What is block ownership? How does it affect corporate governance?

What is block ownership? How does it affect corporate governance?

Suppose you decide (as did Steve Jobs and Mark Zuckerberg) to start a company. Your product is a software platform that integrates a wide range of media devices, including laptop computers, desktop computers, digital video recorders, and cell phones. Your initial market is the student body at your university. Once you have established your company and set up procedures for operating it, you plan to expand to other colleges in the area and eventually to go nationwide. At some point, hopefully sooner rather than later, you plan to go public with an IPO and then to buy a yacht and take off for the South Pacific to indulge in your passion for underwater photography. With these issues in mind, you need to answer for yourself, and potential investors, the following questions.

What is an agency relationship? When you first begin operations, assuming you are the only employee and only your money is invested in the business, would any agency conflicts exist? Explain your answer

If you expanded and hired additional people to help you, might that give rise to agency problems?

Suppose you need additional capital to expand and you sell some stock to outside investors. If you maintain enough stock to control the company, what type of agency conflict might occur?

Suppose your company raises funds from outside lenders. What type of agency costs might occur? How might lenders mitigate the agency costs?

Suppose your company is very successful and you cash out most of your stock and turn the company over to an elected board of directors. Neither you nor any other stockholders own a controlling interest (this is the situation at most public companies). List six potential managerial behaviors that can harm a firm’s value.

What is corporate governance? List five corporate governance provisions that are internal to a firm and are under its control.

What characteristics of the board of directors usually lead to effective corporate governance?

List three provisions in the corporate charter that affect takeovers.

Briefly describe the use of stock options in a compensation plan. What are some potential problems with stock options as a form of compensation?

What is block ownership? How does it affect corporate governance?

Briefly explain how regulatory agencies and legal systems affect corporate governance.

The post What is block ownership? How does it affect corporate governance? appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Potential Issues and Risks for Wi-Fi Environments

Potential Issues and Risks for Wi-Fi Environments

Information Security Assignment

Computer Science homework help
Information Security Assignment
REAL-TIME INTEGRATION SYSTEMS

Computer Systems Security Foundations Week 3: Access Controls and Security

Mechanisms

[Pick the date]

This document contains information and typical analyses that Real-Time Integration Systems must conduct to ensure compliance with recent initial public offering (IPO) requirements and to ensure the security of the company infrastructure. In addition to ensuring compliance to the Sarbanes-Oxley requirements, the company is also considering expanding the network infrastructure to allow employee flexibility (yet sound security) in the area of network connectivity through the introduction of a wireless network. The company will evaluate the risks and the current and future network infrastructure and enterprise systems, as well as the access control policies currently in use. Within the analysis of the technical review, Real-Time Integration Systems will ensure a proper security program is in place and that policies and procedures are updated and accurate.

Table of Contents

Project Outline and Requirements (Week 1) …………………………………………………………………………………… 1

Organization Description ………………………………………………………………………………………………………….. 1

Project Requirements ………………………………………………………………………………………………………………. 1

Introduction to Information Security (Week 1) ……………………………………………………………………………….. 3

The Need for Information Security …………………………………………………………………………………………….. 3

Potential Issues and Risks for Wi-Fi Environments ……………………………………………………………………….. 3

Security Challenges of Allowing Consultants to Work On-Site ……………………………………………………….. 3

A Review of the Sarbanes-Oxley Requirements …………………………………………………………………………… 3

Security Assessment (Week 2) ………………………………………………………………………………………………………. 4

Current Assets …………………………………………………………………………………………………………………………. 4

Analysis of Current Network Topology and Risks …………………………………………………………………………. 4

Risk Assessment Methodology ………………………………………………………………………………………………….. 5

Risk Mitigation ………………………………………………………………………………………………………………………… 6

Access Controls and Security Mechanisms (Week 3) ……………………………………………………………………….. 7

Access Controls of Existing Applications ……………………………………………………………………………………… 7

The Application List From Week 2 With Needed Access Controls (Examples): ……………………………… 7

Access Controls to the Wi-Fi Network ………………………………………………………………………………………… 7

Network Authentication Schemes ……………………………………………………………………………………………… 8

Single Sign-On ……………………………………………………………………………………………………………………… 8

Virtual Private Networks ……………………………………………………………………………………………………….. 8

Software and Database Security (Week 4) ……………………………………………………………………………………… 9

Regulatory Requirements of Sarbanes-Oxley …………………………………….. Error! Bookmark not defined.

Polices ………………………………………………………………………………………….. Error! Bookmark not defined.

Controls ………………………………………………………………………………………… Error! Bookmark not defined.

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Data-at-Rest ………………………………………………………………………………. Error! Bookmark not defined.

Data-in-Motion ………………………………………………………………………….. Error! Bookmark not defined.

Network Security (Week 5) …………………………………………………………………………………………………………. 10

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Intrusion Detection Systems ………………………………………………………… Error! Bookmark not defined.

Intrusion Prevention Systems ………………………………………………………. Error! Bookmark not defined.

References ……………………………………………………………………………………………………………………………….. 11

Computer Systems Security Foundations

Organization Consultants Page 1

Project Outline and Requirements (Week 1)

Organization Description Real-Time Integration Systems is a publicly traded company based in San Jose, California that offers customized solutions to customers and clients. The main focus for Real-Time is the creation of solutions based on integrating the various systems that are used in the customers’ offices so that they can have a single management interface for all systems and applications. Real-Time has 100 employees. About one third is internal company-based support, and two thirds of the employee base is consulting staff working on the customized solutions. The company recently underwent an IPO, and as such, now has additional regulatory requirements that it must meet. Talking with the company’s chief information officer (CIO) and chief financial officer (CFO), they admit that the recent IPO has added additional pressures for their company. They now must meet additional regulatory requirements.

The consulting staff typically meets with the customer to gather the system requirements and then returns home to the Real-Time facilities to create the integration solutions. A major problem that the consultants face is network resources. The office spaces that are allocated to the consulting team offer cubicles with limited network access. The consultants need a more flexible solution for connecting to the Real-Time network. Real-Time wants to implement a secure solution that ensures the privacy of the communications and company data as well as giving the consultants the flexibility to connect to the network and move around and interact and conference with other consultants.

Project Requirements As Real-Time starts the project, the leaders realize that their current infrastructure is not as secure as they thought. The original information technology (IT) staff was well-meaning, but at the time of the start-up, they were not as security-conscious as companies are today. As a result, Real-Time wants to ensure the overall security of the existing infrastructure and to isolate the new development infrastructure as much as possible. To begin, the existing network architecture includes a demilitarized zone (DMZ) for the company Web site, file transfer protocol (FTP), and mail servers. The company Intranet is a flat network. All company resources and applications are on the same network with all staff desktops. All company systems are internal (meaning that they outsource no solutions). All systems and applications are housed in the San Jose corporate site in a converted conference room that is now a dedicated data center.

Real-Time does have a concern over the customer systems and data that are brought into the San Jose facility. The customer data and equipment need to be isolated from other customer environments. At no point in time can the data from one customer be stored in the same environment as a different customer. The CIO has made these requirements very clear to the staff. Customer data privacy and security needs to be a top priority.

Proper resources have been allocated for the project, and several key goals have been set:

• Evaluate the regulatory requirements based on the Sarbanes-Oxley Act, and ensure that company security policies are sufficient to meet the requirements.

• Evaluate the security risks in the current environment. • Evaluate the access control methods that are currently in use, and identify newly needed

controls. • Evaluate the need for controls to better protect data both at rest and in motion. • Develop or redesign a secure network solution.

Introduction to Information Security (Week 1) A review of the current infrastructure and security model is needed to ensure compliance with the new Sarbanes-Oxley regulations. Management wants to understand how the regulation impacts the information security posture of the Real-Time Integrations Systems environment. To do so, the following areas need to be better understood by the organization:

• Describe the need for information security • The potential issues and risks that exist and what benefits they can gain from the new wireless

fidelity (W-Fi) project • Describe what new challenges exist with the new project to allow consultants to work on-site • Describe the challenges that now apply to the company with the recent IPO taking place

The Need for Information Security A review of the high level of information security should take place, and then a practical discussion about what it means for organizations like Real-Time Integration Systems needs to take place.

Potential Issues and Risks for Wi-Fi Environments A review of the technical security needs to take place. The focus should be on the extension of a network through the use of wireless technologies.

Security Challenges of Allowing Consultants to Work On-Site A review of the administrative security controls needs to take place. The focus should be on the policies and personal requirements that need to be implemented

A Review of the Sarbanes-Oxley Requirements Sarbanes-Oxley will now affect Real-Time, and there needs to be a discussion about the specific provisions of the regulations that apply to the IT infrastructure.

Security Assessment (Week 2) To conduct a security assessment, the organization needs to understand its environment. This includes asset identification, data classifications, and network topologies. This section will focus on asset identification and network topology and the risks associated with them in the current environments.

Current Assets A list of the enterprise systems that Real-Time Integration Systems relies on to run the day-to-day business activities includes the following systems:

Example Enterprise Systems

System Applications Description Enterprise resource planning (ERP)

Human resources (HR)

Human resources uses this to track employees, managers, assignments, salary, and expenses

ERP Financials Accounts payables, accounts receivables, general ledger Customer relations management (CRM)

Sales and marketing

Tracking of customers and customer projects

Web servers Company public portal

Information and applications used by customers to interact with Real-Time Integration Systems

E-mail server All departments E-mail system used for company e-mail and external communications

Analysis of Current Network Topology and Risks An example diagram for the current network (although not required for submission) could be represented as follows:

Because all machines (user desktops and servers) are on the same network, all connected to the Internet, a security breach on any single machine give hackers direct access to all other servers and devices on the same network. This is highly undesirable. Additional risks should be discussed.

System Risks Web server Accessible to the Internet by design, easy targets for hackers Desktop systems Users are primary targets for social engineers, if

compromised network resources are accessible

If the new Wi-Fi network is added to the existing network, an example diagram could look as follows:

A discussion about the new risks for this model needs to be conducted.

Risk Assessment Methodology The following is an outline of the methodology that can be used for a risk assessment:

• Phase 1: Project Definition • Phase 2: Project Preparation

• Team Preparation • Project Preparation

• Phase 3: Data Gathering • Administrative • Technical

• Physical • Phase 4: Risk Analysis

• Assets • Threat Agents and Threats • Vulnerabilities

• Phase 5: Risk Mitigation • Safeguards • Residual Security Risk

• Phase 6: Risk Reporting and Resolution • Risk Recommendation • Documentation

Risk Mitigation As part of the risk-assessment process, a plan needs to be recommended (and ultimately acted upon). The exact process for dealing with risk varies from company to company based on the risk tolerance. The following should be discussed with respect to handling risk:

 Transfer  Avoid  Reduce  Accept

Access Controls and Security Mechanisms (Week 3) The focus of this section is to examine the access control model of the previously identified applications. A potential review of the existing system could take place, but a proposed final solution needs to take place for each application. A proposed solution for the new Wi-Fi network is also given.

Access Controls of Existing Applications

The application list from Week 2 with needed access controls (examples):

System Proposed Access Control Identification/Authentication Authorization ERP Single sign-on technology (SSO) Role-based access control Desktop Active Directory Role-based access control

Access Controls to the Wi-Fi Network A detailed description of how access controls should be implemented is provided. An example of a network segregation diagram (not required but could be implemented) is as follows:

Active Directory has been included for the potential of desktop and wireless authentication. Additional discussions could take place surrounding the concepts of virtual private network access for wireless clients.

Network Authentication Schemes

Single Sign-On Description of SSO technologies and their use will take place in this section.

Virtual Private Networks Description of VPN technologies and their use will take place in this section.

Software and Database Security (Week 4 TBD)

Network Security (Week 5 TBD)

References

Project Outline and Requirements (Week 1)
Organization Description
Project Requirements
Introduction to Information Security (Week 1)
The Need for Information Security
Potential Issues and Risks for Wi-Fi Environments
Security Challenges of Allowing Consultants to Work On-Site
A Review of the Sarbanes-Oxley Requirements
Security Assessment (Week 2)
Current Assets
Analysis of Current Network Topology and Risks
Risk Assessment Methodology
Risk Mitigation
Access Controls and Security Mechanisms (Week 3)
Access Controls of Existing Applications
The application list from Week 2 with needed access controls (examples):
Access Controls to the Wi-Fi Network
Network Authentication Schemes
Single Sign-On
Virtual Private Networks
Software and Database Security (Week 4 TBD)
Network Security (Week 5 TBD)
References

The post Potential Issues and Risks for Wi-Fi Environments appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Software and Database Security (Week 4 TBD)

Software and Database Security (Week 4 TBD)

REAL-TIME INTEGRATION SYSTEMS

Computer Systems Security Foundations Week 3: Access Controls and Security

Mechanisms

[Pick the date]

This document contains information and typical analyses that Real-Time Integration Systems must conduct to ensure compliance with recent initial public offering (IPO) requirements and to ensure the security of the company infrastructure. In addition to ensuring compliance to the Sarbanes-Oxley requirements, the company is also considering expanding the network infrastructure to allow employee flexibility (yet sound security) in the area of network connectivity through the introduction of a wireless network. The company will evaluate the risks and the current and future network infrastructure and enterprise systems, as well as the access control policies currently in use. Within the analysis of the technical review, Real-Time Integration Systems will ensure a proper security program is in place and that policies and procedures are updated and accurate.

Table of Contents

Project Outline and Requirements (Week 1) …………………………………………………………………………………… 1

Organization Description ………………………………………………………………………………………………………….. 1

Project Requirements ………………………………………………………………………………………………………………. 1

Introduction to Information Security (Week 1) ……………………………………………………………………………….. 3

The Need for Information Security …………………………………………………………………………………………….. 3

Potential Issues and Risks for Wi-Fi Environments ……………………………………………………………………….. 3

Security Challenges of Allowing Consultants to Work On-Site ……………………………………………………….. 3

A Review of the Sarbanes-Oxley Requirements …………………………………………………………………………… 3

Security Assessment (Week 2) ………………………………………………………………………………………………………. 4

Current Assets …………………………………………………………………………………………………………………………. 4

Analysis of Current Network Topology and Risks …………………………………………………………………………. 4

Risk Assessment Methodology ………………………………………………………………………………………………….. 5

Risk Mitigation ………………………………………………………………………………………………………………………… 6

Access Controls and Security Mechanisms (Week 3) ……………………………………………………………………….. 7

Access Controls of Existing Applications ……………………………………………………………………………………… 7

The Application List From Week 2 With Needed Access Controls (Examples): ……………………………… 7

Access Controls to the Wi-Fi Network ………………………………………………………………………………………… 7

Network Authentication Schemes ……………………………………………………………………………………………… 8

Single Sign-On ……………………………………………………………………………………………………………………… 8

Virtual Private Networks ……………………………………………………………………………………………………….. 8

Software and Database Security (Week 4) ……………………………………………………………………………………… 9

Regulatory Requirements of Sarbanes-Oxley …………………………………….. Error! Bookmark not defined.

Polices ………………………………………………………………………………………….. Error! Bookmark not defined.

Controls ………………………………………………………………………………………… Error! Bookmark not defined.

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Data-at-Rest ………………………………………………………………………………. Error! Bookmark not defined.

Data-in-Motion ………………………………………………………………………….. Error! Bookmark not defined.

Network Security (Week 5) …………………………………………………………………………………………………………. 10

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Intrusion Detection Systems ………………………………………………………… Error! Bookmark not defined.

Intrusion Prevention Systems ………………………………………………………. Error! Bookmark not defined.

References ……………………………………………………………………………………………………………………………….. 11

Computer Systems Security Foundations

Organization Consultants Page 1

Project Outline and Requirements (Week 1)

Organization Description Real-Time Integration Systems is a publicly traded company based in San Jose, California that offers customized solutions to customers and clients. The main focus for Real-Time is the creation of solutions based on integrating the various systems that are used in the customers’ offices so that they can have a single management interface for all systems and applications. Real-Time has 100 employees. About one third is internal company-based support, and two thirds of the employee base is consulting staff working on the customized solutions. The company recently underwent an IPO, and as such, now has additional regulatory requirements that it must meet. Talking with the company’s chief information officer (CIO) and chief financial officer (CFO), they admit that the recent IPO has added additional pressures for their company. They now must meet additional regulatory requirements.

The consulting staff typically meets with the customer to gather the system requirements and then returns home to the Real-Time facilities to create the integration solutions. A major problem that the consultants face is network resources. The office spaces that are allocated to the consulting team offer cubicles with limited network access. The consultants need a more flexible solution for connecting to the Real-Time network. Real-Time wants to implement a secure solution that ensures the privacy of the communications and company data as well as giving the consultants the flexibility to connect to the network and move around and interact and conference with other consultants.

Project Requirements As Real-Time starts the project, the leaders realize that their current infrastructure is not as secure as they thought. The original information technology (IT) staff was well-meaning, but at the time of the start-up, they were not as security-conscious as companies are today. As a result, Real-Time wants to ensure the overall security of the existing infrastructure and to isolate the new development infrastructure as much as possible. To begin, the existing network architecture includes a demilitarized zone (DMZ) for the company Web site, file transfer protocol (FTP), and mail servers. The company Intranet is a flat network. All company resources and applications are on the same network with all staff desktops. All company systems are internal (meaning that they outsource no solutions). All systems and applications are housed in the San Jose corporate site in a converted conference room that is now a dedicated data center.

Real-Time does have a concern over the customer systems and data that are brought into the San Jose facility. The customer data and equipment need to be isolated from other customer environments. At no point in time can the data from one customer be stored in the same environment as a different customer. The CIO has made these requirements very clear to the staff. Customer data privacy and security needs to be a top priority.

Proper resources have been allocated for the project, and several key goals have been set:

• Evaluate the regulatory requirements based on the Sarbanes-Oxley Act, and ensure that company security policies are sufficient to meet the requirements.

• Evaluate the security risks in the current environment. • Evaluate the access control methods that are currently in use, and identify newly needed

controls. • Evaluate the need for controls to better protect data both at rest and in motion. • Develop or redesign a secure network solution.

Introduction to Information Security (Week 1) A review of the current infrastructure and security model is needed to ensure compliance with the new Sarbanes-Oxley regulations. Management wants to understand how the regulation impacts the information security posture of the Real-Time Integrations Systems environment. To do so, the following areas need to be better understood by the organization:

• Describe the need for information security • The potential issues and risks that exist and what benefits they can gain from the new wireless

fidelity (W-Fi) project • Describe what new challenges exist with the new project to allow consultants to work on-site • Describe the challenges that now apply to the company with the recent IPO taking place

The Need for Information Security A review of the high level of information security should take place, and then a practical discussion about what it means for organizations like Real-Time Integration Systems needs to take place.

Potential Issues and Risks for Wi-Fi Environments A review of the technical security needs to take place. The focus should be on the extension of a network through the use of wireless technologies.

Security Challenges of Allowing Consultants to Work On-Site A review of the administrative security controls needs to take place. The focus should be on the policies and personal requirements that need to be implemented

A Review of the Sarbanes-Oxley Requirements Sarbanes-Oxley will now affect Real-Time, and there needs to be a discussion about the specific provisions of the regulations that apply to the IT infrastructure.

Security Assessment (Week 2) To conduct a security assessment, the organization needs to understand its environment. This includes asset identification, data classifications, and network topologies. This section will focus on asset identification and network topology and the risks associated with them in the current environments.

Current Assets A list of the enterprise systems that Real-Time Integration Systems relies on to run the day-to-day business activities includes the following systems:

Example Enterprise Systems

System Applications Description Enterprise resource planning (ERP)

Human resources (HR)

Human resources uses this to track employees, managers, assignments, salary, and expenses

ERP Financials Accounts payables, accounts receivables, general ledger Customer relations management (CRM)

Sales and marketing

Tracking of customers and customer projects

Web servers Company public portal

Information and applications used by customers to interact with Real-Time Integration Systems

E-mail server All departments E-mail system used for company e-mail and external communications

Analysis of Current Network Topology and Risks An example diagram for the current network (although not required for submission) could be represented as follows:

Because all machines (user desktops and servers) are on the same network, all connected to the Internet, a security breach on any single machine give hackers direct access to all other servers and devices on the same network. This is highly undesirable. Additional risks should be discussed.

System Risks Web server Accessible to the Internet by design, easy targets for hackers Desktop systems Users are primary targets for social engineers, if

compromised network resources are accessible

If the new Wi-Fi network is added to the existing network, an example diagram could look as follows:

A discussion about the new risks for this model needs to be conducted.

Risk Assessment Methodology The following is an outline of the methodology that can be used for a risk assessment:

• Phase 1: Project Definition • Phase 2: Project Preparation

• Team Preparation • Project Preparation

• Phase 3: Data Gathering • Administrative • Technical

• Physical • Phase 4: Risk Analysis

• Assets • Threat Agents and Threats • Vulnerabilities

• Phase 5: Risk Mitigation • Safeguards • Residual Security Risk

• Phase 6: Risk Reporting and Resolution • Risk Recommendation • Documentation

Risk Mitigation As part of the risk-assessment process, a plan needs to be recommended (and ultimately acted upon). The exact process for dealing with risk varies from company to company based on the risk tolerance. The following should be discussed with respect to handling risk:

 Transfer  Avoid  Reduce  Accept

Access Controls and Security Mechanisms (Week 3) The focus of this section is to examine the access control model of the previously identified applications. A potential review of the existing system could take place, but a proposed final solution needs to take place for each application. A proposed solution for the new Wi-Fi network is also given.

Access Controls of Existing Applications

The application list from Week 2 with needed access controls (examples):

System Proposed Access Control Identification/Authentication Authorization ERP Single sign-on technology (SSO) Role-based access control Desktop Active Directory Role-based access control

Access Controls to the Wi-Fi Network A detailed description of how access controls should be implemented is provided. An example of a network segregation diagram (not required but could be implemented) is as follows:

Active Directory has been included for the potential of desktop and wireless authentication. Additional discussions could take place surrounding the concepts of virtual private network access for wireless clients.

Network Authentication Schemes

Single Sign-On Description of SSO technologies and their use will take place in this section.

Virtual Private Networks Description of VPN technologies and their use will take place in this section.

Software and Database Security (Week 4 TBD)

Network Security (Week 5 TBD)

References

Project Outline and Requirements (Week 1)
Organization Description
Project Requirements
Introduction to Information Security (Week 1)
The Need for Information Security
Potential Issues and Risks for Wi-Fi Environments
Security Challenges of Allowing Consultants to Work On-Site
A Review of the Sarbanes-Oxley Requirements
Security Assessment (Week 2)
Current Assets
Analysis of Current Network Topology and Risks
Risk Assessment Methodology
Risk Mitigation
Access Controls and Security Mechanisms (Week 3)
Access Controls of Existing Applications
The application list from Week 2 with needed access controls (examples):
Access Controls to the Wi-Fi Network
Network Authentication Schemes
Single Sign-On
Virtual Private Networks
Software and Database Security (Week 4 TBD)
Network Security (Week 5 TBD)
References

The post Software and Database Security (Week 4 TBD) appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Computer Systems Security Foundations Week 3: Access Controls and Security

Computer Systems Security Foundations Week 3: Access Controls and Security

REAL-TIME INTEGRATION SYSTEMS

Computer Systems Security Foundations Week 3: Access Controls and Security

Mechanisms

[Pick the date]

This document contains information and typical analyses that Real-Time Integration Systems must conduct to ensure compliance with recent initial public offering (IPO) requirements and to ensure the security of the company infrastructure. In addition to ensuring compliance to the Sarbanes-Oxley requirements, the company is also considering expanding the network infrastructure to allow employee flexibility (yet sound security) in the area of network connectivity through the introduction of a wireless network. The company will evaluate the risks and the current and future network infrastructure and enterprise systems, as well as the access control policies currently in use. Within the analysis of the technical review, Real-Time Integration Systems will ensure a proper security program is in place and that policies and procedures are updated and accurate.

Table of Contents

Project Outline and Requirements (Week 1) …………………………………………………………………………………… 1

Organization Description ………………………………………………………………………………………………………….. 1

Project Requirements ………………………………………………………………………………………………………………. 1

Introduction to Information Security (Week 1) ……………………………………………………………………………….. 3

The Need for Information Security …………………………………………………………………………………………….. 3

Potential Issues and Risks for Wi-Fi Environments ……………………………………………………………………….. 3

Security Challenges of Allowing Consultants to Work On-Site ……………………………………………………….. 3

A Review of the Sarbanes-Oxley Requirements …………………………………………………………………………… 3

Security Assessment (Week 2) ………………………………………………………………………………………………………. 4

Current Assets …………………………………………………………………………………………………………………………. 4

Analysis of Current Network Topology and Risks …………………………………………………………………………. 4

Risk Assessment Methodology ………………………………………………………………………………………………….. 5

Risk Mitigation ………………………………………………………………………………………………………………………… 6

Access Controls and Security Mechanisms (Week 3) ……………………………………………………………………….. 7

Access Controls of Existing Applications ……………………………………………………………………………………… 7

The Application List From Week 2 With Needed Access Controls (Examples): ……………………………… 7

Access Controls to the Wi-Fi Network ………………………………………………………………………………………… 7

Network Authentication Schemes ……………………………………………………………………………………………… 8

Single Sign-On ……………………………………………………………………………………………………………………… 8

Virtual Private Networks ……………………………………………………………………………………………………….. 8

Software and Database Security (Week 4) ……………………………………………………………………………………… 9

Regulatory Requirements of Sarbanes-Oxley …………………………………….. Error! Bookmark not defined.

Polices ………………………………………………………………………………………….. Error! Bookmark not defined.

Controls ………………………………………………………………………………………… Error! Bookmark not defined.

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Data-at-Rest ………………………………………………………………………………. Error! Bookmark not defined.

Data-in-Motion ………………………………………………………………………….. Error! Bookmark not defined.

Network Security (Week 5) …………………………………………………………………………………………………………. 10

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Intrusion Detection Systems ………………………………………………………… Error! Bookmark not defined.

Intrusion Prevention Systems ………………………………………………………. Error! Bookmark not defined.

References ……………………………………………………………………………………………………………………………….. 11

Computer Systems Security Foundations

Organization Consultants Page 1

Project Outline and Requirements (Week 1)

Organization Description Real-Time Integration Systems is a publicly traded company based in San Jose, California that offers customized solutions to customers and clients. The main focus for Real-Time is the creation of solutions based on integrating the various systems that are used in the customers’ offices so that they can have a single management interface for all systems and applications. Real-Time has 100 employees. About one third is internal company-based support, and two thirds of the employee base is consulting staff working on the customized solutions. The company recently underwent an IPO, and as such, now has additional regulatory requirements that it must meet. Talking with the company’s chief information officer (CIO) and chief financial officer (CFO), they admit that the recent IPO has added additional pressures for their company. They now must meet additional regulatory requirements.

The consulting staff typically meets with the customer to gather the system requirements and then returns home to the Real-Time facilities to create the integration solutions. A major problem that the consultants face is network resources. The office spaces that are allocated to the consulting team offer cubicles with limited network access. The consultants need a more flexible solution for connecting to the Real-Time network. Real-Time wants to implement a secure solution that ensures the privacy of the communications and company data as well as giving the consultants the flexibility to connect to the network and move around and interact and conference with other consultants.

Project Requirements As Real-Time starts the project, the leaders realize that their current infrastructure is not as secure as they thought. The original information technology (IT) staff was well-meaning, but at the time of the start-up, they were not as security-conscious as companies are today. As a result, Real-Time wants to ensure the overall security of the existing infrastructure and to isolate the new development infrastructure as much as possible. To begin, the existing network architecture includes a demilitarized zone (DMZ) for the company Web site, file transfer protocol (FTP), and mail servers. The company Intranet is a flat network. All company resources and applications are on the same network with all staff desktops. All company systems are internal (meaning that they outsource no solutions). All systems and applications are housed in the San Jose corporate site in a converted conference room that is now a dedicated data center.

Real-Time does have a concern over the customer systems and data that are brought into the San Jose facility. The customer data and equipment need to be isolated from other customer environments. At no point in time can the data from one customer be stored in the same environment as a different customer. The CIO has made these requirements very clear to the staff. Customer data privacy and security needs to be a top priority.

Proper resources have been allocated for the project, and several key goals have been set:

• Evaluate the regulatory requirements based on the Sarbanes-Oxley Act, and ensure that company security policies are sufficient to meet the requirements.

• Evaluate the security risks in the current environment. • Evaluate the access control methods that are currently in use, and identify newly needed

controls. • Evaluate the need for controls to better protect data both at rest and in motion. • Develop or redesign a secure network solution.

Introduction to Information Security (Week 1) A review of the current infrastructure and security model is needed to ensure compliance with the new Sarbanes-Oxley regulations. Management wants to understand how the regulation impacts the information security posture of the Real-Time Integrations Systems environment. To do so, the following areas need to be better understood by the organization:

• Describe the need for information security • The potential issues and risks that exist and what benefits they can gain from the new wireless

fidelity (W-Fi) project • Describe what new challenges exist with the new project to allow consultants to work on-site • Describe the challenges that now apply to the company with the recent IPO taking place

The Need for Information Security A review of the high level of information security should take place, and then a practical discussion about what it means for organizations like Real-Time Integration Systems needs to take place.

Potential Issues and Risks for Wi-Fi Environments A review of the technical security needs to take place. The focus should be on the extension of a network through the use of wireless technologies.

Security Challenges of Allowing Consultants to Work On-Site A review of the administrative security controls needs to take place. The focus should be on the policies and personal requirements that need to be implemented

A Review of the Sarbanes-Oxley Requirements Sarbanes-Oxley will now affect Real-Time, and there needs to be a discussion about the specific provisions of the regulations that apply to the IT infrastructure.

Security Assessment (Week 2) To conduct a security assessment, the organization needs to understand its environment. This includes asset identification, data classifications, and network topologies. This section will focus on asset identification and network topology and the risks associated with them in the current environments.

Current Assets A list of the enterprise systems that Real-Time Integration Systems relies on to run the day-to-day business activities includes the following systems:

Example Enterprise Systems

System Applications Description Enterprise resource planning (ERP)

Human resources (HR)

Human resources uses this to track employees, managers, assignments, salary, and expenses

ERP Financials Accounts payables, accounts receivables, general ledger Customer relations management (CRM)

Sales and marketing

Tracking of customers and customer projects

Web servers Company public portal

Information and applications used by customers to interact with Real-Time Integration Systems

E-mail server All departments E-mail system used for company e-mail and external communications

Analysis of Current Network Topology and Risks An example diagram for the current network (although not required for submission) could be represented as follows:

Because all machines (user desktops and servers) are on the same network, all connected to the Internet, a security breach on any single machine give hackers direct access to all other servers and devices on the same network. This is highly undesirable. Additional risks should be discussed.

System Risks Web server Accessible to the Internet by design, easy targets for hackers Desktop systems Users are primary targets for social engineers, if

compromised network resources are accessible

If the new Wi-Fi network is added to the existing network, an example diagram could look as follows:

A discussion about the new risks for this model needs to be conducted.

Risk Assessment Methodology The following is an outline of the methodology that can be used for a risk assessment:

• Phase 1: Project Definition • Phase 2: Project Preparation

• Team Preparation • Project Preparation

• Phase 3: Data Gathering • Administrative • Technical

• Physical • Phase 4: Risk Analysis

• Assets • Threat Agents and Threats • Vulnerabilities

• Phase 5: Risk Mitigation • Safeguards • Residual Security Risk

• Phase 6: Risk Reporting and Resolution • Risk Recommendation • Documentation

Risk Mitigation As part of the risk-assessment process, a plan needs to be recommended (and ultimately acted upon). The exact process for dealing with risk varies from company to company based on the risk tolerance. The following should be discussed with respect to handling risk:

 Transfer  Avoid  Reduce  Accept

Access Controls and Security Mechanisms (Week 3) The focus of this section is to examine the access control model of the previously identified applications. A potential review of the existing system could take place, but a proposed final solution needs to take place for each application. A proposed solution for the new Wi-Fi network is also given.

Access Controls of Existing Applications

The application list from Week 2 with needed access controls (examples):

System Proposed Access Control Identification/Authentication Authorization ERP Single sign-on technology (SSO) Role-based access control Desktop Active Directory Role-based access control

Access Controls to the Wi-Fi Network A detailed description of how access controls should be implemented is provided. An example of a network segregation diagram (not required but could be implemented) is as follows:

Active Directory has been included for the potential of desktop and wireless authentication. Additional discussions could take place surrounding the concepts of virtual private network access for wireless clients.

Network Authentication Schemes

Single Sign-On Description of SSO technologies and their use will take place in this section.

Virtual Private Networks Description of VPN technologies and their use will take place in this section.

Software and Database Security (Week 4 TBD)

Network Security (Week 5 TBD)

References

Project Outline and Requirements (Week 1)
Organization Description
Project Requirements
Introduction to Information Security (Week 1)
The Need for Information Security
Potential Issues and Risks for Wi-Fi Environments
Security Challenges of Allowing Consultants to Work On-Site
A Review of the Sarbanes-Oxley Requirements
Security Assessment (Week 2)
Current Assets
Analysis of Current Network Topology and Risks
Risk Assessment Methodology
Risk Mitigation
Access Controls and Security Mechanisms (Week 3)
Access Controls of Existing Applications
The application list from Week 2 with needed access controls (examples):
Access Controls to the Wi-Fi Network
Network Authentication Schemes
Single Sign-On
Virtual Private Networks
Software and Database Security (Week 4 TBD)
Network Security (Week 5 TBD)
References

The post Computer Systems Security Foundations Week 3: Access Controls and Security appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Information Security Assignment

Information Security Assignment

REAL-TIME INTEGRATION SYSTEMS

Computer Systems Security Foundations Week 3: Access Controls and Security

Mechanisms

[Pick the date]

This document contains information and typical analyses that Real-Time Integration Systems must conduct to ensure compliance with recent initial public offering (IPO) requirements and to ensure the security of the company infrastructure. In addition to ensuring compliance to the Sarbanes-Oxley requirements, the company is also considering expanding the network infrastructure to allow employee flexibility (yet sound security) in the area of network connectivity through the introduction of a wireless network. The company will evaluate the risks and the current and future network infrastructure and enterprise systems, as well as the access control policies currently in use. Within the analysis of the technical review, Real-Time Integration Systems will ensure a proper security program is in place and that policies and procedures are updated and accurate.

Table of Contents

Project Outline and Requirements (Week 1) …………………………………………………………………………………… 1

Organization Description ………………………………………………………………………………………………………….. 1

Project Requirements ………………………………………………………………………………………………………………. 1

Introduction to Information Security (Week 1) ……………………………………………………………………………….. 3

The Need for Information Security …………………………………………………………………………………………….. 3

Potential Issues and Risks for Wi-Fi Environments ……………………………………………………………………….. 3

Security Challenges of Allowing Consultants to Work On-Site ……………………………………………………….. 3

A Review of the Sarbanes-Oxley Requirements …………………………………………………………………………… 3

Security Assessment (Week 2) ………………………………………………………………………………………………………. 4

Current Assets …………………………………………………………………………………………………………………………. 4

Analysis of Current Network Topology and Risks …………………………………………………………………………. 4

Risk Assessment Methodology ………………………………………………………………………………………………….. 5

Risk Mitigation ………………………………………………………………………………………………………………………… 6

Access Controls and Security Mechanisms (Week 3) ……………………………………………………………………….. 7

Access Controls of Existing Applications ……………………………………………………………………………………… 7

The Application List From Week 2 With Needed Access Controls (Examples): ……………………………… 7

Access Controls to the Wi-Fi Network ………………………………………………………………………………………… 7

Network Authentication Schemes ……………………………………………………………………………………………… 8

Single Sign-On ……………………………………………………………………………………………………………………… 8

Virtual Private Networks ……………………………………………………………………………………………………….. 8

Software and Database Security (Week 4) ……………………………………………………………………………………… 9

Regulatory Requirements of Sarbanes-Oxley …………………………………….. Error! Bookmark not defined.

Polices ………………………………………………………………………………………….. Error! Bookmark not defined.

Controls ………………………………………………………………………………………… Error! Bookmark not defined.

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Data-at-Rest ………………………………………………………………………………. Error! Bookmark not defined.

Data-in-Motion ………………………………………………………………………….. Error! Bookmark not defined.

Network Security (Week 5) …………………………………………………………………………………………………………. 10

Protecting Data ……………………………………………………………………………… Error! Bookmark not defined.

Intrusion Detection Systems ………………………………………………………… Error! Bookmark not defined.

Intrusion Prevention Systems ………………………………………………………. Error! Bookmark not defined.

References ……………………………………………………………………………………………………………………………….. 11

Computer Systems Security Foundations

Organization Consultants Page 1

Project Outline and Requirements (Week 1)

Organization Description Real-Time Integration Systems is a publicly traded company based in San Jose, California that offers customized solutions to customers and clients. The main focus for Real-Time is the creation of solutions based on integrating the various systems that are used in the customers’ offices so that they can have a single management interface for all systems and applications. Real-Time has 100 employees. About one third is internal company-based support, and two thirds of the employee base is consulting staff working on the customized solutions. The company recently underwent an IPO, and as such, now has additional regulatory requirements that it must meet. Talking with the company’s chief information officer (CIO) and chief financial officer (CFO), they admit that the recent IPO has added additional pressures for their company. They now must meet additional regulatory requirements.

The consulting staff typically meets with the customer to gather the system requirements and then returns home to the Real-Time facilities to create the integration solutions. A major problem that the consultants face is network resources. The office spaces that are allocated to the consulting team offer cubicles with limited network access. The consultants need a more flexible solution for connecting to the Real-Time network. Real-Time wants to implement a secure solution that ensures the privacy of the communications and company data as well as giving the consultants the flexibility to connect to the network and move around and interact and conference with other consultants.

Project Requirements As Real-Time starts the project, the leaders realize that their current infrastructure is not as secure as they thought. The original information technology (IT) staff was well-meaning, but at the time of the start-up, they were not as security-conscious as companies are today. As a result, Real-Time wants to ensure the overall security of the existing infrastructure and to isolate the new development infrastructure as much as possible. To begin, the existing network architecture includes a demilitarized zone (DMZ) for the company Web site, file transfer protocol (FTP), and mail servers. The company Intranet is a flat network. All company resources and applications are on the same network with all staff desktops. All company systems are internal (meaning that they outsource no solutions). All systems and applications are housed in the San Jose corporate site in a converted conference room that is now a dedicated data center.

Real-Time does have a concern over the customer systems and data that are brought into the San Jose facility. The customer data and equipment need to be isolated from other customer environments. At no point in time can the data from one customer be stored in the same environment as a different customer. The CIO has made these requirements very clear to the staff. Customer data privacy and security needs to be a top priority.

Proper resources have been allocated for the project, and several key goals have been set:

• Evaluate the regulatory requirements based on the Sarbanes-Oxley Act, and ensure that company security policies are sufficient to meet the requirements.

• Evaluate the security risks in the current environment. • Evaluate the access control methods that are currently in use, and identify newly needed

controls. • Evaluate the need for controls to better protect data both at rest and in motion. • Develop or redesign a secure network solution.

Introduction to Information Security (Week 1) A review of the current infrastructure and security model is needed to ensure compliance with the new Sarbanes-Oxley regulations. Management wants to understand how the regulation impacts the information security posture of the Real-Time Integrations Systems environment. To do so, the following areas need to be better understood by the organization:

• Describe the need for information security • The potential issues and risks that exist and what benefits they can gain from the new wireless

fidelity (W-Fi) project • Describe what new challenges exist with the new project to allow consultants to work on-site • Describe the challenges that now apply to the company with the recent IPO taking place

The Need for Information Security A review of the high level of information security should take place, and then a practical discussion about what it means for organizations like Real-Time Integration Systems needs to take place.

Potential Issues and Risks for Wi-Fi Environments A review of the technical security needs to take place. The focus should be on the extension of a network through the use of wireless technologies.

Security Challenges of Allowing Consultants to Work On-Site A review of the administrative security controls needs to take place. The focus should be on the policies and personal requirements that need to be implemented

A Review of the Sarbanes-Oxley Requirements Sarbanes-Oxley will now affect Real-Time, and there needs to be a discussion about the specific provisions of the regulations that apply to the IT infrastructure.

Security Assessment (Week 2) To conduct a security assessment, the organization needs to understand its environment. This includes asset identification, data classifications, and network topologies. This section will focus on asset identification and network topology and the risks associated with them in the current environments.

Current Assets A list of the enterprise systems that Real-Time Integration Systems relies on to run the day-to-day business activities includes the following systems:

Example Enterprise Systems

System Applications Description Enterprise resource planning (ERP)

Human resources (HR)

Human resources uses this to track employees, managers, assignments, salary, and expenses

ERP Financials Accounts payables, accounts receivables, general ledger Customer relations management (CRM)

Sales and marketing

Tracking of customers and customer projects

Web servers Company public portal

Information and applications used by customers to interact with Real-Time Integration Systems

E-mail server All departments E-mail system used for company e-mail and external communications

Analysis of Current Network Topology and Risks An example diagram for the current network (although not required for submission) could be represented as follows:

Because all machines (user desktops and servers) are on the same network, all connected to the Internet, a security breach on any single machine give hackers direct access to all other servers and devices on the same network. This is highly undesirable. Additional risks should be discussed.

System Risks Web server Accessible to the Internet by design, easy targets for hackers Desktop systems Users are primary targets for social engineers, if

compromised network resources are accessible

If the new Wi-Fi network is added to the existing network, an example diagram could look as follows:

A discussion about the new risks for this model needs to be conducted.

Risk Assessment Methodology The following is an outline of the methodology that can be used for a risk assessment:

• Phase 1: Project Definition • Phase 2: Project Preparation

• Team Preparation • Project Preparation

• Phase 3: Data Gathering • Administrative • Technical

• Physical • Phase 4: Risk Analysis

• Assets • Threat Agents and Threats • Vulnerabilities

• Phase 5: Risk Mitigation • Safeguards • Residual Security Risk

• Phase 6: Risk Reporting and Resolution • Risk Recommendation • Documentation

Risk Mitigation As part of the risk-assessment process, a plan needs to be recommended (and ultimately acted upon). The exact process for dealing with risk varies from company to company based on the risk tolerance. The following should be discussed with respect to handling risk:

 Transfer  Avoid  Reduce  Accept

Access Controls and Security Mechanisms (Week 3) The focus of this section is to examine the access control model of the previously identified applications. A potential review of the existing system could take place, but a proposed final solution needs to take place for each application. A proposed solution for the new Wi-Fi network is also given.

Access Controls of Existing Applications

The application list from Week 2 with needed access controls (examples):

System Proposed Access Control Identification/Authentication Authorization ERP Single sign-on technology (SSO) Role-based access control Desktop Active Directory Role-based access control

Access Controls to the Wi-Fi Network A detailed description of how access controls should be implemented is provided. An example of a network segregation diagram (not required but could be implemented) is as follows:

Active Directory has been included for the potential of desktop and wireless authentication. Additional discussions could take place surrounding the concepts of virtual private network access for wireless clients.

Network Authentication Schemes

Single Sign-On Description of SSO technologies and their use will take place in this section.

Virtual Private Networks Description of VPN technologies and their use will take place in this section.

Software and Database Security (Week 4 TBD)

Network Security (Week 5 TBD)

References

Project Outline and Requirements (Week 1)
Organization Description
Project Requirements
Introduction to Information Security (Week 1)
The Need for Information Security
Potential Issues and Risks for Wi-Fi Environments
Security Challenges of Allowing Consultants to Work On-Site
A Review of the Sarbanes-Oxley Requirements
Security Assessment (Week 2)
Current Assets
Analysis of Current Network Topology and Risks
Risk Assessment Methodology
Risk Mitigation
Access Controls and Security Mechanisms (Week 3)
Access Controls of Existing Applications
The application list from Week 2 with needed access controls (examples):
Access Controls to the Wi-Fi Network
Network Authentication Schemes
Single Sign-On
Virtual Private Networks
Software and Database Security (Week 4 TBD)
Network Security (Week 5 TBD)
References

The post Information Security Assignment appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order.

Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order.

Use US English

Go to the Federal Trade Commission Website located at http://www.ftc.gov/. Search for Deceptive Advertising. At Results, go to the “More” tab on the top blue bar and from that drop down menu choose “Case.” Select a recent case involving deceptive advertising. 1) Read the Press Release; 2) Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order.

From the FTC case you have selected, analyze the key elements of the case, including the deceptive practice in which the company was engaged, the final decision, and the penalty assessed against the company.

Generate at least two (2) recommendations for how the company involved in the case could have avoided deceptive advertising, including safeguards that should have been in place to prevent the deceptive advertising in question.

The post Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Analyze the key elements of the case, including the deceptive practice in which the company was engaged,

Analyze the key elements of the case, including the deceptive practice in which the company was engaged,

Use US English

Go to the Federal Trade Commission Website located at http://www.ftc.gov/. Search for Deceptive Advertising. At Results, go to the “More” tab on the top blue bar and from that drop down menu choose “Case.” Select a recent case involving deceptive advertising. 1) Read the Press Release; 2) Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order.

From the FTC case you have selected, analyze the key elements of the case, including the deceptive practice in which the company was engaged, the final decision, and the penalty assessed against the company.

Generate at least two (2) recommendations for how the company involved in the case could have avoided deceptive advertising, including safeguards that should have been in place to prevent the deceptive advertising in question.

The post Analyze the key elements of the case, including the deceptive practice in which the company was engaged, appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Slightly Exaggerated

Slightly Exaggerated

Use US English

Go to the Federal Trade Commission Website located at http://www.ftc.gov/. Search for Deceptive Advertising. At Results, go to the “More” tab on the top blue bar and from that drop down menu choose “Case.” Select a recent case involving deceptive advertising. 1) Read the Press Release; 2) Watch the video exhibit (if available); 3) Read the Complaint; 4) Read the Decision and Order.

From the FTC case you have selected, analyze the key elements of the case, including the deceptive practice in which the company was engaged, the final decision, and the penalty assessed against the company.

Generate at least two (2) recommendations for how the company involved in the case could have avoided deceptive advertising, including safeguards that should have been in place to prevent the deceptive advertising in question.

The post Slightly Exaggerated appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

The Quality of Financial Information

The Quality of Financial Information

Howdy Tutors,

I need help with this. Please read properly before accepting bid..plagiarism will be checked.

Part 1:

The Quality of Financial Information

Referencing this week’s readings and lecture, describe the quality issues related to reporting revenue. What is the importance of understanding various inventory valuation methods in determining the quality of reported profits?

Part 2:

Conflicts with GAAP

Even though firms follow the accounting rules (GAAP) when presenting their financial statements, it is still possible for conflicts of interest to exist between what management wants investors and creditors to see and the economic reality of transactions. Explain how this can occur.

Part 3:

Auditing

Auditors have come into a department as part of a company-wide audit prior to issuing an audit opinion for the company’s financial reports. In a one- to two-page paper (not including the title and reference pages), explain what the staff should expect the auditors to do. Be sure to include the requirements of the Sarbanes Oxley Act in your explanation.

Your paper must be formatted according to APA style as outlined in the Writing Center, and it must include citations and references for the text and at least two scholarly sources from the University Library.

The post The Quality of Financial Information appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"