Henry And Mea Case Study

Improved Essays
• Proprietary Information - The information that is proprietary to the Henry and Mea’s organizations is one of the most important assets available. This proprietary information is crucial for the operation of Henry and Mea’s and all of their franchise stores. Any loss or compromisation of this information would cripple the day to day operations causing financial implications,
• Point of Sales computers and credit card processing and handling servers – These point of sales and credit card processing and handling servers are a very important asset to Henry and Mea. These systems input, access, process, and store all of the credit card and consumer information which is Henry and Mea’s greatest assets and are used for all of the sales at all of
…show more content…
Loss or compromisation of these servers and information systems could not only cripple the day to day operations at Henry and Mea and all of their franchise restrounts, but could also lead to financial losses for the organization
• Corporate office computers - All of the office computers at Henry and Mea’s corporate head courters are used by employees for task and functions that are essential to the daily operations. Many of these computers are also able to access information on systems that could be sensitive. Loss or compromisation of these systems would severely cripple Henry and Mea’s daily operation and result in some losses or financial implication.
• Firewalls and other network and system security devices – All of the firewalls and other system and network security devices are important to the protection of all of the systems and critical information that is crucial to Henry and Mea’s operation. Though loss of these assets themselves may not cause great impact on the organizations, they may provide opportunity for a cyber-attack to occur that could result in great loss for the

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Case Study 1 AIT 652 Sache Bond Executive summary: Towson University is responsible for complying with both Federal and Maryland state laws. It is essential that all employees are aware that the proper procedures must be followed to ensure that the legal action remains unrevised once the legal hold notice is issued. The legal holds notice will inform all necessary employees of their new profound obligation as an employee. The notice refers you to the policy written on the legal hold notices. The guidance of the legal holds notice supersedes all other retention policy guidelines (Records).…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Riordan Manufacturing has identified a need to integrate their accounting information systems. For the revenue cycle, the hardware and software selection requirements are described in the following paper. The process includes answering important questions regarding internal controls, the persons who require access to the different types of information, and what types of reports should be generated. Finally, the decision on where the accounting information should be stored will be discussed. Determining the hardware and software needed and documenting the controls of the system is an important first step in integrating the entire manufacturing company and producing reliable and accurate financial statements.…

    • 1042 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Case Study Henry Tam

    • 1191 Words
    • 5 Pages

    This case revolves around Henry Tam. A student at Harvard Business School who joins the Harvard Business School Plan Contest. The contest was established to prepare students for future challenges that would be presented to them in real world business situations. Harvard students Alex, Dav, and Dana all join Henry as part of the contest team.…

    • 1191 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Regarding Henry Essay

    • 615 Words
    • 3 Pages

    Regarding Henry In class we watched the movie “Regarding Henry” about a grown man who is a very successful lawyer and focuses on his work more than anything else. His Id is very prominent and overpowering, but his superego comes out more when he’s shot in a store trying to get some cigarettes. Henry’s natural state though is his superego. The way he is in the beginning of this movie may seem like he’s very self-consumed but deep down has morals and loves his family. First, his Id is greatly shown in the beginning of the movie when he’s selfish and insensitive to the feelings of others and what is morally right.…

    • 615 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The connection between branches and headquarters will need to secured. The availability of the network, systems and servers will be critical to the customer…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A Risk Analysis Essay

    • 1188 Words
    • 5 Pages

    SL.no Risks, Threats, ad Vulnerabilities Primary domain impacted Risk Impact/factor 1 Unauthorized access from public Internet WAN 2 2 User destroys data in application and deletes all files LAN 1 3 Hacker penetrates your IT infrastructure and gains access to your internal network System/Application 3 4 Intraoffice employee romance gone bad Workstation 3 5 Fire destroys primary data center System/Application 1 6 Service provider service level agreement (SLA) is not achieved User 2 7 Workstation operating system (OS) has a known software vulnerability Workstation 3 8 Unauthorized access to organization-owned workstations Workstation 2 9 Loss of production data server System/Application 1 10 Denial of service attack on organization Demilitarized zone (DMZ) and e-mail server System/Application 2 11 Remote communications from a home office WAN 3 12 LAN server OS has a known software vulnerability LAN 3 13 User downloads an unknown e-mail attachment Workstation 3 14 Workstation browser has software vulnerability Workstation 3 15 Mobile emplyoee needs secure browser access to sales-order entry system LAN-to-WAN 2 16 Service provider has a major network outage User 1 17 Weak ingress/egress traffic-filtering degrades performance User…

    • 1188 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    T&L Medical Transportation owners and dispatchers are at a continuous battle over the daily operations of the company. One of the processes that they will need to consider implementing to stay strategically competitive would be upgrading their computer system. Therefore, for this process to occur the following steps will need to be executed for this to reach fruition in this organization. T&L Medical Transportation owners and managers will both need to be on the same page as far as what system will be needed that works best for the daily operations of the company. Again, it has been suggested surviving in the medical transportation industry and being successful requires more than just acquiring a vehicle, insurance, and marketing (n.d.).…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Activation Process Summary

    • 1180 Words
    • 5 Pages

    Personnel must be efficiently trained and supported in these critical IT processes and risk strategies to ensure that they do not unknowingly contribute to intrusions of systems and if so, what actions should be taken in the occurrence of a security breach. Security threats or breaches are bound to occur at some point in the universities lifespan; this is when insurance becomes a crucial measure in the planning of IT risk and recovery procedures. This business insurance should be maintained and updated to ensure coverage of new and emerging threats to the business landscape.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Recommendations We believe the following 5 recommendations listed below will be beneficial to lowering risks related to IT and unauthorized access in the Athens, OH Wendy’s location: 1. New POS System By updating the POS system, management will be able to spend more time monitoring other controls. The current control of reviewing the POS system for errors is directly related to issues caused by the outdated system that is being used.…

    • 715 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There are key considerations to be made when selecting and implementing a Point of Sale system for a restaurant. The urge to explore new POS system functionality and hardware form factors is not uncommon among restauranteurs looking to cut costs, improve service or generate a little consumer awareness (Liddle, 2009). The lecture this semester from Chapter 13 briefly explained the system selection process. In response, I will focus on these key elements: needs versus wants, ease of use, training, customer support, and scalability.…

    • 737 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    1. Introductions: Management information system (MSI) is the integration between people and technology. Over the years, management system has significant impact on developing organizational productivity, efficiency and most importantly financial growth. Though, management information system is the catalyst to increase business operation flow by relating people with technology but immensely incurred additional cost on its implementation within organization. During World War II, McDonald started business in 1940 California founded by Richard and Maurice McDonald but after World War II,…

    • 3760 Words
    • 16 Pages
    Great Essays