Preview

Richman Investments: A Case Study

Good Essays
Open Document
Open Document
746 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Richman Investments: A Case Study
The Multi-Layered Security Plan for Richman Investments are as follows.
1. All laptops and desktops should be running Windows 7. Windows XP will not be supported after May 2014. Also, they should be running some type of Anti-Virus software and laptops should be encrypted in case of the laptop being stolen. (Dell, 2011)
2. Patching the servers, desktops and laptops often. Most software applications have updates to their software for security updates. Microsoft sends out patches every second Tuesday of the month and should be tested on all platforms before sending out to the end users. Antivirus, local firewall and similar applications work to bar exploits and infections. Biometric and two-factor access security help prevent exposure of data. And file-based encryption keeps key information safe, even if it leaves the enterprise net and gets copied to portable media. (Dell, 2011)
3. Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.
…show more content…
Virtualize the browser so that the end users surf from the inside. Letting users manage their own browser can lead to trouble because they can download toolbars, plugins, etc. Which can have malware attached or leave them open to an attack. and to turning on features like password caching, forms-filling and history that can make a stolen PC a gateway to enterprise applications, mail and data. The answer to this is; now supported by some security-oriented edge network devices -- can be to supply users with a virtualized instance of a filtered standard browser. This strategy offers users a high level of assurance against commonplace attacks, and prevents even successful attacks from executing code, rooting the OS, or reaching and compromising the local file system or other vulnerable targets. (Dell,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Richman Investments is the name for its installation of the Richman Investments software from Jive Software creating a virtual (type of company) community. It is a Web-based virtual community where members collaborate on documents, share insight and best practices and exchange ideas.…

    • 896 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Adams espouses a “market first” analysis of opportunity by looking for discontinuities. Is this substantive or window-dressing? Do the four types of discontinuities represent applicable guidelines? Are they comprehensive, or are there other discontinuity templates that a venture investor would find useful?…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    projects in the area are presented. Finally, we outline the main challenges to be dealt with…

    • 8698 Words
    • 46 Pages
    Powerful Essays
  • Good Essays

    Google Chrome

    • 559 Words
    • 3 Pages

    Under the hood, we were able to build the foundation of a browser that runs today's complex web applications much better. By keeping each tab in an isolated "sandbox", we were able to prevent one tab from crashing another and provide improved protection from rogue sites. We…

    • 559 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    global security policy

    • 411 Words
    • 1 Page

    One of the issues that companies face today is making sure that the data on the computers are secured. This come to be more and more challenging that companies face when having offices in multiple locations. One of the greatest challenges to keep data secured is to utter size the information you store and carry. Most of these companies carry the history of the company, contacts, and the current documents of the company on their laptops or on their mobile devices, but little do they know that information that is kept on laptops and mobile devices it can be stolen or copied. Maintaining a secured environment can be hard work. One would have to change passwords, habits, and the software that is being used on the main computer or device. The only scenario that the company would run into is constantly thinking about if the company is leaking confidential information or using unsafe practices. On the other hand one might require you to continue unsafe digital security practices even after one have been explained the harmful things it can cause. Let’s just say one of your work colleagues might want you to continue to open email attachments from them, knowing that attackers can get into it and send malware. One of the things that you could do is put all valuable data and communication on a more secured computer, but only use the machine when you need to. Doing that it will limit the threats or the malware that may cause your or ones computer to shut down.…

    • 411 Words
    • 1 Page
    Satisfactory Essays

Related Topics