Lockheed-Martin Case Study

Improved Essays
In May 2011, Lockheed-Martin faced a cyberattack where hackers used malicious software (malware) to gain access to their VPN via the RSA SecurID software tokens employees have the ability to use in order to remotely gain access to its internal network. Once the attack was identified, the security specialist took the proper steps isolate and stop the attack before there was any loss of data. From what I assess from the case, the vulnerability in the RSA SecurID software is the biggest risk to the company at this point. In my research, from a technology perspective it was identified that there is a way that the number generation of the token can be copied. Lockheed is the United States government’s largest contractor, which make them a target for terrorists, or foreign governments that want to gain access to need-to-know information on weapons, communications, and aerospace systems which could cause grave danger to national security. With the types of data held on Lockheed servers and amounts of data, if compromised there may be a vested interest in possibly researching other remote technologies with hardened security measures to protect its information. Additional layers of malware protection could be an option as well. Keeping browser plugins patched, blocking peer-to-peer usage, and ensuring all operating system patches are applied when …show more content…
In the world of cybersecurity it is taught the user is the weakest link. Training and education to the staff is a vital piece of maintaining a strong security posture. It is recommended annual awareness training is a requirement to all personnel that have access to information or information systems at Sony, requiring them to sign documentation stating they were trained and understand the “do’s” and “don’ts” when accessing those systems. All recommendations provided in this white paper will require awareness and education to senior management and the

Related Documents

  • Decent Essays

    Over time, Northrop Grumman has restated their commitment to hiring and retaining a diverse workforce and promoting women and people of color to mid-level and senior-level management. However, there has been nominal progress in these efforts, except for reported percentages of women and people of color in senior-level management positions. At the same time, participation in their Employee Resource Groups has declined. Women and people of color have reported in numerous studies that leadership development programs and access to strong mentors are important to them.…

    • 219 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Background: Treasurer’s Operating Instruction 40-8 (TOI-40-8) for Corporate Guaranties and Letters of Credit (LC) dictates that when a non-U.S. government customer’s payment schedule, for any proposal valued over USD $1M, does not provide a Positive Cash Flow, Lockheed Martin must receive either a standby or documentary LC in the corporation’s favor. Otherwise, the business area must request a waiver of the TOI through the Trade Finance Senior Manager, based upon approval of the negative cash position by the business unit’s finance executive. According to the policy, a Positive Cash Flow is achieved when the program cash receipts will exceed program expenditures plus profit throughout the contract performance period. Expenditures include program…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Introduction The American company Lockheed Martin is a global, defense, aerospace, security and advanced technologies with worldwide interests. Lockheed martin was founded in March 1995. headquartered in Bethesda, Maryland, in the Washington, DC. Marillyn Hewson is the current President and Chief Executive Officer .my research is on the magnificent marillyn hewson and how she contributed to put the first stones on some of the powerful aircrafts and fighters. My goal is to empower her place in the world and show what women are capable off by writing this essay which I used our college library for amoung some other web sites .…

    • 124 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Virginia Commonwealth State Agency-Northrop Grumman Critical System Outage The commonwealth of Virginia experienced an information technology storage area network outage on August 25th 2010. This affected several agencies and caused 13% of the file servers to fail. The failure mainly impacted the Department of Motor Vehicles and Department of taxation. Because of the outage problem, DMV couldn’t process driver’s licenses and couldn’t share data with other agencies. (1) DMV has been unable to process in-person driver’s licenses or ID cards at its 74 customer service centers.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mr. Todd Finney led his team of Host Based Security System (HBSS) administrators through a successful Command Cyber Readiness Inspection (CCRI). Thanks to Mr. Finney’s superb leadership, guidance, organizational skills, and technical abilities, he was able to take on the challenge of bringing up the overall compliance score of less than 50% to an exceptional score of 85.6%. This score ranked amongst the top 3% in the Army. Mr. Finney’s team addressed HBSS-related security vulnerabilities on over 19,000 workstations and 1,400 servers across the Recruiter Services Network.…

    • 303 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Purpose The purpose of this document is to provide information about Lockheed Martin’s use of social media. Its social media goals, target audience, and effectiveness will be thoroughly analyzed. Social Media Overview Lockheed Martin implements a variety of social media platforms to promote their services and provide information to users. The company displays its general social media feed through its website.…

    • 765 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Northrop Grumman clearly has made its most significant strides towards diversity and inclusion efforts with respect to the LGBT community and veterans. The data published with respect to the hiring and retention of women and people of color, however, reveals there is room for improvement. A comparison of Northrop Grumman’s Corporate Responsibility Reports published for the last nine years revealed the total number of women comprising their workforce has remained stagnant around 27 percent, far below the reported 45% of women who made up the workforce in 2015. The number of women in mid-level management positions in 2015 were 24.5%, falling short of the 36.8% reported by S&P 500 companies. [cite catalyst]…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    This article explores the benefits associated with the use of cybersecurity in day to day living. The authors focus on the reasons why many people are shifting their operations to involve use of cybersecurity. As used by the national presidential administrators, the authors of the article postulate that it is necessary to have national strategies for electronic security as a protection from intrusion. Further, the authors of the article claim that the integration of cybersecurity has…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    Federal agencies have led law enforcement efforts against computer crime since these agencies hold the technical expertise and political influence to gather significant financial and operational resources at the national level. Thus, these agencies have progressively reorganized in an attempt to channel resources directly at preventing digital crimes and capturing computer criminals, including the creation of special sections within these organizations, employing of new personnel who have specialized technical skill in this area, and the creation of new collaborative sections that combine the resources of multiple agencies. Department of Justice (DOJ) United States Department of Justice was established in 1870.…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jacob Dale, the director of IT department of Sunnylake needs to execute network security training in the entire hospital. Training of the staffs is also required because most of them were from traditional background and had little knowledge about IT. Some of the security fundamentals such as never leave the systems unlocked, enforcing well-built password policy, reset password every 45 days, take out admin rights so that the staff cannot set up software, execute policy to block weak sites. When workers focus on their own duties, they regularly don’t give attention to the following ordinary instructions for network security. Employees might accidentally guide to other security susceptibilities, as well as the unforeseen reception and spreading of computer viruses.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    As well as creating the legislature, public officials are creating back-up systems for their databases and information in case of a cyber attack. This is one of the best ways to thwart any cyber activity: by always staying one step ahead of the hackers (Kemp, 2012,…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays