Analysis of Jacket-X
Overview of corporation
Jacket – X Corporation is located in a large metropolitan area that manufacturer industrial-grade gloves, safety jackets and other specialized safety equipment. The Chief Information Officer at Jacket-X is concerned about the security procedures that are going on. For the past year, Jacket –X’s Human Resources department has experiencing financial issues. In additional, a member on the sale forces team loaned his son the company laptop without letting anyone know. The laptop was brought back into the building and was connected back to the corporate network before any sale person could perform any antivirus scans on the laptop. Jacket-X was able to stay current by installing a new Identity Management …show more content…
An area that is more secluded and secure will be more appropriate for Jacket-X to run their business. This will lead to all access points on the Jacket-X network must be safeguarded. Wireless connection will not be open and outsider will not have access to any Ethernet ports or wireless connection. Jacket-X should also be careful when employees following the bring your own device (BYOD) policy to work especially if employees are using the network. Employees can cause substantial damage to the network and can reduce the control that organizations have over network security. While BYOD or no BYOD won 't put off an employee who is determined to try to steal data from a company, BYOD does make it a little easier because it 's a device that they own and that 's primarily under their control (Kingsley-Hughes, 2013). Kingsley-Hughes suggest that endpoint security software can help prevent data leakage, but it can 't control data that employees have legitimate access to. Tight controls, access control, logging, and encryption are a