Woodburn Graphics

Improved Essays
Jim Pendergast, Director of Planning and Development, are concerned with Woodburn’s internal and external network and website security. They have taken on the responsibility to evaluate the next step concerning network administration, second generation websites, and security issues. As a result of the three recent attacks on Woodburn’s network, resolving these issues is becoming more time consuming. Woodburn Graphics, a mid-size, full service printing company, which operates a 60,000+ square foot facility along with 44 employees. Woodburn’s management team oversees multiple aspects of Woodburn’s daily operations that may overlap amongst each other’s managerial duties. Computer consultants are hired as-needed to assist in supporting the network.

Woodburn Graphics, a family owned business, advantage and endurance stems from the ability to operate while rapidly adapting to new printing technologies. Woodburn’s daily operations uses UNIX, Macintosh, and Microsoft Windows platform. Thus, upon review
…show more content…
As a result, the internal technology was secured with antivirus software; however, the MIS and Web server were linked to outside lines without similar software protection. In effect the management team could not justify the cost for greater protection for network security. Within the initial months of the company’s email policy, consequently, three malicious network attacks happened, affecting email, files, servers, and the network itself. These attacks in total cost the company $15,000.

Woodburn’s network security stance needs to evaluate the idea of a more secure network. The potential cost to resolve attacks has surpassed the network protection cost. In order to minimize costs of future incidents, the company may undergo the strategy of “Avoiding the risk,” by implementing more safeguards and information security or crisis management

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    At Wiltshire + Swain the staff rely heavily on a range of computers with specific software to produce their innovative designs shown below in figure 4. Currently record keeping could be improved with the use of modern software systems at Wiltshire + Swain. With the improvement of mobile technology, client and staff management has become easier as they can be in contact at all times. Drawings and designs can be emailed electronically to clients (potentially interstate clients) via the Internet. Efforts are being made by Wiltshire + Swain to reduce printed documents of drawings and records by holding them electronically on the server.…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The TeaBella Company is a consulting agency that handles a large portion of intellectual property and process to effectively service individuals, groups and other organizations. I selected the organization because I am directly affiliated with the organization, and committed to the assessment of current operational needs and ability to grow within the industry. Consulting agencies are difficult to evaluate due to it being relativity new industry that has boundless capabilities when paired with the evolution of technology. TeaBella ability to utilize, cellphones, laptops, operating systems like IOS, Microsoft, QuickBooks, workdays, Taleo and have the ability to construct multiple kinds of publications using Adobe, Photoshop and Publishing Aspect. Being a versatile company offer support systems for multiple industry can only encourage global impact, offer an unlimited resource of system process to companies, individual, and person.…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Vulnerability Assessments

    • 1747 Words
    • 7 Pages

    Introduction I. Vulnerability Assessments (Or “What do we have of value that must be protected?”) A. The Company Network Figure 1: Existing Company Network 1. Physical Devices a) The NETGEAR MR814 Wireless Router (all versions) has two key vulnerabilities. First, the MR814 only supports Wired Equivalent Privacy (WEP) encryption to secure traffic sent over the wireless network [1]. WEP has numerous, well documented vulnerabilities and exploits.…

    • 1747 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Jacob Dale, the director of IT department of Sunnylake needs to execute network security training in the entire hospital. Training of the staffs is also required because most of them were from traditional background and had little knowledge about IT. Some of the security fundamentals such as never leave the systems unlocked, enforcing well-built password policy, reset password every 45 days, take out admin rights so that the staff cannot set up software, execute policy to block weak sites. When workers focus on their own duties, they regularly don’t give attention to the following ordinary instructions for network security. Employees might accidentally guide to other security susceptibilities, as well as the unforeseen reception and spreading of computer viruses.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays