. After Year 2, FCF is expected to grow at a constant rate of 4% forever. If the weighted average cost of..
Describe what happens to the giant ant : He returns to Earth with the giant and puts it in a cage. By dimensional analysis, describe what happens to the giant ant.
Are the findings consistent with the previous studies : Students will be required to choose a recent research article in the area of Autism, Developmental Delays or Early Intervention and write up an article critique. The critique should include An annotated print out of the article,A summary of the li..
Describe the organizational authentication technology : Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GAI.
Determine the weight of the model : The size of the piece of chocolate in Fig. 1.8 is increased n times and its weight is proportional to the mass. If the density of the model is half that of the original piece, determine the weight of the model
Discuss the legal and ethical issues surrounding solyndra : Reflecting on the concepts you have studied in the course, discuss the legal and ethical issues surrounding Solyndra, the California based solar panel manufacturer. You will need to research the company through the University library
What part of trend lines value is due to assets : Trend Line inc. has been growing at a rate of 7% per year and is expected to continue to do so indefinitely. The next dividend is expected to be $7.00 per share. A. If the market expects a 12% rate of return on Rend Line, at what price must it be sel..
What will cash flows for this project be : KADS, Inc., has spent $370,000 on research to develop a new computer game. The firm is planning to spend $170,000 on a machine to produce the new game. Shipping and installation costs of the machine will be capitalized and depreciated; they total $47..

Reviews

Write a Review

Computer Networking Questions & Answers

  What is a mantrap? when should it be used?

What is a mantrap? When should it be used?

  Define a work breakdown structure and describe methodology

Define a work breakdown structure and describe the methodology behind constructing one

  1 findnbspphi2007 phi2008 and phib where b is the integer

1. findnbspphi2007 phi2008 and phib where b is the integer obtained from the last four digits of your student number.2.

  Report on any possible vulnerabilities in configuration

Based on this information, write a one-page report on any possible vulnerabilities in the current configuration of the company's Web server. Use the tools you have learned to search for possible vulnerabilities of 115 5.0. Your report should inclu..

  C++ code for sum

C++ code for sum of integers

  How will the servers be deployed

Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. How will the servers..

  Issues of organizational or project planned change

Issues of organizational or project "planned change." If you find a particularly relevant piece of literature, please share it with the class. The "Organization Development" literature is a good place to start your search.

  Identification of the one thing about prototyping

Find an article on prototyping and write a one-page (250-word) paper that includes the following: A description of the article and where it was found and Identification of the one thing about prototyping that surprised you the most

  Describe the two parts of an ip address

Describe the two parts of an IP address. Provide a step-by-step description of how a packet is routed, assuming that it must traverse at least one router.

  Explain the service in technical terms

Describe the service in technical terms. Make sure to include pricing information. Note: You may need to contact the provider to obtain this information

  Privacy and security of your computer

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Explain the impact of mobile devices on cybersecurity

The impact of the Internet on research methods of students and plagiarism in student papers. The impact of The No Child Left Behind (NCLB) Act on primary school education. The impact of mobile devices on cybersecurity.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd