Preview

Case Study 1: Florida Department of Management Services

Satisfactory Essays
Open Document
Open Document
676 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study 1: Florida Department of Management Services
Case Study 1: Florida Department of Management Services

Name: Fabio M. Cesar Professor: Darcel Ford Course: Business Data Communications (CIS505) Date: 05/05/2013

Security Mechanisms: The network was up and running and it was secure and reliable, but the speed was slow and the interface clumsy. The applications around the database were old, out of date and were only in batch-mode with fixed-transaction access. The system were complex and when user tried to get something out of the ordinary, they had to wait for days or weeks for the mainframe programmers developing what was needed. The system is equipped with a firewall to prevent unauthorized access, by analyzing and controlling the incoming and outgoing data network traffic, it is a software or hardware-based network security but it “blocks” all network traffic, slowing and causing inconvenience. DMV is intended to start doing e-commerce and this will take an extra care involving security because this applications takes a lot of work, and by adding more security features on the fly would prove problematic once it takes an extended amount of time to close exploits, and it involves more than one department. The use of SSL certificates, HTTP and HTTPS must be utilized to protect and authenticate users and employees from packet sniffing hostiles and hacker’s attack. Transition process: The SNA network controller processors were connected to T-1 and T-3 lines in 10 cities. The controller for the communications was within the token ring local area network, computer are connected in a ring or star topology, to prevent collision from computers when they are trying to send messages at the same time. The token rings could also support the terminals of personal computers and other computer equipment. The controllers were designed to handle SNA traffic out of and into the mainframe computers. In order to transform the infrastructure of



References: http://www.dms.myflorida.com/ http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx Business Data Communication – Custom Edition; pages: 147 - 151. http://searchnetworking.techtarget.com/definition/Token-Ring

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BAS Florida Case Study

    • 460 Words
    • 2 Pages

    Although every state has the potential to benefit from BAS, Florida has the biggest of opportunity of all. There are many reasons that makes this statement true, but the biggest one is because there is a big number of elder people living in Florida. The state of Florida is rich in having a lot of elders as described in the Florida’s Demographics, that means that the numbers are there, the only part needed is having investors. Most of the elder prefer staying at home and keep living in the house that they were born because they probably many experiences living there. BAS must be implemented very simplistic for the elderly, the reason for this is because they will not like to use or learn anything complex and thus it will be better if most of…

    • 460 Words
    • 2 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    The University of South Florida, also known as USF, is a member institution of the State University System of Florida and a public research university located in Tampa, Florida, USA. USF is the fifth largest in the state of Florida, with a total enrollment of 40,111 as of 2013. Some of the original proposed names included "Citrus State University," "Sunshine State University," "The University of the Western Hemisphere," and "The University of Florida at Temple Terrace". It was built on the site of Henderson Air Field, a World War II airstrip. Although located in west-central Florida, at the time of its establishment USF was the southernmost public university in the State of Florida,…

    • 2677 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    One of the biggest hesitations would have to be cost to build an implement such a system. The technique depends on an organization having "clean" data to analyze, which requires data being scrubbed and moved to data warehouses. Many payers lack the money and manpower to build and maintain these warehouses. (Kongstvedt, P., Capagemini). In addition, internal politics and the numerous constituencies within a managed care organization can make it difficult to focus data mining efforts, says Scott Kozicki.…

    • 447 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Any firewall implementation will not protect the network if it is not configured properly. Thus, a strategy, suggested by Troester (2004) is to use the “principle of least privilege”, meaning, denying all traffic.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    As I am reading the case, Personalize Your Management Development, I really touched by the author and I really learned a lot from the case. As everyone knows, different people have their different characteristics so they will have their own principle and procedure to deal things. Therefore, the different characteristics made the different working styles as manager. As a company, you will have a lot of different managers so personalize the specific management development projects are really essential to the company. After I read the case, I have a general sense about the different kinds of managers in company and I can imagine what they will do in management. In the case, the author introduced 4 different kinds of managers, which are reluctant, arrogant, unknown and workaholics. The author analyzed those 4 different people and gave us a brief introduction about their characteristics. Besides, the author also taught us how to make a development project to help each type of those managers. In my opinion, I learned a lot from the author since I really know how to deal with those people.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Hence SNA aimed to reduce the main non-computer costs and other difficulties in operating large networks using earlier communications protocols. The difficulties…

    • 528 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    can selling be globalized

    • 6220 Words
    • 25 Pages

    This document is authorized for use only in T-GEMBA/GMAN - 02212013 by Andrew Wilson and Saroja…

    • 6220 Words
    • 25 Pages
    Satisfactory Essays
  • Better Essays

    Ring- Like the bus, a Token Ring network uses a single cable. Unlike the bus, the cable 's ends are looped to form a complete logical circle or ring. Unlike the bus, when a workstation needs to transmit data over the network, it must wait until the token is passed to it by its neighboring station. It takes control of the station and then places a data packet on the network. Only after the data packet has made a full circuit of the ring, returning to its originator, does the station release the token for the next workstation. Token Ring can also be expanded by linking multiple rings together, just like Ethernet (TechTarget 2006).…

    • 1048 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “Wolf Peak International: Failure and Success in Application Software for the Small Business to Small to Medium Enterprise”…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. The remainder of this article discusses local area network technologies and classifies them according to the following characteristics: the physical media used to transmit signals, the communications protocols used to organize network traffic, along with the network's size, its topology and its organizational intent.…

    • 5143 Words
    • 21 Pages
    Powerful Essays