Free Essay

Week 5 Case Study

In: Computers and Technology

Submitted By Jkirby79
Words 765
Pages 4
Week 5 Case Study
Risk Management Policy
By Jovan Kirby
SEC 280
Professor T. Campbell
DeVry University

Risk management is the process of making and carrying out decisions that will minimize the adverse effect of accidental losses upon our company. The risk management process is vital to the personal health and safety of employees and the safety of the public. In financial terms, it is vital to our ability to pursue our goals, commence and operate programs, and to perform duties in an efficient and professional manner. We will implement a plan to cover credit card theft and as well as internal breach of personal company information. Some ways to protect against credit card information being compromised is this. We have implemented some ways such as firewalls, restricted policies, and proxy servers. We will go through each one and explain why and how they will make this company stronger and better. First firewalls using a firewall will help build a strong defense. A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. For example, if a firewall is configured with a rule to block Telnet access, then the firewall will drop packets destined for TCP port number 23, the port where a Telnet server application would be listening. The role of a firewall is to prevent malicious traffic reaching the resources that it is protecting. Some security experts feel this is an outdated approach to keeping information and the resources it resides on safe. They argue that while firewalls still have a role to play, modern networks have so many entry points and different types of users that stronger access control and security at the host is a better technological approach to network security. Now another aspect for this company we believe that restricted policies. This security setting allows an administrator to define two properties for security-sensitive groups (or restricted groups). The two properties are Members and Member Of. The Members list defines exactly who belongs and who does not belong to the restricted group. Both inclusion on the list and exclusion from the list, are enforced. The Member Of list specifies groups in which the restricted group is included. Only inclusion in the Member Of list is enforced, not exclusion: If you remove a group from the Member Of list, the restricted group is allowed to remain a member of the removed group. Now by enforcing this policy we can now control who can go where and who can do what within the company. Next we will conform to proxy servers for the company. In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. The proxy server may exist in the same machine as a firewall server or it may be on a separate server, which forwards requests through the firewall.

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A proxy can also log its interactions, which can be helpful for troubleshooting. The main reasons for using a proxy are anonymity, security, speed and filtering. The client computer is invisible to the Web server; this protects it from malicious attacks and also keeps the client computer anonymous. We touched bases on how to protect the company to keep all information safe within, but how do we secure the attacks that come within. By taking such steps like VPNs, logging and administration, an a auditing system for the company. A virtual private network extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus benefit from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. Using this will minimize information getting out the company we can keep it contain. Logging and administration, logging is the process of reviewing and analyzing the log files that firewalls and intrusion-detection systems accumulate. Administrators scan the log files for intrusion attempts and respond by closing any vulnerable ports or computers that are the targets of those attempts.…...

Similar Documents

Premium Essay

Case Study 5

...Arif, Umer MGMT 303 Mary Ann Bautista Aug 9, 2013 The Temptations of Tempting Case Study 1. A senior manager at a growing business and you’re ready to add employees. Your HR manager has recommended a temp-to-perm policy. You know the advantages of this approach, but what might some of the disadvantages? As a person who has worked many temporary positions, if I had to look at the disadvantages of temp to perm I am not sure what I would say. I think the biggest disadvantage would have to be having to retrain a new person every time someone didn’t work out. The more time you spend training someone the less time you and that person spend doing the job they were hired to do. There also may be a decrease in company morale. If you bring in a temp working putting in the same hours every week and the same amount of hard work as your permanent employees, but they are not getting the same benefits this could lead to problems (Schaefer, 2005). Studies show that there are more safety issues in places where there are a lot of temporary workers hired. It is never safe to assume that a temporary worker is able to work unsupervised no matter how much training they may have (Schaefer, 2005). 2. Assume that you’re a prospective job seeker (which you may very well be). What do you personally see as the advantages and disadvantages of taking a temp-to-perm position? Under what circumstances are you most likely to take a temp-to-perm position? ...

Words: 637 - Pages: 3

Premium Essay

Case Study Week 5

...Case Study Week 5 Eric A Brock DeVry University Case Study Week 5 Before I explain how you can apply risk management to our corporate security policy, I want to take a look at the basics of risk management. The risk management process involves answering three simple questions, what assets do you have that are worth protecting, what are the known threats to those assets, what can you do to keep those threats from actually occurring. When it comes to the assets that are worth protecting, your mind probably immediately jumps to your company's hardware inventory. First, it should educate the company's employees as to what is expected of them regarding cybersecurity (prevention). Second, it should be a guide that dictates the appropriate response to a variety of security incidents. To accomplish these two goals, you need to limit your policy to a manageable size. If you're trying to educate users on security strategies, keep the documentation short and simple. Users will usually ignore anything that's over a couple of pages long or that's overly complex. If you want to get technical, the real asset is your data. Since authentication credentials are the gateway to your data, they should also be treated as an asset that needs protecting. Clearly, passwords can be disclosed by users with no malicious intent. The resulting damage, however, can be just as serious as if the security breach were malicious. Therefore, when making your list of known...

Words: 614 - Pages: 3

Free Essay

Case Study 5

...Case Study 7 DeAngela L. Dixon Deangelaldixon@yahoo.com- GM591-WBREY September 19, 2010 Part I: Group Development Bruce Tuckman developed a four stage model of group development in 1975 he added a fifth stage. The first stage is forming and that is the “getting to know each other” phase. This stage is basic orientation (Schermerhorn, Hunt and Osborn 2010) and the group members identify with other group members. This stage also defines the task and how to approach it. The second stage is storming, “dealing with tensions and defining group tasks “(Schermerhorn, Hunt and Osborn 2010)”. Within this stage group members attempt to organize the task and chaos way occurs. Questions may arise about who is going to be responsible for what, what the rules are, and what the reward system is. The third stage is norming and that is “building relationships and working together “(Schermerhorn, Hunt and Osborn 2010)”. This is the stage where the group members agree on how the group operates and share a sense of group belonging. The fourth stage is performing and that is when the group is “maturing in relationships and task performance” (Schermerhorn, Hunt and Osborn 2010). This is when the group becomes affective in meetings the groups’ objectives. The group is able to handle disagreements and complex problems in a mature manner. The fifth stage is adjourning, “disbanding and celebrating accomplishments “(Schermerhorn, Hunt and Osborn 2010)”. This......

Words: 1009 - Pages: 5

Free Essay

Continental Construction Case Study Week 5

...Continental Construction Case Study Week 5 Abstract When you start a new job you should prepare for all the aspects inclusive of the staff, job layout, trades, and you have to make sure that you have everything clear and communicate any problems that can occur to your management team. This week 5 case study is about a major problem of trust, communication and honesty between the owner, management and the sub-contractor. Lack of communication can open the door not only for failure but also safety concerns. Communications is the most important part of not only construction but in life. The consequences of bad communication are a failure and a red flag on any project. From the beginning of this project communication was the most important issue. Not telling Don Carver the superintendent of the expectations of the job was another issue that was also related to communication. Don does not clearly communicate the needs and issues that are arising to keep John, the Owner's CM, on the same page and aware of the overall status of the project. When the dirt company comes to the site to start working and they saw the amount of work was more than what was communicated by Don they needed to communicate with Don about the scope of work. Once again the lack of communication from the general contractor team to the subcontractor regarding the scope of work that had to be completed was an issue. Don not only has the first bump in the road when......

Words: 711 - Pages: 3

Premium Essay

Mgmt 303 Week 5 Case Study

...Ronald J. Downham MGMT-303 Week 5 Case Study Prof. Mayes 29 Nov 2014 1) What does this case imply about the supply of and demand for employees and the implications for businesses? This study implies that the demand for high quality high tech employees is high and the supply of these employees is low. There are more companies that need these types of employees than there are in the job market. What this does is forces the businesses to become more competitive for good talent. Google is one of the most sought after companies because of these employee perks. Google employees are extremely well fed, getting healthy and varied breakfast, lunch, and even dinner if they stay late, for free. There are also coffee and juice bars scattered throughout the campuses. According to the Management text, “If an employee wants to come to work in cargo shorts, t-shirts, and flip-flops, they do and what attracts many talented employees to companies like these is the fact that they can set their own hours” (Management, 2014). 2) What’s the meaning behind the “search for the purple squirrel” in relation to spotting talent? Is this relevant to non-tech companies, as well? Discuss. A purple squirrel has come to mean the unobtainable. Just as a purple squirrel is almost impossible to find in the forest, the perfect job candidate is so unlikely to occur in real life that they are almost a fantasy. This doesn’t seem to be as relevant in non-tech companies though. Non-tech jobs are more......

Words: 442 - Pages: 2

Free Essay

Case Study Week 5

...QUESTIONS 1. What does this case imply about the supply of and demand for employers and the implications for businesses? The case implies that there is a high demand for employees especially in the high tech industry but the supply is low and has not been met by the volume of the demand making the implications critical for businesses. These organizations are having to step out of the box and go the extra length to ensure they are able to acquire the savvy tech from an early stage. Using tools outside of the normal resume check alongside the educational background, these Companies are able to now “catch them young” by scouting for qualified candidates with needed skills, and recruiting them from colleges instead of waiting till they have completely finished their degree. For instance IBM has made use of its famous Watson computer in certain top schools giving students a chance to challenge the computer. The outcome of these approach will help IBM to narrow down which students to consider and they will work towards luring such students to consider a career at IBM (Robins 2013). As the competition is quite high in this industry, business always have to be creative in their search for talents, be on their toes and pull out all stops in trying to convince potential candidates to choose them instead of their competitors. While some are still struggling to come up with various approach to help them acquire more qualified candidate, the race is still on for the rest in trying to......

Words: 694 - Pages: 3

Premium Essay

Bsop588 Week 5 Case Study

...BSOP588 – Managing Quality Keller School of Management, Miramar, Fl Title: High Quality Auto Manufacturing Company 1. Case Study Title: My proposed high quality small part manufacturing company is Keller Precision Manufacturing. 2. Company Overview 3.1. Company Size We are a small company, roughly 50 employees strong. 3.2. Type of Industry As a contract manufacturer we have worked in various industries including: Medical, Automotive, Electronics, Alternative Energy, Oilfield Instrumentation, Semiconductor And others, offering complete prototype manufacturing, quality metal fabrication, packaging and distribution capabilities. 3.3. Products 3.4. Mission Statement To provide the highest quality manufactured parts to our clients. 3.5. Brief synopsis of Quality management process We've raised the bar on raising the bar. At Keller Precision Manufacturing,, continual improvement and customer satisfaction are the top priorities of every member of our team. Our key overriding goals are to adhere to customer schedules with consistent on-time delivery, to create and sustain an environment that fosters ongoing improvement, to ensure all our products are defect-free, and to refine and develop the skill levels of our employees through constant training. We sweat every detail, no matter how small, to ensure that we deliver the highest quality products for our customers every time. No questions. No excuses. 3. Quality......

Words: 1164 - Pages: 5

Premium Essay

Case Study 5

...Shannen Amanda Dinata BUMT 4910 Dr. Gary Anderson February 18, 2015 Case Study Homework Analysis pg. 350 1. Why did Sandra Nieto turn to micro lending as a source of capital for her business? She turns to micro lending as a source of capital for her business because she has no other choice. She did not have enough money to design. She was an illegal immigrant and she did not have a credit history. Thus, no bank would be willing to lend her money. Also, she learned about micro lending from a friend in Colombia. 2. What factors made Sandra’s company a business that did not qualify for mainstream financing (specifically discuss the C’s of credit)? Banks need to know what we own, what we owe and what our business finances are. There are five C’s of credit and they are collateral, character, capacity, capital and conditions. Collateral includes property or assets that is pledged against the loan that the lender can take and sell of the loan is not repaid. Character is the ability to borrow money and she did not have a credit history. Capacity means that the business cash flow must be sufficient to cover the monthly loan payments. The money she earned from working and selling her work went to daily costs. 3. When, if ever would you advise Sandra to approach mainstream lenders? She should approach mainstream lenders when she has a business plan set up and when she starts earning profit. 4. What challenges and setbacks have Sandra overcome? She has overcome......

Words: 333 - Pages: 2

Premium Essay

Tanglewood Case Study 5

...Tanglewood Case Study 5 Disparate Impact Penny Ross HRM301-F1WW Jennifer Martin October 25, 2015 Tanglewood Case Study 5 Historical Hiring and Promotion Data: Applicant Flows Occupational category | | | Total | White* | Total Non-White | African-American* | Store Associates | External hires | Applicants | 18226 | 15436 | 2790 | 594 | | | Hires | 3832 | 3221 | 611 | 135 | | | Selection ratio | 21.02% | 20.87% | 21.90% 1.04 | 22.73%1.08 | | | | | | | | | | | | | | | Shift leader | External hires | Applicants | 392 | 320 | 72 | 17 |   |   | Hires | 61 | 54 | 7 | 2 |   |   | Selection ratio | 15.56% | 16.88% | 9.72% .61 | 11.76% .74 |   | Internal hires | Applicants | 864 | 712 | 152 | 30 |   |   | Hires | 280 | 241 | 39 | 6 |   |   | Selection ratio | 32.41% | 33.85% | 25.66% .80 | 20.00% .63 | | | | | | | | Department manager | External hires | Applicants | 1242 | 1074 | 168 | 44 | | | Hires | 94 | 82 | 12 | 3 | | | Selection ratio | 7.57% | 7.64% | 7.14%.89 | 6.82%.85 | | Internal hires | Applicants | 589 | 509 | 80 | 21 | | | Hires | 124 | 108 | 16 | 3 | | | Selection ratio | 21.05% | 21.22% | 20.00%.95 | 14.00%.67 | | | | | | | | Asst. store manager |......

Words: 517 - Pages: 3

Premium Essay

Cis 417 Week 5 Case Study 2

...CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. 2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. 3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies. CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion......

Words: 580 - Pages: 3

Free Essay

Case Study # 5

...Case Study # 5 1) The Search engine makes money by having advertisements clicked on the page and through Ad words so when someone clicked a key word Google would get a big percentage. The exportability of a search engine like Google is that they are looking to expand and be known overseas, but at the same time when they do try and expand each culture is different along with the governments (i.e. the French government and USA govt.) With the Business model the exportability was very good (as shown in Exhibit 1) they expanded and teamed up and got “Cost-per-click basis which almost doubled their revenue. 2) Many governments appeared threatened by Google because of a few reasons, first its different cultures so when the USA came into a foreign territory and how we came in they got scared of being dominated by a larger corporation. The next reason is for example in some of these foreign cultures the government saw that the sponsored links are portrayed as trademark counterfeiting. Every country basically did the same thing for instance France sued them for trademark counterfeiting and the court was on Frances side and each made their own search engine to top Google. In Germany they sued Google for using “Gmail” because it was trademarked so they lost that case and had to change the name to Google Mail, and spent a lot of money to create “Theseus” to top Google. In Japan they sued Google for censorship and the government made their own search engine that was $885......

Words: 357 - Pages: 2

Free Essay

Entr 510 Week 5 Case Study

...ENTR 510 Week 5 Case Study Purchase here http://devrycourse.com/ENTR%20510/entr-510-week-5-case-study Product Description ENTR 510 Week 5 Case Study Cadence Design Table of Contents Introduction3 Behavior of actors3 Responsibility of Avant5 Responsibility of underwriter5 Avant’s evaluation6 Corporate death penalty6 Protection measures7 References9 ENTR 510 Week 5 Case Study Purchase here http://devrycourse.com/ENTR%20510/entr-510-week-5-case-study Product Description ENTR 510 Week 5 Case Study Cadence Design Table of Contents Introduction3 Behavior of actors3 Responsibility of Avant5 Responsibility of underwriter5 Avant’s evaluation6 Corporate death penalty6 Protection measures7 References9 ENTR 510 Week 5 Case Study Purchase here http://devrycourse.com/ENTR%20510/entr-510-week-5-case-study Product Description ENTR 510 Week 5 Case Study Cadence Design Table of Contents Introduction3 Behavior of actors3 Responsibility of Avant5 Responsibility of underwriter5 Avant’s evaluation6 Corporate death penalty6 Protection measures7 References9 ENTR 510 Week 5 Case Study Purchase here http://devrycourse.com/ENTR%20510/entr-510-week-5-case-study Product Description ENTR 510 Week 5 Case Study Cadence Design Table of Contents Introduction3 Behavior of actors3 Responsibility of Avant5 Responsibility of underwriter5 Avant’s evaluation6 Corporate death penalty6 Protection......

Words: 450 - Pages: 2

Premium Essay

Bshs 422 Week 5 Final Exam Case Study Guide

...BSHS 422 Week 5 Final Exam Case Study Guide To Buy This material Click below link http://www.uoptutors.com/BSHS-422/BSHS-422-Week-5-Final-Exam-Case-Study-Guide Case Study Esmeralda Trujillo, 35, has lived in your community for six months with her four children, ages 4, 6, 10, and 15. The family is living with relatives in a small house on the outskirts of the city, and they cannot stay there much longer.  In Guatemala, Esmeralda lived with her husband, had a garden that virtually fed the family, and spent part of her time weaving and sewing garments to sell at the local market. Her husband left to look for work “up north” and she has not heard from him for five months.  Esmeralda has a chronic cough and a skin rash. She speaks very little English. She has found occasional work cleaning houses, but it has not been enough to support her and the children. She has come to your agency asking for help and you are her case worker. Your job is to help her obtain the services she needs. Answer each of the following questions in numbered separate paragraphs corresponding to the question. 1). What do you need to find out about Esmeralda and her family in order to create the most comprehensive treatment plan? Consider all important areas that effect Esmeralda and her children’s overall wellbeing based on the information given in the case study. Be specific and identify and list what areas need to be included in Esmeralda’s treatment plan.How will you find out this information? ...

Words: 418 - Pages: 2

Free Essay

Case Study- 5 Stages

...Case Study-Week 3 There are five stages to group development. Many groups are unable to make it to the final stage and find it uncomfortable to work within the group they are in. Also they find it almost impossible to finish the tasks that are expected of them. The five stages are as follows: I. Forming stage- this is the initial stage. The primary concern is the entry of the members of the group. Multiple questions are asked as the members within the group begin to identify with other members and the group itself. The main purpose in this stage is getting to know each other, determining the tasks at hand, defining the group rules, and considering the acceptable behavior within the group. II. Storming stage- The is a period of high emotion and tension within the group and among the members. Hostility and fighting between members may occur and the group may experience changes. Coalitions and Cliques may form within the groups. Outside demands may create tension and pressure. Expectations tend to be clarified and the attention gradually shifts to obstacles standing in the way of the group goals. Group members start to understand one another and efforts are made to accomplish group goals and satisfy individual needs. III. Norming stage- this is the initial integration of the group. The point where the group really begins to come together as a unit. There is a new sense of harmony after the storming stage and members try and maintain a positive......

Words: 1215 - Pages: 5

Premium Essay

Week 5 Case Study: Investment Potential in the Healthcare

...Week 5 Case Study HSM 544 Healthcare Industry The American health care industry is one of the nation's largest and most profitable industries (Healthcare, 2011). The American healthcare industry "has consistently increased its share of GDP from only 7.2% in 1970 to more than 16.0% in 2008" and that figure is still growing (Van Horn, 2010). It is also one of the few American industries that is expected to grow in the next few decades. In fact, the healthcare industry in America is expected to generate 3.2 million new jobs through the year 2018, which is more than any other American industry (Healthcare, 2011). This industry includes everything "from small-town private practices of physicians who employ only one medical assistant to busy inner-city hospitals that provide thousands of diverse jobs" (Healthcare, 2011). It includes things such as doctors' offices, phlebotomy laboratories, research laboratories, outpatient care centers, nursing homes, residential care facilities, clinics of all sizes, and large hospitals (Healthcare, 2011). It is not only a large industry, but a very broad one with many potential investment opportunities and many potential risks. Government and Healthcare The role of government in the healthcare industry is a topic that leads to very active and divisive debate. People are either of greater government involvement or deeply opposed to any government involvement. Currently, healthcare remains an industry with a high degree of regulation, in terms...

Words: 1159 - Pages: 5

Hunter X Hunter 371 | Snow Bride (2013) | Ch.382 : Meeting Eyes