Skip to content

IC whats NEW.com

Thesis Writing Service & Free Essays Online

  • Home
  • Essay Papers
IC whats NEW.com

The Plantain Building Company Network Systems Information Technology Essay

The building house named as Plantain Building Company is a national degree house edifice company which buys land, concept houses and sell to the general populace sector. Harmonizing to the scenario the company is divided into several regional offices but Cardiff Regional Office is the topic of this instance survey.

The chief focal point of this instance survey is the execution of the unfailing security to the system and web so that all the confidential informations should be in their proper sphere. Soon all the systems can go victims of person ‘s confederacy. As there are of import and classified informations on the systems, there should be proper security of that.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

All the users are utilizing same login ID and e-mail reference that is a awful mousetrap itself. Merely the director Theo Barratt has different electronic mail ID. All calculating equipment is bought from the local computing machine company and the contract of care is besides with them.

Presently there is no security policy exists in the office so no 1 is responsible if a bad luck happens. The chief adult male assets of the organisation are the 5 undertaking directors who are responsible for different geographical locations. All of them have the entree of the programs and specifications of the House Types. These house types are specific to this peculiar edifice company and each house type besides has a elaborate dislocation of the stuffs required to construct each house.

The chief database of house type is held in caput Office but the manner it is transferred to the regional offices is via CD-ROM and installed into the local system by the decision maker. One of the funny observations is the land director keeping the bank of available land on the computing machine system without cognizing that the system can crash anytime and he can lose the valuable information in seconds. Besides that there is no security within the bing systems e.g kind of USB read merely else informations copying rights, it would be harmful for the interest of the company.

In the given scenario by making research on the web security, information security and information protection rights would be defined under the certified regulations. The major intent of doing the security policy is defined below:

Goals:

To distribute consciousness in PLANTAIN BUILDING COMPANY users and sellers about their duty for protection all informations assets.

To guarantee the security, unity and handiness of all PLANTAIN BUILDING COMPANY and client informations.

To set up the PLANTAIN BUILDING COMPANY baseline informations security stance and categorization strategy.

Policy Awareness:

A transcript of this Policy will be made available to all staff presently employed, or when they join the Plantain Building Company. Individual subdivisions of the Policy will be updated as required and will be available on the Plantain Building Company Intranet site. All members of the Plantain Building Company are expected to be familiar with, and to follow with, the Information Security Policy at all times. The individual who caught go againsting the policy will prosecute harmonizing to jurisprudence.

Current Computer Systems Operationss:

As in the scenario there are 27 desktop Personal computers and pressmans that are connected to a cardinal waiter. Each system is by and large used by individual user and the information on the web are easy accessed by them. In the current system every user has the same login and email IDs but merely the Theo Barratt ( Manager ) has different login and electronic mail ID. There are figure of computing machines that are excessively old but still administrative undertakings are done by them.

The information storing device is none other than the bing computing machine systems alternatively of independent waiter where everyone can entree the informations but by agencies of login on to server merely. There are several critical bundles that are specifically used for ciphering stuff demands, CAD drawings and house types that can be easy accessed by each member of the company. The standard for backup informations is agencies of hive awaying on discs which kept in the office supplies store room.

As we have already sorted out the information from the scenario that there is no web security and informations holding a million worth can be accessed and intrude by any agencies. Theo Barratt has his ain user login as he uses the computing machine system to entree the fiscal information and statements which are held in Head Office. His system is networked with Head Office. There are figure of fiscal records which are compiled and submitted via computing machine web.

There are specific house types concerns with this house constructing company and the undertaking directors are responsible to carry through this undertaking. The Undertaking Manager has entree to the programs and edifice specifications that the company builds. There are comprehensive conventional and structural information for the edifice of house types and right sum of each edifice stuff. The chief House Type information base is held in caput office but a transcript is held on the computing machine system locally and can be accessed by the Undertaking Managers.

The process for directing updated house type informations from Head Office to each regional office is on CD-ROMs and the privileges to copy that information to the local computing machine systems possessed by decision maker. There are assorted informations security prostration in the system, anyone can plagiarise the informations and can sold outside the house. There is no limitation and non even a information waiter through which the information can merely be accessed by authorised users. Even the large issue is there is no log care so that information traffic can be figure out by any agencies.

Security Vulnerabilities:

Blyth and Kovacich ( 2nd edition, Information Assurance, 2006 ) suggested that there are assortment of security exposures in the computing machine system in IT universe. But the particulars which appropriately implement in the certain environment are given below.

Types of Vulnerabilities:

Physical exposure

Natural Vulnerability

Hardware / Software Vulnerability

Media Vulnerability

Communication Vulnerability

Human Vulnerability

Vulnerability Management:

Harmonizing to Nicolett & A ; Williams ( 2005 ) , Vulnerability direction is a procedure that can be implemented to do IT environments more secure and to better an organisation ‘s regulative observation position. The certain stairss of Vulnerability direction procedure are given below:

Policy to do certain specifying the preferable province for device constellations, user individuality and resource entree.

Baseline your environment to place exposures and policy conformity.

Prioritize extenuation activities based on external menace information, internal security position and plus categorization.

Shield the corporate environment, prior to extinguishing the exposure, by utilizing desktop and web security tools.

Mitigate the exposure and extinguish the root causes.

Maintain and continually supervise the environment for divergences from policy and to place new exposures.

The engineering provided by exposure direction sellers can be used to automatize assorted facets of the exposure direction procedure. The three chief engineering classs are:

Vulnerability Assessment

IT Security Risk Management

Security Information & A ; Event Management ( SIEM )

Vulnerability Assessment

Vulnerability appraisal ( VA ) provides basic and discovery maps in support of exposure direction. Vulnerability Assessment merchandises scan an end point and effort to find vulnerable conditions based on a database of known exposures. The importance of VA merchandises can besides place assorted facets of the end point, including unfastened ports, running services and protocols, applications, and runing system. This utile information provides security groups with the informations they need to mensurate security steps. When your security group paperss the failing of the web and host substructure, you can get down to do determinations on how to extinguish the root cause of the bulk of feats, cut down the possible onslaught vectors and restrict the impact of a security incident.

“ eEye Digital Security, Internet Security Systems, McAfee, nCircle, Qualys, Sourcefire, StillSecure and Tenable Network offer distant scrutinizing capablenesss that do non necessitate agents or credential passing. The ability to scrutinize without agents or credential passing is a cardinal demand for many security organisations ” . Taken from Nicolett & A ; Williams ( 2005 ) ,

IT Security Risk Management

The chief intent of IT security hazard direction is to calculate out IT security hazard and prioritise renewing actions. These merchandises combine plus categorization informations, rooted security policy maps, current external menace informations and the consequences of third-party VA scans to back up cumulative hazard analysis and exposure extenuation. Security hazard direction tools provide changing grades of entrenched support for plus classification and security constellation policy direction. The analysis produced by these tools efforts to quantify the IT security concern hazard for resource groups that are aligned to concern maps. Risk direction map besides provides work flow for extenuation, every bit good as proof that exposure has been eliminated.

These tools have the ability and can supply plus salvaging methods, categorize assets, bring forth risk-rating studies, execute alleviate work flow and proctor position. Most merchandises in this class integrate VA information from third-party merchandises, and straight supply changing degrees of support for security constellation policy auditing.

SIEM ( Security Information & A ; Event Management )

SIEM engineering provides real-time event direction and historical analysis of security informations from a broad set of heterogenous beginnings. This engineering is used to filtrate event information into informations that can be acted on for the intents of incident response and forensic analysis. The demand to back up regulative observation has become the new market driver for the SIEM engineering suppliers.

General Description:

Attacks on multiple foreparts:

Your informations is being attacked on multiple foreparts. Hardware or package defects can pervert files and put the existent spots and bytes at hazard. Viruss and worms can assail files and waiter procedures. Datas can even be stolen by stealers ( employees ) with a USB thrust and physical entree.

Perimeter security steps provide the first bed of protection. But determined aggressors have evolved spyware, Trojans, cardinal lumbermans and other methods to present malicious codification to your web inside. Authorized users can accidentally vector malicious onslaughts through Internet downloads that bypass perimeter security.

“ A recent onslaught on the London offices of the Sumitomo Mitsui bank used cardinal lumbermans to steal entree codifications as portion of an effort to steal more than ?220 M ( $ 423 M ) . This sort of menace can besides set corporate informations at risk-including fiscal records-that can non merely damage corporate credibleness, but may besides set your concern at hazard of prosecution ”

Hazard and Information Security:

Hazard:

Hazard is the likeliness that something bad will go on that can do injury to an information plus. In order to understand the hazard and its appraisal I think that the employees who are concerned with the security information system in an organisation must be familiar with the types of interlopers and computing machine offenses.

Types of Intruders:

Insiders: These people work with the organisation and hold entree to system and resources.

Novitiate: These are novices ; they have less cognition and less experience with computing machines. They are non really unsafe because they seldom commit offenses.

Apprenticeship: They have more cognition and they know how to acquire in and out of the system.

The professionals: They are good trained professionals. They are really good at inflowing and acquiring out of the system without anyone ‘s cognition. The ground is that they have entree to sensitive informations in an organisation.

Types of Computer Crimes

Escape: It is a procedure of picking up signals from web overseas telegram. In this instance the stealer must be physically present to enter the leaked informations. To get the better of this ISO must maintain record of the computing machine usage and old informations in order to follow the beginning of leaked stuff.

Piggybacking: When an authorize individual allows others to hold entree to the confidential information either physically or electronically. ISO should maintain a elaborate log which shows a form of unauthorised entree.

Wiretapping: It is a procedure of supervising the telephone and cyberspace conversations by illegal agencies. The best defence is to code the information before conveying it.

The Salami Technique: It is a procedure of stealing money repeatedly in little measures. It is performed by employees who handle fiscal minutess.

Trojan Equus caballus: They are similar viruses. They are used to damage the system instead than seeking to hold an unauthorised entree. The defence is to maintain the backup transcript of the original plan listing.

Trapdoors: These are chiefly used during plan development. It allows the coder to reassign control of the plan into a part usually used to hive away informations. The best manner to guard is to look into plan listings.

Logic bombs: It is a piece of codification that is deliberately inserted into a package system to execute unnatural map when certain conditions are met. It is closely related to viruses and Trojan Equus caballuss.

There are besides some other beginnings of danger that an ISO must maintain in head. They range from simple accidents to natural catastrophes such as temblor, inundations, fire, electricity closure and more.

Proposal Resolution:

Multiple declarations can be provide harmonizing to the given scenario. There should be curtailing entree control to all the employees of an organisation to forestall any unethical quandary. There is a human nature to inquisitive about those things which are non in entree else curtail partly. Access control within an organisation is the most prioritize occupation to salvage the information, the relevant informations should be accessible to the employees of their ain sphere besides giving merely read or put to death rights to them. This will somewhat better towards salvaging informations from outer universe.

Policy:

What Is a Policy?

There are different ways or nomenclatures to depict an information security policy. In the USA, for illustration, it is common to utilize the term ‘policy ‘ for paperss that are frequently described in the UK as ‘standards ‘ . This can take to misconstruing.

Corporate information security policy

Specific policies

Standards

Procedures

Corporate Information Security Policy:

A corporate policy sets out an organisation ‘s rules sing information security. It should be timeless in that it should change little from twelvemonth to twelvemonth. Corporate policy must:

be clear and unambiguous

include statements covering:

Scope

Legal and regulative duties

Functions and duties

Strategic attack and rules

Approach to put on the line direction

Action in the event of a policy breach.

The policy should be endorsed at the highest degree – for illustration, by the MD or Chief Executive.

Specific Policies:

The specific policies change more quickly than corporate policies. As they are more elaborate they need to be reviewed more regularly. Examples of specific policies include:

Information categorization

Access control

Operationss

Incident direction

Physical security

Human resources

Third-party entree

Business continuity direction

Standards:

Security criterions provide counsel towards accomplishing specific security policies, frequently related to peculiar engineerings or merchandises. They are used as a benchmark for audit intents and are derived from:

Industry best pattern

Experience

Business drivers

Internal testing

They must be reviewed on a regular basis to guarantee that new releases and exposures are addressed.

Examples of criterions include:

Firewall constellations

Connectivity protocols

Procedures:

Procedures should be:

Clear

Unambiguous

Up-to-date

Tested

Documented

Examples of processs include:

Incident coverage

Incident direction

User ID addition/removal

Server backup

Harmonizing to BERR ( Department for Business Enterprise & A ; Regulatory Reform ) , Policy needs committedness from the direction, procedures that can be supported by the direction, an appropriate proficient model within which it can be implemented, above all the authorization who is responsible implement all those processs, a agencies by which conformity can be checked and a lawfully agreed response in the event of it being violated.

Sound policies or schemes are the foundation for good information security. Their function is to supply focal point and way and act as the component that binds all facets of information security direction.

Access Control Matrix:

Harmonizing to Gollmann ( 2006 ) entree rights can be defined separately for each combination of capable and object rather simple in the signifier of an entree control matrix.

Bill.doc edit.exe files.com

Undertaking Directors

— — — — — –

Execute

Execute, Read merely

Theo Barratt

Read, Write

Execute, Edit

Execute, Read, Write

Gollmann Access Control Matrix

As looking into the above tabular array it is clearly believe that there are certain rights to each member of the organisation which they have to follow, else harmonizing to policy of the company the action will take topographic point. Presently there is no bing policy for any member of the company, no 1 knows about their rights to entree the corporate informations and how to procure it. If anyone will sell out the company ‘s information which includes billion worth structures the company ‘s morale will travel down exponentially in the market. There are more destructive methods to take control of the builder schematics, corporate informations and most outstanding the fiscal records. Although it exists in different system but due to hapless security it can be entree by interloper.

Implementable Solution in Plantain Building Company: ( My Recommendation )

After holding research on several practical systems solution supplier and with the promising information security, Cloud is supplying the existent clip practical informations base information security system. It has the capableness of configuring firewall with the company ‘s demand and terminal to stop administrative capablenesss. Every terminal user will hold their ain practical system with the login and with several GB informations storage capacity as per harmonizing to the company ‘s policy.

It could be possible to supply all administrative rights to the Theo Barratt ( Manager ) and harmonizing to company ‘s policies he could use and amend it. As Theo Barratt is non professional IT individual, hence Cloud has the best Graphical user interface and it can easy understand by the little professional individual. Monitoring is the best manner to command the traffic and use of the bandwidth ; cloud is besides giving rights to the decision maker to command the informations bound.

Cloud is supplying firewall constellation strategy is which the decision maker can make a wall between private and public clouds. Hence there are fewer opportunities to acquire a victim of Spam ‘s and virus onslaughts.

Key Benefits of Cloud Enterprise:

It will supply limitless sum of calculating power for high profile package ‘s in private webs.

It is wholly automated calculating system that can supply better informations security.

Simplify and accelerate service bringing by uniting self-service provisioning with a catalog of usage built and pre-defined machine images.

It will supply the existent clip describing capablenesss within the cloud environment to guarantee enhanced information security.

The cloud will supply IP based office solution so it can be virtually accessed by anyone with the authorised login.

Cloud IPS/Firewall:

One of the basic demands to procure the private practical web from the public web and cloud IPS/Firewall is supplying the right solution in a really economical manner.

The cloud IPS/Firewall is different from other web security solution because it is designed to protect the web based applications at the border of the cyberspace ; it shields an organisation web from application bed onslaughts and prevents the corporate and client informations.

Application based onslaught is the major exposure for organisations today. Cloud IPS/Firewall has the capableness to procure application bed based onslaughts.

Cloud IPS/Firewall has the extended capacity as comparison to usual firewalls system.

The Cloud Firewall is $ 150 per month with one TB of traffic and extra traffic is $ 0.05 per GB. This includes full layer-7 protection. It is economical for the companies like Plantain Building Company.

Virtual Private Network ( For Theo Barratt )

The best and economical manner to entree office web from place or nomadic location is the implementing of WAN. To entree office web merely VPN package is requires and it should be installed on each client Personal computer that needs to entree. It will be accessed by those lone who have authorized login and valid VPN package in their system. So it could non be accessed by those who do n’t possess the package. Hence Theo Barratt can entree the office web from his place location.

Decision:

Hence, the instance survey after being examined suitably has proposed the right declaration. Because the attack of the given scenario was a spot pessimistic and there was no alternate way if the current system prostration down. After holding a batch of things in head including information security, backup systems, remotely accessed installations and the most of import fiscal information records, the economical and suited solution has been proposed.

No Related Essays

Essay Papers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Idealist by NewMediaThemes

x

Haven't found the Essay You Want?

Get your custom essay sample

For Only $13.90/page

x

Hi!
I'm Beba

Would you like to get such a paper? How about receiving a customized one?

Check it out