Cmgt 430 Week 2

Only available on StudyMode
  • Download(s) : 192
  • Published : July 9, 2012
Open Document
Text Preview
Huffman Trucking: Benefits Election System
CMGT442: Information Systems Risk Management
February 14, 2011
TABLE OF CONTENTS

INTRODUCTION..................................................................................................................... 3

SECURITY REQUIREMENTS............................................................................................... 3
Firewall Protection................................................................................................................ 4
Password Protection.............................................................................................................. 4
Password Renewal................................................................................................................. 4

POTENTIAL RISKS................................................................................................................. 5
Database Hacking.................................................................................................................. 5
Database Corruption............................................................................................................. 6
Espionage............................................................................................................................... 6

CONCLUSION.......................................................................................................................... 6

APPENDIXES........................................................................................................................... 8
Appendix A: Firewall Concept and Responsibility (Figure 1).............................................. 8
Appendix B: SWOT Analysis Example (Figure 2)................................................................. 9

REFERENCES.......................................................................................................................... 10 Huffman Trucking: Benefits Election System

    Many organizational benefits packages include assistance with medical, dental, and vision plans. Some companies agree to pay a set percentage while the employee covering the rest, whereas other companies cover the entire cost. Typically, information on each employee and their respective benefits package are stored and managed using some type of database system, which can be either a hardcopy paper file version or an electronic one. Whatever method is used, security measures have to be put in place to protect each employee from the loss or theft of their information, as well as preserve company assets from possible litigation. Huffman Trucking (Huffman) has implemented such a system called the Benefits Election System, which assists management in tracking and reporting employee benefits (University of Phoenix, 2005). The purpose of this paper is to discuss some of the potential security requirements of Huffman’s system, as well as the some of the risks associated with the implementation of this type of system. Security Requirements

     Security breaches of any kind are damaging to any individual or company, especially if the breach results in the loss or destruction of critical information. For the purpose of this paper, critical information represents names, social security numbers, personal records, or any other type of information that can be used to deceit an individual or a business. The consequences of such a breach frequently result in the same outcome - the loss of financial resources or the harm to one’s possessions. In an effort to reduce or eliminate these consequences altogether, several requirements must be established. These requirements, at a minimum, should include: firewall protection, password protection, and password renewal. Firewall Protection

A firewall in computer terminology works by “blocking certain types of traffic between a source and a destination”...
tracking img