Johnson Financial Case Summary

Improved Essays
Johnson Financial (JF) is a mid-sized insurance company located in the northeast United States. The company supports a remote computing environment for users located outside of the corporate offices. The remote users, outside of the corporate network, support various aspects of the business operations. Up to twenty percent of the company users may remote compute at any point in time. The current method of remote computing is based on a company provided laptop and a vpn connection to the corporate data center. In certain cases, employee owned computers are being used to make a vpn connection to the corporate data center. In the course of normal business, remote users access non-public information and sensitive corporate data. There are two distinct security issues associated with the current method of remote computing. First, regulatory requirements require that non-public information at rest must be protected by encryption. Additionally, corporate policy requires sensitive corporate data at rest must be protected by encryption. Remote users end up with both non-public …show more content…
The Citrix gateway provided client system authentication so that only approved user systems can connect to the environment. User authentication to applications was implemented with multifactor authentication to protect user credentials.
The implementation of this environment addressed the encryption issue and the vpn issue by eliminating the need for both. After the installation was completed and the users were migrated, the users were able to access the necessary applications via the published application gateway. Using the published applications via the Citrix client stopped the non-public information from ending up on the remote computers. All users were successfully transitioned to the published applications gateway and no longer required full network vpn

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    The usernames and passwords are a unique key to log into a computer or network. When computers have usernames and passwords enabled this adds a security feature so that if the computer is a sleeping state credential need to be input to unlock the computer. For example, if one user was to leave a computer open on his desk and went to do another task, another user or possibly an intruder that has gained access into the building can gain access to files on the computer or the network. Therefore, network administrators have an important role in providing the most reliable security by simply implementing user credentials.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Remote access need to be safer. A wide open remote access to the EHR system is very dangerous. A VPN should be put in place to control which accounts have remote access to the system. You will also have to connect to a secure network to access…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Gregory Johnson Case

    • 1168 Words
    • 5 Pages

    1. Name of Case Texas v. Johnson 491 U.S. 397, 109 S.CT. 2533 (1989) 2. Facts of Case Gregory Johnson joined a protest in Dallas, Texas during the 1984 Republican Convention. During the protest Johnson burned a flag as others chanted.…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    During the Republican national convention was taking place in Dallas in 1984 where Gregory Lee Johnston participated in a political demonstration of which an american flag was burned as a sign of symbolic language. He was then charged on a Texas criminal statute that forbids the desecration of venerated objects that included but not excluded to monuments,places of worship or burial, or a state or national flag “in a way that would offend one or more persons likely to observe or discover his action”. This lead to him being convicted and sentenced to a year's time in prison along with a fine of two thousand dollars. However, this was not the ned as he appealed this case to the supreme court as he felt that it was well with his rights to burn a flag as the first amendment protects him.…

    • 524 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA Compliance

    • 1020 Words
    • 5 Pages

    With more medicinal experts utilizing individual cell phones to discuss and work together on patient concerns, it is imperative that human services associations address the utilization of innovation and HIPAA consistence. Numerous types of much of the time utilized correspondence are not HIPAA agreeable. Unsecure channels of correspondence by and large incorporate SMS, Skype and email since duplicates of messages are left on administration suppliers' servers over which a social insurance association has no control. List of technology that works with HIPAA: -Any…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Primavera Task 1

    • 281 Words
    • 2 Pages

    In the Primavera Environment, each user will be assigned a single Global Security Profile of , Administrator, Master Global Scheduler, New Global Scheduler, or View Global Data. The global security privileges are shown in Table 4 Global Security Privileges • The will have all global security privileges and access to all projects within the enterprise system. The profile will be limited to two individuals within SoSE&I EPSI. •…

    • 281 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Costco Risk Assessment

    • 935 Words
    • 4 Pages

    Assessment of Security Risks at Costco Wholesale This portfolio project report contains the relevant organizational information of Costco Wholesale Corporation, which is a wholesale giant in the United States. The primary intention of this report is to highlight the basic organizational location and financial information, along with the computing and network infrastructure details to help layout the detailed structure of an Information Technology (IT) risk assessment report. As part of the risk assessment report, the key elements emphasized are the threats and vulnerabilities that are possible in the current system and architecture; based on the vulnerabilities, the risks that are likely to occur; and the suggestions to identify and mitigate…

    • 935 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The Countrywide Financial case study describes the “villainess” mentality of what had become the largest provider of home loans in the United States (Ferrell, Fraedrich, & Ferrell, 2013). Angelo Mozilo was a co-founding partner in Countrywide Financial in 1969 and in less than 30 years the mortgage provider had reached the $1 trillion mark by primarily on the back of subprime lending, which ultimately was at the heart of the economy’s collapse. The company focused its efforts and implemented a program for low-income and minority customers to purchase a home that they otherwise would not have qualified (Ferrell et al, 2013). Subprime loans are considered to be high-risk because of a variety of credit and income ratio criteria being less…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Network Comparison Paper

    • 1221 Words
    • 5 Pages

    1) Draw a diagram for the above scenario using a drawing program such as Microsoft Visio (2 marks) 
Please view Microsoft Visio Document. 

2) Provide LAN solution for each office connecting computers and printers together. What types of topology/topologies are you using and why? Explain all connectivity devices used by your selected topology/topologies.…

    • 1221 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays