Cenartech Case

Improved Essays
Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment?

Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems. Its overall company network is well separated with three networks (Whitman & Mattord, 2011). The first is a wireless guest network, the second is a financial network ,without any wireless access and the third is a production network (for employees and other functions) with wireless access (Whitman & Mattord, 2011). All networks are
…show more content…
One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011).
Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011). Items like these accounts being accessed at the same time from different IP addresses really should have been a “RED FLAG” of major ongoing issues. Furthermore, he had been an IT manager for two years and had he not been receiving reports of leaving personnel to allow him to have their accounts properly deleted in
…show more content…
Discuss the challenges he would have met in pursuing your recommended strategy.

From the very beginning of Brian’s employment, he was placed at a great disadvantage. The material presented does not fully explain the “chain of command” of his company, but he should not be reporting to another department manager. As a department head, he should be reporting directly to the CEO as any department head should.
There are several actions that Brian could have instigated to have helped avert the attack. The first and foremost, he should have become aware of the very poor user account maintenance being done. Just as the IT department must be aware of any required new user accounts, they really must be aware of user accounts of personnel that are leaving, and more so, fired (Whitman & Mattord, 2011). Finally, as the manager of the IT department, he must share the duty of sever log reviewing and keep their IT department resources secure, such as not allowing the VPN installer disk to be so easily stolen (Whitman & Mattord,

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Fact is, access it the network grants access to more than just the internet. Not everyone should be able to access the network. Infinite amount of trouble can come from unauthorized persons accessing the organization’s network. If it is a guest network that is needed, that should be added to the organization. That’s only part of the solution.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Escalation Policy Pathways Industries Policy Overview This policy provides guidelines for responding to misuse of Pathways Industries IT and network resources either from internal or external sources. This policy will attempt to provide contact information for reporting incidents and when to involve Pathways Industries Executive Team, and or company legal representatives. Attacks on Pathways Industries resources could be considered as theft of intellectual property or other computer network attack. All staff members will receive regular training on acceptable use and incident handling procedures of all Pathways Industries resources.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Superior Essays

    A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Recently UCLA was involved in a data breech in which hackers gained access to parts of UCLA Health's computer network where 4.5 million patient's sensitive information were accessed. This incident is a huge concern as it questions the ability of hospitals, health insurers and medical providers to safeguard the electronic medical records and other sensitive data that are collected. This network contained names, dates of birth, Social Security numbers, health plan identification numbers and medical information such as patient diagnoses. This access could have begun in September 2014 with some of the information dating back to 1990. Prior to the attack UCLA has been taking steps and spening tens of millions of dollars to strengthen its computer…

    • 154 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Pentagon Crisis Background Situation Overview September 11, 2001 one of the most impactful disasters in North American history. It is recorded that “at 9:37:46, American Airline Flight 77 crashed into the Pentagon [and] all on board, as well as, many civilians were killed in the building” (the pentagon report, 2004). In another article it is stated the American Airlines Flight 77 killed “a crew of six, 58 passengers, and 125 individual [inside] the Pentagon” (Moynihan,2007) after being hijacked. Within an hour after the attack occurred many personnel were dispatched to help aid in the crisis, containing the fire, rescuing the injured, and providing medical services. It is suggested the Pentagon attack was not a coincidence as the World Trade…

    • 1817 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    James Thomson Incident

    • 2015 Words
    • 9 Pages

    This was a very weak alibi on his behalf. If what he said was true and he neglected the email sent to him with the information of hacking because he was busy, it is his responsibility to inform his father, the CEO of the company, about the situation. Ignorance is not an excuse. He knew what was going on within his organization and that is why he decided to put in his resignation on February…

    • 2015 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nawaf Alnafea INTEGRATIVE CASE 10.0 1. Discuss the organizational structure at Cisco Systems. Explain and discuss each one of the current structural dimensions. Explain and discuss each one of the current contingency factors. What type of structure is this?…

    • 1197 Words
    • 5 Pages
    Improved Essays

Related Topics