Preview

Riordan Security Issues

Powerful Essays
Open Document
Open Document
1371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Security Issues
Running head: WEB SECUIRTY ISSUES AND CONCERNS

CMGT 440 - Introduction to Information Systems Security
University of Phoenix

Abstract

Introduction

Riordan manufacturing is a plastic injection molding company based in San Jose. The company also has various operations in 3 other Michigan cities as well as one overseas office in China. “Riordan has a 46 million annual earning” and their major customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers, bottlers, and appliance manufacturers”, (UOP Virtual Organization, 2006). This company was started by a chemistry professor in 1993 and has expanded over the last 7 years. In 2006 Riordan has projected to increase their sales from 46 million to 50 million dollars but in order for Riordan to keep pace with its competitors they will need to look at choosing a better method of reporting and collecting their sales and marketing information technology system. Each plant has an enterprise resource planning server. Its data store centralizes the management each plant’s resource applications (University of Phoenix, 2006). These applications hold vital information of customers, vendors and internal assets which must be secured. Various cryptographic and encryption standards are valuable tools in achieving this goal. Governmental regulatory compliance also asserts demands on data security. The following will evaluate each plant’s data security issues.

Riordan Manufacturing Locations
San Jose, California Plant During company research, it has become evident that the San Jose and Hangzhou network are strikingly similar; each houses approximately 35 - 40 users which connect to each plants two Cisco 5920 switches. “Cisco routers use the different communication protocols (Ethernet, TCP/IP, for instance) and have their own programming languages” (Cisco). The switches are not able to function to their fullest ability because of they are



References: Cisco. (2009). Cisco Networking. Retrieved October 5, 2009, from http://www.astahost.com/info.php/Cisco-Networking_t19362.html. Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440. Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from       http://www.faulkner.com.ezproxy.apollolibrary.com/products/faccts/00018555.htm University of Phoenix. (2006). Riordan Manufacturing. Virtual Organizations. Retrieved on September 27, 2009, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/RioMfgHome002.htm. Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440. Wikipedia. (2009). Enterprise Resource Planning. Wikipedia. Retrieved on October 4, 2009, from http://en.wikipedia.org/wiki/Enterprise_resource_planning.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Cis/207 Team Final

    • 4177 Words
    • 17 Pages

    Riordan Manufacturing is a worldwide fortune 1000 enterprise manufacturer of plastics with sole ownership by Riordan Manufacturing Industries. Custom plastic product parts akin to beverage containers and fan parts help generate company revenue of one billion. Riordan development and research carries out at the company’s R&D headquarters location in San Jose, California. Three additional Riordan production plants include locations in Pontiac, Michigan and Albany, Georgia with an international joint venture in Hang Zhou, China. Riordan employs a mere approximate of 550 people with company projections at $46 million a year. The U.S. Department of Defense rounds off Riordan’s primary customer basis in conjunction with aircraft and automotive manufacturers in addition to beverage makers.…

    • 4177 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The following information was obtained from Riordan Manufacturing’s Internet and Intranet sites (https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business /Riordan/RioMfgHome002.htm): Riordan Industries, a fortune 1000 enterprise earning $1 billion dollars in revenues per year, wholly owns Riordan Manufacturing. An industry leader in the field of plastic injection molding, Riordan Manufacturing employs 550 workers and has projected earnings of $460 million. Riordan produces various products including beverage containers, plastic fans, and custom plastic parts. The company’s main clientele includes automobile parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers, bottlers, and appliance manufacturers.…

    • 840 Words
    • 4 Pages
    Better Essays
  • Better Essays

    "Riordan Manufacturing is a global plastics manufacturer employing 550 people with projected annual earnings of $46 million. The company is wholly owned by Riordan Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion" (Apollo Group Inc., 2004).…

    • 1062 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Riordan currently operates four manufacturing plants; three located in the United States (San Jose, California; Pontiac, Michigan; and Albany, Georgia) and one overseas (Hang Zhou, China). Each plant contains the same basic departments, to include Sales and Marketing, Operations, Finance and Accounting, Information Technology (IT), Legal, and Human Resources. There are a few things we can do to make a good network even better, all four plants Sales and Marketing, Operations, Finance and Accounting, and Human Resources department netwoeks are all up to date with the latest equipment and software.…

    • 1877 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    References: Information security: why the future belongs to the quants, Security & Privacy Magazine, IEEE, July-Aug. 2003, Volume 1, Issue 4, Page 24 –32…

    • 30867 Words
    • 124 Pages
    Satisfactory Essays