Verified Document

Security Failures And Preventive Measures Summary Of Essay

Security Failures and Preventive Measures Summary of the Case

The Sequential Label and Supply company is a manufacturer and supplier of labels as well as distributor of other stationary items used along with labels. This company is shown to be growing fast and is becoming highly dependent on IT systems to maintain their high end inventory as well as the functioning of their department.

The case started with the inception of a troubled employee who called up the helpdesk agent to resolve the issue he is facing. Likewise, other employees start calling in to launch similar complaints. Later, the technical support help desk employee, while checking her daily emails, accidentally opened an untrusted source file sent from a known work colleague. This led to a number of immediate problems in her network computer which led to her being not able to access the information over the network and the call management software that she used to work upon stopped functioning. It was then found out the other day that their office systems were hit by a worm and they had to end up restoring their entire systems for their timely retrieval.

The CEO of the company called in a meeting to discuss this issue with their CIO -- Chief Information Officer in order to brainstorm and ensure that such attacks by worms and viruses are not repeated. The CIO offered a long-term solution which included the involvement of information security in this process. Charles, the person who was called in by the CIO to discuss the avenue of information security, told the CEO that he studied the business function of his company and realized the fact that any failure in the computer systems led to a huge...

Charles suggested that the solution to this issue is not pertaining to computer security only but is rather more related to the information security process, for which an entire risk management program needs to be executed. Charlie brought in an entire proposal plan to the CEO which was approved by their audit meeting. This led to a successful installation of information security software as well as Charlie's promotion as a Chief Information Security Officer.
Problems faced:

The SLS Company, during the attack from the worm, faced the following problems:

The breach in the information system

The Trojan and Worms had invaded the systems that were making the existing data insure

The Computers in the network started to respond slowly

Workstations' internal resources were being occupied by the worms that led to more problems

The call attendants were not able to service their clients properly

Not all calls were attended properly due to the slowness of the system

Customer Relationship Management policy through which Amy had to say the name of the caller was not being followed due to the slowness of the system

3. Statement of the Problem

The Trojans and worms that entered into the company's network were disturbing the internal processes of the entire system. The software systems that were important nodes of the business processes were badly affected due to which business policies were violated and timely service to clients was not possible. Employees were not able to perform to their complete potential because of the slowness of…

Sources used in this document:
References

Baker, W. (2007). Is information security under control?: Investigating quality in information security management, Security & Privacy, retrieved October 14, 2011 from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4085592

Chapin, D. (2005). How can security be measured, information systems control journal, retrieved October 14, 2011 from http://naijaskill.com/cisa2006/articles/v2-05p43-47.pdf

McAdams, A. (2004). Security and risk management: a fundamental business issue: all organizations must focus on the management issues of security, including organizational structures, & #8230;, Information Management Journal, retrieved October 14, 2011 from http://www.freepatentsonline.com/article/Information-Management-Journal/119570070.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

School Safety and Security Plans
Words: 3145 Length: 12 Document Type: Term Paper

"It was tested on almost 600 kids in a desegregated Indianapolis middle school where there are a lot of aggressive kids," Bosworth says. "Those who used the computer were more aware of their own coping strategies and violence presentation. They also showed a decrease in the belief that violence was a way to solve problems" (quoted in Singer at p. 41). Peacemakers Program. Violence Prevention for Students in Grades Four

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Occupational Health, Safety Risks, and Hazards Identified in a Student...
Words: 8588 Length: 30 Document Type: Essay

NEBOSH Unit D According to the Health and Safety Executive (HSE), the cost of workplace injuries and disease is in excess of $20 billion dollars per year. Obviously, these figures are alarming and would suggest that Occupational Health and Safety (OHS) should be a top priority for management. However, a survey from 2011 revealed that many companies have no written OHS policy and nearly half have no formalized occupational health and

Air Traffic
Words: 28110 Length: 102 Document Type: Thesis

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now