Free Essay

It Infrastructure

In:

Submitted By mike0418852004
Words 429
Pages 2
In an IT infrastructure, domains there can be many threats that can take down your system. There is a threat out there that can harm our system, which we need to address. I feel that our system can be improved for better security and be protective from outside threat. This report is to inform you of the domains that can be affected by outside threat. In addition, people should know when dealing which company property and data that there no room for error. Next to properly handle company data when dealing with customer information. I feel that educating our employee would cut back on human error and keep the data safe. User domain can be defined, as the access point was the person meets the computer. The person can access the system through this point depending on the level of access that have. We would need to put in an “Acceptable Use Policy” it would give the employee the information on how to handle company assets. Now there would be certain measure to where we give access to employee, but that would be handling in the hiring process. With this information, the employee would be responsible for his or her action when handling sensitive data. That would ensure that company data would be safe when an employee logged on to the system. The User Domain is the weakest access point and employee should understand that. Next is the “Workstation Domain” is the device to where a user can access the company system. Only employees with the right access should be using these computers. Each workstation should have its own level of security so people with the right access can access them. Each employee should be held responsible for their workstation because they are put in charge of that device. If a workstation is unsecure, it can leave a whole network vulnerable to major threat. Then we have "System/ Application Domain" and this system has mission critical system and application. This domain must have high-level security and should only be given to high-level employee. These system and application would most likely be target by hacker. This level of security requires the most education for an employee. The employee must know and understand the measure between for access is granted.

As you can see, there is a lot of room for improvement in our system security. There are many threats that could take down our system and we should review and angle. I highly stress that you take the assessment seriously because knowledge is key to our success.

Similar Documents

Free Essay

Infrastructure

...INFRATSRUCTURE The Eleventh Five Year Plan emphasized the need for removing infrastructure bottlenecks for sustained growth. It, therefore, proposed an investment of US $500 billion in infrastructure sectors through a mix of public and private sectors to reduce deficits in identified infrastructure sectors. As a percentage of the gross domestic product (GDP), investment in infrastructure was expected to increase to around 9 per cent. For the first time the contribution of the private sector in total investment in infrastructure was targeted to exceed 30 per cent. Total investment in infrastructure during the Eleventh Plan is estimated to increase to more than 8 per cent of GDP in the terminal year of the Plan --higher by 2.47 percentage point s a s c ompa red t o the Tenth Pl an. The private sector is expected t o be contributing nearly 36 per cent of this investment. RAILWAYS Some of the major goals set for Vision 2020 in the document include (a) laying of 25,000 km of new lines; (b) quadrupling of the 6,000 km network with segregation of passenger and freight lines; (c) electrification of 14,000 km; (d) completion of gaugeconversion; (e) upgradation of speed to 160-200 kmph for passenger trains; and (f) construction of 2,000 km of high-speed rail lines. • Freight performance: Freight loading on Indian Railways during April-November 2011 was 618.0 MT as compared to 593.4 MT in April-November 2010, an increase of 4.14 per cent. • Upgradation...

Words: 1202 - Pages: 5

Free Essay

Ppp in Infrastructure Sector

...IIPDF India Infrastructure Project Development Fund The Union Finance Minister in the Budget Speech for 2007-08 announced in the parliament the setting up of a Revolving Fund with a corpus Rs. 100 Crore to quicken the process of project preparation. Accordingly the corpus fund titled India Infrastructure Project Development Fund (IIPDF) has been created in Department of Economic Affairs, Ministry of Finance, Government of India with an initial corpus of Rs. 100 Crore for supporting the development of credible and bankable Public Private Partnership (PPP) projects that can be offered to the private sector. The IIPDF has been created with initial budgetary outlay by the Ministry of Finance, Government of India. The procurement costs of PPPs, and particularly the costs of Transaction Advisors, are significant and often pose a burden on the budget of the Sponsoring Authority. Department of Economic Affairs (DEA) has identified the IIPDF as a mechanism through which Sponsoring Authority will be able to source funding to cover a portion of the PPP transaction costs, thereby reducing the impact of costs related to procurement on their budgets. From the Government of India’s perspective, the IIPDF must increase the quality and quantity of bankable projectsthat are processed through the Central or States project pipeline. The IIPDF will be available to the Sponsoring Authorities for PPP projects for the purpose of meeting the project development costs which may include the expenses...

Words: 2076 - Pages: 9

Premium Essay

Infrastructure

...through an unsecured site leading to the disclosure of business sensitive and companywide strategic information pertaining current contract negotiations and company mergers. IDI CIO has enlisted the help of an Information Systems Infrastructure Architect and An Information Systems Security Specialist to investigate and recommend improvements to IDI’s IT Infrastructure. To date, IDI’s network weaknesses out way the network strengths. The larger of the weaknesses is that IDI has no secondary locations in the event of a large scale disaster. Second to that is the lack of security implementations at some of the sites, i.e., Remote access to the Warsaw office runs through a completely unsecure channel and the blatant disregard for adherence to network security policies at the home office. Further evaluations of some of IDI sites have led us to come up with a fairly comprehensive plan to fix and mitigate and major issues that may arise in the future. Our greatest challenge will be to ensure that all sites are working towards the same goal using the same equipment. We are driven to set IT standards which will help us: * Avoiding technological dead ends * Reducing dependency on outside vendors * Promote universality San Paulo’s infrastructure is going to be the basis for the rest of the sites. We recommend that each site have the following hardware and software setups: * Microsoft Windows 2008 Server R2 *...

Words: 3151 - Pages: 13

Premium Essay

Analysis of Infrastructure Sector in India

...Analysis of Infrastructure Sector Infrastructure refers to the fundamental facilities and systems serving a country, city or area, including the services and facilities necessary for its economy to function. Infrastructure is the backbone of an economy. The various types of infrastructure are roads, airports, ports, housing, cold chain, warehousing, telecom towers and allied services, container freight stations etc. In the World Economic Forum’s Global Competitiveness Report for 2011-2012, India was ranked 89th out of 142 countries for its infrastructure. The report also criticized the transport, ICT and energy infrastructure labelling it as “largely insufficient and ill adapted to the needs of business”. Market Size: The Indian power sector has an investment potential of $US 250billion in the next 4-5 years, providing immense opportunities in power generation, distribution, transmission and equipment. The Indian railways have had an increase of 12.57% in revenues from last year. FDI received in construction development sector from April 2000 to January 2015 stood at US$ 24,028.19 million. The number of export and import containers moving through major ports in India expanded 7.34% year over year from April to October 2014. Government Estimation and Plans: Sustained increase in infrastructure is expected to be one of the crucial factors for sustaining strong growth in the economy. Infrastructure investment is expected to surge from 8.9% of GDP in FY15 to 12.1% of GDP in...

Words: 700 - Pages: 3

Free Essay

Critical Infrastructure Protection

...The U.S. CIP is a national program to ensure the security of vulnerable and interconnected infrastructures of the United States The United States possesses both the world's strongest military and its largest national economy. Those two aspects of our power are mutually reinforcing and dependent. They are also increasingly reliant upon certain critical infrastructures and upon cyber-based information systems. Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government. They include, but are not limited to, telecommunications, energy, banking and finance, transportation, water systems and emergency services, both governmental and private. Many of the nation's critical infrastructures have historically been physically and logically separate systems that had little interdependence. As a result of advances in information technology and the necessity of improved efficiency, however, these infrastructures have become increasingly automated and interlinked. These same advances have created new vulnerabilities to equipment failure, human error, weather and other natural causes, and physical and cyber attacks. Addressing these vulnerabilities will necessarily require flexible, evolutionary approaches that span both the public and private sectors, and protect both domestic and international security. Because of our military strength, future enemies, whether nations, groups or individuals, may seek to harm us in non-...

Words: 468 - Pages: 2

Premium Essay

Ppp and Project Financing in Logistics Infrastructure

...Project Finance and Private Public Partnership in financing logistics infrastructure. Introduction Finance scholars acknowledge a clear-cut distinction between corporate finance and project finance. The two techniques are considered as basically different approaches to the problem of raising debt to fund capital investments. In corporate finance lenders assess the creditworthy of a whole company, evaluating the going concern, the full range of projects in place, and the cautional value of all the assets. The amount to lend and the risk-spread are decided on a global evaluation of the firm’s economic and financial situation. In project finance, the goal is the implementation of a specific project. Lenders typically finance a special purpose vehicle for the development and construction of a particular project, looking to cashflows and project’s assets as sources of payment for their loans, rather than to the credit ratings of the project sponsors. Historically project finance was widely used in financing transport and logistics infrastructure, like railways or channels. More recently, in the past decades, there has been a new wave of global interest: large amounts of debt have been raised to finance projects like motorways, distriparks, maritime ports, intermodal logistic platforms. These infrastructures are built, owned and operated by special purpose vehicles (SPV), organized for that single project and financed mainly by debt. In many cases, SPVs are not wholly owned by private...

Words: 2318 - Pages: 10

Premium Essay

Critical Infrastructure Protection

...Critical Infrastructure Protection (CIP) and the mythology behind this since the attacks of 9/11, as well as a brief history of Critical Infrastructure Protection pass to the present to include attacks from the cyber arena. These attacks are prone to come indirect or direct which will and could affect our need and use for resources for life as we know it based on living naturally on a daily bases, these threats maybe man made or by natural disaster. Problem statement Prior to the attacks of 9/11 there was no main concern with the protection of Critical Infrastructure within the United States from any avenue. As we moved on into the 21 century the threat has evolved from more than just protecting water source, and power plants. With the information age this issue has shown another form of crippling the United States economy with just the push of a button. How we to protect these infrastructures from threats that may not be seen or those from natural disasters is a question for now and the future. Purpose statement I have chosen this particular subject due to the nature of its importance to national security, economy, as well as the everyday needs of Americans to survive. The awareness for the protection of our critical infrastructure is a necessity for the present and future of America’s well fair. Research questions Q1. When did the United States began showing concern for critical infrastructure and why? Q2. Why is the protection of critical infrastructure so paramount...

Words: 786 - Pages: 4

Premium Essay

Assignment 2 Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Strayer University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (dhs.gov, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and administer...

Words: 1685 - Pages: 7

Free Essay

Public Key Infrastructure

...Public Key Infrastructure David Croughwell Prof. George Danilovics Networking Security Fundamentals (CIS333) 17 February 2013 Public Key Infrastructure In discussing the Public Key Infrastructure (PKI) we need to discuss the differences between asymmetric and symmetric keys. These two keys differ in how they are distributed to the various parties that would like to transfer information. Symmetric can be completed by hand delivery, transmitting the key encrypted with a public key, or through a secure connection. This symmetric key or “private key” is used by both parties for encryption and decryption, this method once the key is obtained is the faster of the two and the most secure. Private keys can also be incorporated with hardware devices which will also increase the speed in which the encryption/decryption takes place. Asymmetric keys or “public keys” are a combination of private keys and public keys, since in circumstances the individual receiving the file would have no other ways of receiving the private key securely. This requires a key that is generated so that it can be linked with the private key, being linked like this allows you to post the public key to certificate authorities who will verify that the two keys come from the individual that you expected. The means of identifying who you are can be handled by a third-party corporation. This is completed by utilizing a digital signature which is the equivalent of a handwritten signature. This tells the...

Words: 915 - Pages: 4

Premium Essay

Public Key Infrastructure

...Case Study 2: Public Key Infrastructure Due Week 6 and worth 50 points You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.  Write a two to three (2-3) page paper in which you: 1. Identify and analyze the fundamentals of PKI. 2. Analyze positive and negative characteristics of a Public and In-house CA. 3. Provide a sound recommendation for either a Public CA or an In-house CA. Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any...

Words: 335 - Pages: 2

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Understanding It Infrastructure Security Case Study

...Week 1: Understanding IT Infrastructure Security Case Study Hello my name is YGS and I am an Independent contractor for TJX, they have requested my assistant and I will be in charge of all IT matter at TJX. In recent happenings at TJX you should by now be aware that this company was breached by a hacker by the name of the Albert Gonzalez. He stole over $170 million dollars of customer’s credit card information. As a result TJX has taken a major financial loss and our honor and credibility is in question. The reason we are in question is because it turns out the matter was not discovered until an outside source (our gateway/payment-card processing) partners came in and performed an audit to then discover we were breached. Before the audit we should have caught the transfer of 80 GB of stored data by Mr. Gonzalez. Prior to any breach of this company TJX should have been compliant with the payment card industry compliance and validation regulations. In complying with the Federal Trade Commission (FTC) under FTC jurisdiction our IT team should be consistently taking measures in place to keep customer information secure at all times. By being on top of things we would have been less vulnerable to an attack of this size and speared the embarrassment of not discovering the breach for over seven months. To of eradicated this from ever happening TJX should have made sure that our payment gateway client was compliant with their firewall configuration, protect stored cardholder...

Words: 361 - Pages: 2

Free Essay

Assignment 2: Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Benard Braxton, Jr. Dr. Bouaffo Kouame CIS 502 – Theories of Security Management May 17, 2015 The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015). These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department of Homeland Security. These objectives and goals says what it means to prevent, to protect, to respond, and to recover. They also shows how build in security, to ensure resilience, and to facilitate customs and exchange (DHS, 2015). There are thousands of people from across the all over the country who are responsible for executing these missions. These are the people who interact with the public, are responsible for security and public safety, operate our country’s critical services and infrastructures, develop technology, perform research, watch, prepare for, and respond to emerging disasters and threats (DHS, 2015). The five homeland security core missions are to prevent terrorism and enhancing security; secure and manage our borders; enforce and administer our immigration laws; safeguard...

Words: 1124 - Pages: 5

Premium Essay

United Parcel Service’s It Infrastructure

...United Parcel Service’s IT Infrastructure: A Case Analysis Russell Baker, Jacksonville University Brian Wm. Dudley, Jacksonville University Sean Holt, Jacksonville University Chris Stockton, Jacksonville University Vanja Vukota, Jacksonville University ABSTRACT This analysis of the information technology infrastructure at United Parcel Service (UPS) begins with a general overview of the company’s information technology (IT) environment to establish awareness of the size and complexity of this corporation. It includes a macro-level breakdown of the technology infrastructure of UPS ranging from the data centers to the PCs currently in operation. The study also more closely analyzes the software and database structure of UPS along with an analysis of the company’s E-commerce activities. It includes an interview with Tom Creech, the North Florida District E-commerce manager at UPS. Finally, research was conducted to evaluate the emerging technologies that UPS is implementing and employing to support the business strategy and maintain its competitive edge. OVERVIEW nfrastructure, data and proprietary e-commerce software elements are the foundation of UPS’s technology success. These tools work together to support its e-commerce strategy, which in turn supports the company’s business strategy. The company’s ongoing investment and research in emerging technologies gives UPS its competitive advantage according to Tom Creech, North Florida District E-commerce Manager. “UPS...

Words: 3557 - Pages: 15

Premium Essay

It Infrastructure

...partnership to develop a new set of information technology (IT) infrastructure capabilities which enabled the company to provide the necessary services for its large customers while at the same time reducing costs at Johnson & Johnson [Weill & Broadbent, 1998]. In the late 1990s, Charles Schwab focused on delivering customized information to its investors in a timely manner. Using the company's IT infrastructure and applications aligned with its business focus, Schwab became a full service brokerage firm. The firm was able to provide information and process transactions in meeting its business objectives. Customers could retrieve stock quotes and place orders via Schwab's Web site. As a result, the corporation continues to be an industry leader. These two examples demonstrate that an organization’s IT infrastructure can provide tangible benefits and a continuity of business practices [Kettinger, Grover, Subanish, & Segars, 1994]. A particularly important characteristic of IT infrastructure is flexibility [Byrd & Turner, 2000]. Researchers have stated that IT infrastructure flexibility should be viewed as an organizational core competency and that IT infrastructure flexibility is necessary to handle increased customer demands without increased costs [Davenport & Linder, 1994; Weill, 1993]. As we discuss next in developing the theoretical framework for our study, two important aspects of IT infrastructure flexibility emerge from previous research: the core business applications...

Words: 328 - Pages: 2