Encryption And Firewall Case Study

Improved Essays
M5A1 Short Paper: Encryption and Firewalls

Questions
1. Was the firewall and Web server used by Linen Planet providing encryption services?
If so, what kind of protection was in place?
2. How could the access to Linen Planet’s Web server have been better secured?

Padma Santhanam, the CTO of Linen Planet, is traveling to work and get an urgent request to log in to the work order system and approve the change request (Whitman & Mattord, 2010). If this is not done they will miss the window for the new version of their online credit application (Whitman & Mattord, 2010). This issues appears to urgent that it could not even wait till Padma Santhanam arrives at work in a short while, it needed to be done the day before and was overlooked (Whitman
…show more content…
The use of multi-factor authentication (MFM) helps guarantee that a user is who they claim to be (Rouse, n.d.). The more factors used to determine a user’s true identity gives a greater trust of authenticity (Rouse, n.d.). In this case with Padma Santhanam, if the company had been using milti-factor authentication, he would not have even been able to just give her password and ID to another user and compromises the entire Linen Planet network. With milti-factor authentication, each added factor increases the reassurance that an individual involved in some kind of communication or requesting access to the system is who, or what, they are professed to be (Rouse, n.d.). The three most common categories are often described as something you know, something you have and lastly something you are (Rouse, n.d.). So if Linen Planet server was requiring as second factor of authentication with say such as a key fob, an employee ID card or common access card (CAC), the entire compromise would have been impossible. Even with the Linen Plant use of encryption for connections to these servers would not have done anything to stop this type of compromise. The connection to server uses HTTPS pages that could use one of two secure protocols to encrypt communications (What is HTTPS, n.d.). The first is SSL (Secure Sockets Layer) and the second is TLS (Transport Layer Security) and both use what is known as an asymmetric Public Key Infrastructure (PKI) system (What is HTTPS, n.d.). With an asymmetric system it uses two keys to encrypt communications, a public key and a private key (What is HTTPS, n.d.). Therefore, anything encrypted with the public key can only be decrypted by the private key and vice-versa (What is HTTPS, n.d.). So after Padma Santhanam password and user ID

Related Documents

  • Improved Essays

    General relativity is fundamentally incompatible with quantum mechanics- they have been at odds with each other since its discovery in 1915- relativity breaks down at the subatomic level and vice versa. A conjecture by two physicists may finally reconcile relativity with quantum mechanics and put an end to the chain of inconsistencies began by Hawking’s information paradox. Albert Einstein first discussed the concept of quantum entanglement in a 1935 paper co-written with his colleagues Boris Podolsky and Nathan Rosen. In the form of a thought experiment known as the EPR paradox, they demonstrated the incompleteness of quantum mechanics.…

    • 837 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Obviously better test notes and status changes. I think other techs haven't been taking it seriously in the past, and we need to have a sit down or a talk with all techs to inform them that it is a priority. I think my system of keeping the physical tickets and basically auditing them ourselves at the end of the day can be very effective. 2.…

    • 610 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The business that I will use for my paper’s subject matter is a cabinet making company. Currently the company uses several business information systems. The corporation uses Peachtree accounting software, Microsoft Office for document publishing, an internally written MRP (material request planning), and Infinity QS systems for quality enhancement. All of these programs are currently running on the internal intranet but the systems do not communicate without cyborg intervention.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The cmpany that I currently work for is Cracker Barrell Old Country Store INC. As the lead TOGO server I am responsible for implementing changes to the TOGO processes as well as training all new TOGO hires and furthered training of current employees on any new processes or changes that are implemented. The change that will be taking place in the near future is a new TOGO and catering process, which includes many changes to the current process as well as the addition of new steps, services and menu choices to the process. The change goal is the new TOGO procedures and Catering introduction being implemented effectively. The purpose of the change and introduction of the new process is to increase the amount of TOGO order volumes, increase simplicity…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ga Verification Process

    • 445 Words
    • 2 Pages

    During the inspection of documents related to the construction project in Atlanta, Ga., I was able to detect a lack of segregation of duties, all the responsibility for hiring employees and operation of the project, rests with one person, the foreman of the project, who is in charge not only of observe that the job is completed but also of the administrative area of the same. Some of the failures that have detected, as result of too much pressure on the foreman is that there is no way to locate information about the verification process for the hiring of 20 employees, rather than tax forms that were presented at the main office by the foreman of the project. This procedure gives the opportunity for the company to be subject to fraud, since there is no guarantee that…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Kid Spectrum Case Study

    • 800 Words
    • 4 Pages

    The article deals with the situation where two key employees in major departments conflict in Kid Spectrum, the health care service company for autistic children, due to the different perspective with their work. Ellen, the administrator director of the company, is strict about her role as the administrator, focusing on implementing the new protocol and thereby running the company more economically and efficiently. She claims that Ronnie is not performing his role as the manager, who is expected to take administrative part among the clinicians, leading and helping them to get used to changes. Ellen complains that Ronnie does not stick within his office and let every clinician to take a rest when they call in sick, making the work more difficult for the administrators who should look for substitute workers.…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Peyton Approved is a premium dog treat bakery that offers only the best dog treats for dogs that suffer from allergies. Peyton Approved uses only all-natural and hypoallergenic ingredients. Peyton Approved has been a home-based business for a year with much success, and now has the opportunity to expand into a bakery location. The purpose of this memo is request funding for business expansion. Overview of the Company's Accounting System…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Land rights are still bitterly contested, passionately fought over and, irrefutably, close to the hearts of thousands of Aboriginal people all over Australia. Land rights and the Land Councils, never far from controversy, are, once again in the political spotlight. While the critics change, their arguments have basically remained unchanged for nearly two decades. Land rights, one of the few positive outcomes to emerge for Aboriginal people in the Northern Territory in the past 40 years, has slowly been turned into an unfulfilled obligation for the Australian government.…

    • 1252 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Snc's Security Case Study

    • 250 Words
    • 1 Pages

    SNC established security prior to brief. SNC was unable to provide the accurate Azimuth in the allotted time. SNC provided a disjointed and incomplete order. SNC started with a vague Orientation. SNC confused the fire team leaders when he blended the information together and failing to state, "Concept of Operations, Scheme of Maneuver, and Tasks".…

    • 250 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    E-Grant Problem Summary

    • 107 Words
    • 1 Pages

    Kristy, based on staff’s input, the following summarizes impact of the frequent re-occurring problems with access to E-Grants: • Slower processing of grant modification requests through AMS into E-Grants • Noticeable delays in the review and acceptance of hundreds ETA-9130 Financial Reports • Created problems and delays for many states and discretionary grantees in their submission of the ETA-9130 Financial Reports • The problems in submitting financial reports has resulted in an increase in time use to explain the situation to states and grantees • The lack of knowledge on when E-Grants is availability plays havoc in the staffs’ ability to schedule and manage their work load…

    • 107 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Saga Fly Fishing

    • 551 Words
    • 3 Pages

    The third weakness is detected in the Work Centres. Saga Fly Fishing, Inc. not filed the work order after it has been received from the Production Planning and Control Department. This is because the Production Planning and Control Department and also Work Centre Department must have record of it. If not it will cause an audit trail to be happen. Thus, the work order supposedly must being filed in the Work Centre.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Journal #1 In the first few Chapters of my book, Andy Mc-Nab's Firewall. The Story is a little hard to figure out at first but from what I've gathered it's about a man by the name of Nick Stone. He is an ex-SAS agent working for British Intelligence that's desperate for cash even its doing the right or wrong mission. It takes place in Helsinki, Finland 6th of December 1999.…

    • 231 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Error Free Methods

    • 786 Words
    • 4 Pages

    During the week of the audit, many order selectors were observed performing tasks above and beyond those stated in the company’s documented preferred methods and those considered and allocated in the engineered labor standards resulting in inaccurate and understated performances achieved against standard. For example, observed were labeling of cases after placement to the pallet and traveling out of sequence to obtain base items of multiple cases. The specified methods and engineered standards require a selector to place a case label during the obtain of the case and requires a selector to travel in slot sequence as reflected on the assignment case label sheets. The improper methods are most likely a result of direction by management…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Discuss Nolan's ethical responsibilities in this situation. I believe that it is absolutely wrong for Nolan to even consider telling Borman about SofTech’s cash problems. As employees of any company, there are certain rules that apply to everyone. Those rules include keeping information pertaining to the company within the company.…

    • 348 Words
    • 2 Pages
    Decent Essays