Security Plan: Pixel Inc.
About Pixel Inc.
We are a 100-person strong business dedicated to the production of media, most specifically short animations, for advertising clients worldwide. Our personnel include marketing specialists, visual designers, video editors, and other creative staff.
This security plan encompasses the general and pragmatic characteristics of the security risks expected for our business and the specific actions that aim to, first and foremost, minimize such risks, and, if that's not possible, mitigate any damage should a breach in security happen.
Scope
The measures to be taken and the assigned responsibilities stated in this document apply to all the departments that make up the company. Exemptions can be given but will be only under the prerogative of the CEO under the consultation of the Chief Security Officer that will be formally assigned after the finalization of this document. Otherwise, there will be no exception to the security measures stated in this document.
Section 2. Preliminary Assessment
1. Desktops
Each individual in the company is assigned a desktop computer with OS and systems specifications dependent on the nature of work of the personnel. The creative staff uses Apple G5 desktops with OS X installed, while the general staff are assigned Windows XP-enabled workstations. All desktops computers have email, Web, database access, and office productive software installed.
2. Servers
There are servers that are utilized specifically for Internet connection, file and print sharing, email, database and 3D rendering. Twenty (20) dual-core processor Xeon servers running Red hat Linux 9.0 are employed for rendering high-resolution video animations. The database and email servers are on Windows Server 2003 running Microsoft Exchange. The Internet and resource sharing servers (i.e. file and print sharing) run on Red Hat Linux 9.0.
3. Internet and Network connection
A 10 mbps connection on a SOHO firewall doubling as a DHCP server is the primary web access of the company. The firewall secures the network from outside intrusions but allows access via email, web, and secure FTP through the servers. The network is TCP/IP based and utilizes Cisco routers and switches. Guests who use laptop computers could obtain an IP from the DHCP server when needed.
4. Other Hardware Setup
Both Cisco and Hewlett-Packard Ethernet hardware are used in the setup. Server equipment is stored in one server room. Printers are installed in strategic places in the office area.
Assets
Besides the physical property and tangible products in the office, the main assets of the company are primarily:
The animation shorts which are the primary products of the company
Storyboards, drafts, and pre-production materials utilized in the creation of the final animation shorts.
Email and other database-related information that are utilized for company operations, including vendor and client communications, in-house notes, and other pertinent documents.
Records of client and supplier transactions and other financial information
Legal documents
Software and other virtual goods developed within the scope of the company
Access to the assets is determined on a need-to-know basis, with master access only given to the CEO and COO of the company. Departmental access are given to important data or materials that are pertinent to the direct responsibilities of the department.
Section 3. Risks and Priorities
Risks
The following risks are seen as key threats to the company ecosystem:
1. Direct Outside Intrusion (High Risk, High Priority)
Hacking, malware intrusion (e.g. viruses, worms, Trojan horses), and other malicious actions are high risk possibilities for the company given its dependence on the Internet connection. This is an expected threat given the nature of the World Wide Web and the software setup utilized for the business.
Examples: Viruses, Social Engineering, Trojan Horses via email
2. Espionage and Industrial Sabotage (High Risk, High Priority)
Given the nature of the primary products of the company, there is a possibility of theft of intellectual properties, either physical or virtual, with either network-related acts or brick-and-mortar footwork. Aside from this, sabotage could also be a possibility given the competitive nature of the field.
Example: A disgruntled employee obtaining confidential information for a rival company
3. Social and Internal Threats (Low Risk, Medium Priority)
The widespread use of online social networks has made it necessary to be vigilant of the movements of employees, especially for circumstances that increase...
APPLE INC: iPhone Apple Inc.: I Phone The mobile telecommunications industry is considered one most important sector within the community market, which represents half of the 1.1 billion euros they billed annually worldwide (Merkow and Breithaupt, 2006, p66-69) Since the technology created in the 40s of last century, to the art terminals, you can say that the mobile phone has a global history in the sense that its development has slowed or
Samsung Inc. Customer Empowerment: Samsung strives to nurture its customers as brand advocates, particularly on Facebook and Twitter. It uses promotions to encourage customers to market their products beyond their own profiles. In a recent promotion, Facebook fans were required to market the Galaxy phone brand by unlocking hidden pixels about a certain image product in a contest on the Samsung official page, and then recommending the contest to their followers and
It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.
82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now