Jacket-X Security Vulnerabilities

Improved Essays
Jacket – X Security Vulnerabilities

Analysis of Jacket-X
Overview of corporation

Jacket – X Corporation is located in a large metropolitan area that manufacturer industrial-grade gloves, safety jackets and other specialized safety equipment. The Chief Information Officer at Jacket-X is concerned about the security procedures that are going on. For the past year, Jacket –X’s Human Resources department has experiencing financial issues. In additional, a member on the sale forces team loaned his son the company laptop without letting anyone know. The laptop was brought back into the building and was connected back to the corporate network before any sale person could perform any antivirus scans on the laptop. Jacket-X was able to stay current by installing a new Identity Management
…show more content…
An area that is more secluded and secure will be more appropriate for Jacket-X to run their business. This will lead to all access points on the Jacket-X network must be safeguarded. Wireless connection will not be open and outsider will not have access to any Ethernet ports or wireless connection. Jacket-X should also be careful when employees following the bring your own device (BYOD) policy to work especially if employees are using the network. Employees can cause substantial damage to the network and can reduce the control that organizations have over network security. While BYOD or no BYOD won 't put off an employee who is determined to try to steal data from a company, BYOD does make it a little easier because it 's a device that they own and that 's primarily under their control (Kingsley-Hughes, 2013). Kingsley-Hughes suggest that endpoint security software can help prevent data leakage, but it can 't control data that employees have legitimate access to. Tight controls, access control, logging, and encryption are a

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Most of the organisation has a system that visitors cannot move around the building without an organisation employee to enter them to the building and escort them out. If the visitors in a wrong place of the building they can be identified to the organisation employee so they will escort them out, otherwise without visitors passes they cannot be identified and they might have a wrong reason of being on that building such as stealing equipment or stealing data, corrupting the system. • Sign in/out systems This security measure can be used within the system to secure and keep the data confidential. The organisation employees each one of them who uses a computer system can have a sign in and sign out system, which is User name and password that they need to enter before the system opened and that will prevent anyone from accessing the system without someone else permission .…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    A1. The scenario is about a disgruntled employee who felt that his salary should have been more. He also felt that while he was being under paid the president and some other employees were making too much. He then set out to change this without authority, if he could only find where and how to do this.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This paper will examine the Firefighter’s Turnout Jacket and what it does to protect the Firefighter. The Turnout Coat is a very interesting piece of equipment, as it has changed throughout history. It is used by every Firefighter around the world, either Volunteer or paid. Also the many materials that are put into such a unique piece of clothing. The everyday Firefighter has in one shape or another type of personal protective jacket that protects them from the very toxic and chemical debris inside of a burning structure.…

    • 329 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In this instance employees use their own device for work procedures. And although many organizations may have a policy regarding securing personal devices, it is often not put into practice and thus increasing the vulnerability of the data. For example, a doctor could access personal health data on an unsecure network and send it to their personal email. The emailing private health information to an email is a HIPAA violation and using an unsecure network leaves your device open for intrusion. The last common cause of data breach is the lacy of security defense.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Korn/Ferry V. Case Study

    • 1058 Words
    • 4 Pages

    FACTS: David Nosal was a self-employed entrepreneur who opened a business mimicking his former employer Korn/Ferry’s business strategy. Korn/ Ferry operated an executive search firm, which employed several workers, who were given access to the company computer systems with the use of log in credentials. This granted employees access to critical business information, such as names and contact information for clients and others. Nosal, now a direct competitor of Korn/Ferry, asked some of Korn/Ferry employees to use their computer privileges, to access and obtain pertinent information, then supply the information to him in order to gain a competitive edge. Further, Korn/Ferry had a previously established policy in place, which prevented employees…

    • 1058 Words
    • 4 Pages
    Great Essays