Describe information technology security issues

Assignment Help Basic Computer Science
Reference no: EM13946706

Scenario:

You are an independent consultant who specializes in Information Technology security issues. You have been retained by the Designer Distributions Company, a mid-sized and growing consumer goods distribution company, for an assignment to assess the state of their computing environment security situation. The company's newly hired VP of IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have a comprehensive security strategy. In fact, she suspects lack of even basic security knowledge in both the IT staff and the user community.

The company has a headquarters office building, which includes the principal data center, and a separate warehouse linked to the office by an private data network. The warehouse has a small computing facility of its own for order shipment data entry and tracking. This computer is linked to the headquarters order entry systems through the network. Additionally, there are Internet-based data links to several key suppliers used to share reorder, production and shipping schedules and status information. When potential new suppliers compete for contracts with Designer Distributions, their proposals are received and negotiated via Email.

You have been interviewing executives and staff at the company and at key suppliers and are beginning to evaluate what you have learned in preparation for preparing your report to the VP of IT.

Details: One of the recommendations you are making to Designer Distributions corporation is to create a full-time position of security administrator. Until now, the job has been done on a part-time basis in the systems administration department, which was a viable approach when the company did not have inter-facility and Internet networking connections. Now you believe that security planning, implementation, and administration tasks required to support the growing network justify a stand-alone position. In support of this recommendation, you are preparing a presentation describing these tasks, their purpose, and their criticality.

Write a 8-10 slide presentation outlining the security concerns and resulting administrative functions required for a network that contains the following elements

Access to business applications such as Designer Distributions' order processing/shipment scheduling system from a remote company location (e.g. the warehouse)

A corporate email system used internally by employees and externally to the Internet for correspondence and supplier bid proposals

A company website on the Internet as well as employee access to the Internet File transfer capabilities allowing sales staff access to and transmission of data files containing supplier and customer specific information (using remote dial-up phone connections)

A wireless network within the headquarters building that allows employees to move their laptop computers from desks to conference rooms while maintaining connectivity to the computer applications and email system

Your presentation should describe the implementation and ongoing maintenance of security system features that protect these networking elements from the risks that you identify.

Reference no: EM13946706

Questions Cloud

Construct a binary counter : Construct a binary counter that will convert a 64-kHz pulse signal into a 2-kHz square wave.
Tools and techniques the company use : Executive summary that discusses the "hows" of innovation. Specifically, focus on the details of how NIKE implements innovation and innovative processes. To do so, answer the following in the summary: - How is innovation at this company unique?
Express strategic purpose of integrated marketing strategy : The purpose of the Case Analysis is for students to demonstrate their understanding of the strategic purpose of an integrated marketing strategy.
Uniform surface temperatures for the electrolytic : In fuel cell stacks, it is desirable to operate under conditions that promote uniform surface temperatures for the electrolytic membranes. This is especially true in high- temperature fuel cells where the membrane is con- structed of a brittle cer..
Describe information technology security issues : Your presentation should describe the implementation and ongoing maintenance of security system features that protect these networking elements from the risks that you identify.
Draw the block diagram of frequency modulation : Draw the block diagram of frequency modulation and discus each parts of frequency modulation
Establish a business to manufacture and sell : Assignment relates to your plans to establish a business to manufacture and sell, for profit, the electronic device that you are prototyping.
Variation of the local heat transfer coefficient : Plot the variation of the local heat transfer coefficient, hx(x), with distance along the plate for three flow conditions corresponding to transition Reynolds numbers of (i) 5 X 105, (ii) 3 X 105, and (iii) 0 (the flow is fully turbulent).
What is the probability of getting an a on the exam : The weight of a one cubic yard bag of landscape mulch is normally distributed with a mean of 40 pounds and a standard deviation of 2 pounds. What is the probability that a bag will weigh less than 40 pounds?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Corporate embezzlement

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Offi..

  First two training iterations of backpropagation algorithm

Consider a two-layer feedforward ANN with two inputs a and b, one hidden unit c, and one output unit d. This network has five weights (w,, web, wd, wdc, wdO), where w,o represents threshold weight for unit x

  Security being a top concern for any organisation

Task Task: Security being a top concern for any organisation, choosing the correct security solutions is of utmost importance. Consider an area of information technology (IT) security, such as, network security, e-mail security, database security ..

  Businesses rely heavily on knowledge

Businesses rely heavily on knowledge about Human Computer Interaction

  Discuss how the use of computers and technology

Discuss how the use of computers and technology have changed the way managers perform these tasks.Is it possible for an organization to rely too heavily on computers and not enough on judgment and intuition of their managers? Explain your answer.

  You are to design and develop three html5 pages

You are to design and develop three HTML5 pages themed on Manchester. The pages should be optimised for delivery on a tablet, and should contain the following:

  Design a shopping page with 5 products

Design a shopping page with 5 products on it. Each product has one image, product title, product description, and price.  You may add necessary buttons, page heading, and background.A. When the page first loaded, display exactly 5 product items with ..

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  What is the quadratic formula

What is the quadratic formula? What is it used for? Provide a useful example, not found in the text.Please note that the quadratic formula is different from a quadratic equation.Post a 100-200 word response

  A selection with a single action

Question 1.1. (TCO 4) Which pseudocode keyword is not included in a selection with a single action? (Points : 2)IfThenElseEnd If

  Imagine and describe three general scenarios

Imagine and describe three general scenarios where network problems

  Program inputs the first name

You are on the Welcoming Committee at "Geeks -R- Us", you are tasked with gathering basic information on the new potential employees. Write a program that inputs the first name, middle initial (without the period), last name, age, salary and sex o..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd