Project Part 1

Better Essays
Detailed Proposal
NT2580 – Introduction to Information Security
15 March 2014

Detailed Proposal

Detailed Proposal
This Proposal is to assess the situation at the Richman Investments Company. The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office. There are a lot of systems on this network with a lot of different software and operating systems. This is alone is a high vulnerability because it makes it harder to keep each system up to date as opposed to having one main operating system and being able to push down updates and patches to assure that the network is safe. The Seven file and print servers are ok but like I stated before, now you have to make sure whatever that is running on the servers have to be compatible with each operating systems. If not you can designate the file and print server to only be in charge of all the computers with a certain operating system on it. That will make it more difficult still and require more man power than what you would want on your network. I didn’t see mentions of firewalls, they will be needed since you have most of the applications are web-based. We need to ensure that our employees are the only ones that have access to the information in our network. There should be firewalls to detect outside intruders and a



References: Firewall management. (2014). In Dell Secure Works. Retrieved March 15, 2014, from http://www.secureworks.com/it_security_services/firewall/ Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379 Guil, F. (2003, April). Computer rooms-meet the physical security measures . In GIAC.com. Retrieved March 15, 2014, from http://www.giac.org/paper/gsec/2892/computer-rooms-meet-physical-security-measures/104866 Bradley, T. (2014). Password policy: password must meet complexity requirements. In about.com. Retrieved March 15, 2014, from http://netsecurity.about.com/od/secureyourwindowspc/qt/complexpw.htm

You May Also Find These Documents Helpful

  • Better Essays

    Project part 1

    • 1134 Words
    • 3 Pages

    The way we perceive ourselves in relation to the rest of the world plays an important role in our choices, behaviors and beliefs. Conversely, the opinions of others also impact our behavior and the way we view ourselves. Social psychologists investigate how people view themselves and others, how they interact with and influence others, and how people act when part of a group. Given the amount of time spent thinking about and interacting with other people, it follows that much of our lives are spent with the subject matter of social psychology.…

    • 1134 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Project part 6

    • 406 Words
    • 2 Pages

    The senior management has been advised by the legal department that the organization will need to become PCI DSS compliant before using online applications that accept credit cards and customer personal information. The management isn’t familiar with PCI DSS compliance; therefore, the management asked you to prepare a recommendation explaining PCI DSS compliance, how the organization can move through the compliance process, and the consequences of noncompliance.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 2

    • 2555 Words
    • 15 Pages

    P-1: Clerk enters order: Orders are entered by clerk while the customer is on the phone. This means that the clerk is able to acknowledge the customer’s order immediately.…

    • 2555 Words
    • 15 Pages
    Satisfactory Essays
  • Good Essays

    Project #1

    • 1243 Words
    • 5 Pages

    The work that I chose was an excerpt from Dr. Maya Angelou book, “Wouldn’t Take Nothing For My Journey Now” and other works from the author Maya Angelou simply because in almost all of her works whether poems, books and etcetera, she writes the same way.. In her except she talks about being a young mother of a Kindergartener. She talks also of how she worked hard to make a living for her and her child by working two jobs. The talk of how she survived and her doing what she has to is called survival of the fittest, in nature and in culture only the strong survive. Also she talks of how she is comfortable with herself and the skin she is in. Much of her work is of special interest to women, expressing Maya Angelou’s views on subjects ranging from fashion and entertainment to sensuality and pregnancy, racism, and death. “Getups,” demonstrating not only Angelou’s love of richly colorful clothing but also a painful event from her years as a single mother of a small boy; and “Extending Boundaries,” recounting an embarrassing experience from Angelou’s early days as a writer in New York City. Angelou uses each incident to draw some point, though generally she offers her moral or advice with a light hand, often with humor, despite the seriousness of some of her subject matter. Her recurrent themes include self-knowledge and the necessity of honesty, prudence, and respect in the treatment of oneself and others. A compilation of brief scenes, thoughts and situations. The collection is rather wide ranging from history to social graces to autobiography. The past and the present collide as the stories are short and end quickly, the transitions are abrupt. Maya Angelou's tendency to characterize the world as degenerating. Passages like, "we have come to a place, a time, when virtue is no longer considered a virtue. The mention of virtue is ridiculed, and even the word itself has fallen out of favor," put me off. It belies a tendency to…

    • 1243 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Project Week 6

    • 1703 Words
    • 7 Pages

    1. A stock just paid a dividend of D0 = $1.50. The required rate of return is rs = 10.1%, and the constant growth rate is g = 4.0%. What is the current stock price?…

    • 1703 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project 1

    • 373 Words
    • 1 Page

    Write a personal reflection that explains how you would go about managing your work priorities and professional development.…

    • 373 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Project1 1

    • 1151 Words
    • 4 Pages

    1: A management meeting for 12 section managers is due to be held on Tuesday, 24 November commencing at 9.30am and finishing at 4.00pm. The CEO of the company will attend.…

    • 1151 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cis333 Assignment 1

    • 987 Words
    • 4 Pages

    With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Widget Corp., a Miami-based, 200 employee, organization has selected Miami IT Consultants to assess the organization’s information technology and informational system needs. Widget Corp. has experienced an increase in sales of 25% over the last year and has planned to update their IT needs to meet demand. The primary goal of the organization is to increase productivity by automating business processes in both their Accounting and Human Resources departments. In addition, Widget Corp. has expressed interest in optimizing internet connectivity and harness the power of the World Wide Web to expand business operations. The following report will outline Miami It Consultant’s analysis of information technology, information system and internet connectivity analysis. The report will outline recommendations in hardware, including input, output and storage devices; software recommendations, including operating system and software updates. Additional recommendations based on assessed organizational needs are reported as such. In addition, the report will include a clear cost analysis for each component and recommendation made herein.…

    • 1743 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage.…

    • 2473 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Project Proposal 2

    • 2206 Words
    • 12 Pages

    The purpose of this proposal is to outline a strategy for targeting the identified segment group of 18 - 24 year olds…

    • 2206 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Project 3 Final

    • 1190 Words
    • 4 Pages

    I appreciate your cooperation boys, I know you will make the right decision to buy into this process. Becoming champions starts now, doing all the little things right. If you have any questions or want to talk about something fell free to give me a call at 888-555-7777, or email me at dyoshioka@whs.edu.…

    • 1190 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Disaster Plan

    • 1162 Words
    • 3 Pages

    The way in which XYZ Computers has their IST Department set up currently is susceptible to many threats. The lack of a firewall is an open invitation for data to be stolen by prying eyes, and the vulnerability of placing the payroll database is in the same server as the email service. The geographic and weather conditions of the location of the company have a high risk of flooding, yet the Servers were installed on the first floor. Lastly, the backup method in place is sort of outdated and there is no mention on how often the backup takes place; additionally, the backup tapes themselves could be damaged, lost, or stolen. These recommendations are an attempt to improve XYZ Computer’s network data security, prevention of data loss, protection against network failure, and contingencies for natural disasters.…

    • 1162 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Project Part 2

    • 626 Words
    • 3 Pages

    I am a Filipino male earning a living as a software engineer outside of Dallas, Texas. I earned my degree in the Philippines before moving to the United States on a H1-B visa to work for Texas Instruments. (H-1B Work Visa) Texas Instruments is an American company that designs and sells a variety of computer parts, and calculators to software. The work hours that are required are typical of most American companies with a lot of travel involved plus many late hours to meet project deadlines.…

    • 626 Words
    • 3 Pages
    Good Essays