List at least three vulnerabilities described

Assignment Help Operation Management
Reference no: EM132182814

Dalton, Walton, & Carlton, Inc. is an architecture firm with approximately 250 employees in four cities in a regional area. The main office is in Kansas City, Mo, which houses 100 of the employees. The main office is located in a suburb neighborhood where physical security is not considered a concern. Their IT infrastructure is as follows: o They primarily use Microsoft servers and PCs with a number of Mac computers used to perform design work. They use Active Directory, have a Web Server for their Internet web site, four servers used as file shares (one in each office), four servers housing their architecture applications, a training server, five MS SQL database servers, and two Microsoft Exchange servers for email. o There are 20 Windows 2008 servers in the main office, twelve of which are virtualized on three physical servers. o System updates and patches are run from the main office. Most systems get Microsoft updates once a month, but some are missed. Also, most third party products (e.g., Adobe PDF & Flash) are not kept up to date. o Each satellite office has 3-4 servers for storing files and running local applications. o Each office has its own, decentralized wireless network connected to the production network. o Each employee has a desktop or laptop PC running Windows 7. HR personnel have laptops for conducting interviews. o They outsource their email spam filter and all HR applications to two separate third party companies. o The network sits behind a gateway router and firewall. Antivirus is in use, but is not automatically updated across the company. Employees often work remotely and only use their login and password to gain access to the corporate systems. o There is a Director of IT who has a full time staff of 5 employees, one of which does security duties part time. There are a few known issues with their IT infrastructure and organization: o Recently, a number of PCs and office equipment has been stolen out of the office. o It’s at the data owner’s discretion as to whether or not to secure their data files or folders. Many do not secure their files, while some lock them so only they have access. There have been rumors that customer data and intellectual property have been lost. o Two employees recently left your company and went to your biggest competitor, where they just landed a contract with your largest account. o Vendors are allowed access to the site and computers without authorization or supervision. o Onsite staff at each location provides IT support part time along with their other responsibilities. Password resets are done by giving out a generic password — Chiefs2011. You are an independent auditor brought in by Dalton, Walton, & Carlton’s management. They’ve tasked you with conducting an audit of their entire IT infrastructure, organization, and processed.

Review the case study and answer the following questions as if you were an IT Auditor on the case:

How would you gather and assess vulnerabilities in this case?

List at least three vulnerabilities described in the case.

Include the severity and likelihood of compromise for each vulnerability identified.

List known or assumed safeguards in place that reduce the vulnerability's impact or likelihood.

Include a list of any assumptions you are making.

Reference no: EM132182814

Questions Cloud

Discuss the functional areas of management : Using an example of a company of your choice, discuss the functional areas of management
Responsibility to help bangladesh raise working standards : What else could Peter do to remedy the situation? Does LWI have an ethical (or legal) responsibility to help Bangladesh raise working standards?
Monetary value of jobs in the health care industry : Briefly identify and discuss the various methods of determining the monetary value of jobs in the health care industry.
What is the average inventory amount that mungo can expect : The cost to place an order from the supplier is $30. What is the average inventory amount that Mungo can expect to hold at any one time?
List at least three vulnerabilities described : How would you gather and assess vulnerabilities in this case? List at least three vulnerabilities described in the case.
Difference between finite and infinite queuing population : Describe the difference between a finite and an infinite queuing population.
Whales hospital is in community that is changing : Whales Hospital is in a community that is changing. It had been an industrial city, but many of the industries have closed.
Probability of zero ferries in the ship yard : Negative exponential distribution, mean = 3.2 and STD= 0.6 First come first serve rule. Find the following: Probability of 0 ferries in the ship yard.
Take to improve your department performance : Imagine you run the HR department in that same manufacturing company. What is one step you could take to improve your department’s performance?

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd