Free Essay

Richmond Investments Security Outline

In:

Submitted By studfred
Words 315
Pages 2
Richmond Investments Security Outline

User Domain: * Establish an Acceptable Use Policy that clearly defines access rights * Educate and inform your employees of their responsibilities and duties that must be performed * Perform a thorough background investigation on new employees
Workstation Domain: * Install current anti-virus protection software * Install the latest software, security patches and system configurations * Make sure logon ID’s and passwords are compliant with company policy
LAN Domain: * Apply proper permissions to servers, directories and folders * Use unshielded twisted-pair or comparable wiring that complies with IEEE standards * Make sure switches and routers are properly placed and applied * Use current NIC cards and apply interface security * Use company access rights in management of physical components and wireless access points

LAN to WAN: * Apply web content filter * Apply email content filter and quarantine system * Use IPS and IDS security systems * Apply the use of a proxy server and closing ports not in use * Encrypt files and packets when using TCP and UDP * Proper use of IP Stateful Firewalls * Use of SSH for secure encrypted transmission
WAN Domain: * Proper router and security appliance management (24x7x365) * Apply dedicated internet access * Observe managed services for customer routers and firewalls * Apply IP Stateful Firewall * Maintain router and equipment management * Use SNMP and encrypted VPN’s
Remote Access Domain: * Use token, biometrics and smartcards for authentications * Encrypt all private data * Use of multiple login lockout procedures * Establish user ID and password policies (changing every 30-60 days) * Use 128 bit encryption SSL * Use HTTPS to secure packet transfers * Use current firmware, operating system software and patches
System/Application Domain: * Encrypt all private and important data * Apply policies, standards and procedures to secure facility * Maintain hardened production server operating systems * Virtual firewalls and server segmentation on separate VLAN’s * Software and web application testing * Separate private data elements into different databases * Daily data backups and off site data storage * Develop a disaster recovery plan

Similar Documents

Premium Essay

Nt2580:Project Part 1

...The following is a multi-layered security plan outline for Richmond Investments that will address general security solutions for the safety of the company’s data and information. The outline will state recommended security solutions for each of the seven domains of the IT infrastructure. User Domain One of the most common vulnerabilities within the User domain is the lack of awareness or concern for employees towards the security policies of the company. To minimize this vulnerability Richmond investment is requiring that all company employees participate in a mandatory refresh security awareness training every four months. These mandatory refresh classes are aimed at educating employees regarding the best practices for opening email, password creation, reminding employees of security policies that might have been overlooked the first time they received their training, and other policies that ultimately can help prevent malicious threats. Workstation Domain The most common vulnerabilities in the workstation domain include unauthorized user access, weaknesses in the software currently installed, and possible introduction to malicious software. To help minimize the risk of unauthorized access, the company will enable password protection on all the devices and recommend that all users lock the computers every time they step of the workstation. In addition, the company’s network administrator will be responsible to keep all software and applications up to date with the latest...

Words: 725 - Pages: 3

Premium Essay

Nt2580 Projectparti

...Multi-Layered Security Plan (MSP) With the ever-increasing access to the internet, and all the ways that information can be exploited, it is imperative that the integrity of company/corporate data/information receive the utmost attention in its protection. That responsibility rests in the hands of capable and competent Internet Technology (IT) professionals, who stay abreast of emerging technologies, to be able to make recommendations to upper management. The sophistication and organization of those intent on breaching systems of today has never been greater, and they will only get better as time goes on. The purpose of this of this outline is to provide necessary information for the Networking Division Monthly Report, aimed at addressing security concerns for the seven domains of IT infrastructure for Richmond Investments. Beginning with the User Domain, the first and most important step to be taken is education of all employees on the Policies and Procedures that are already in place. It is recommended that monthly training take place and be documented. There should also be monthly auditing, to ensure that the training is taking place, who is participating, and that report should be seen by upper management. The Users should be aware of the consequences of violations of the security policy, and they should expect and anticipate that there will be random and routine monitoring of their actions. Actions to protect the Workstation Domain is also a critical link, since...

Words: 796 - Pages: 4

Premium Essay

No Need to Upload a Paper

...the United States have failed and presently continue to do so. With the closures of these banks, jobs were lost; and the economy has suffered greatly. The banking crisis of 2007 has been considered the largest since the Great Depression. Many researchers, policymakers, economists, and other individuals blame the subprime mortgage market and its collapse for triggering the U.S crisis; many also wonder how such a relatively small market as subprime could cause so much trouble around in the U.S, especially financial institutions that did not get involved with subprime lending or with investment in subprime securities. This paper analyzes financial and economic circumstances associated with the United States financial turmoil that has led to the banking crisis. Section 1 analyzes the collapse of the subprime mortgage market in the United States and outlines factors associated with it. Section 2 outlines the economic factors that led to the banking crisis in 2007. Section 3 summarizes suggestions of research about how to remedy the current crisis and possibly avoid crises in the future. Section 4 will discuss the conclusion of the research. The first signs of the subprime mortgage market collapse in the United States were very high and unusual even for subprime market delinquency and foreclosure rates for mortgages originated in 2006 and 2007. Reinhart and Rogoff (2008b). High rates of foreclosures, declining home values, borrowers' impaired credit histories, destabilized neighborhoods...

Words: 2989 - Pages: 12

Free Essay

Client and Server Security

...Project Outline 3 Security Requirements 4 Perimeter Security 5 Client and Server Security 10 Database Security 10 Server Security 12 Wireless and Remote Access Security 15 Security Configuration Management 19 References 23   Project Outline Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees is located in Columbus, Georgia, and employs 10 people full time, and 4 persons part time. The third location is located in Washington, DC, and employs 15 people. The fourth location located in Richmond, Virginia is the smallest of all the locations employing 5 persons full time. Tiger Tees is a fast growing company in dire need of a secure network that will ensure that the confidentiality, integrity, and availability of client information remain confidential. All transactions completed are sent to the organizational headquarters in Beckley, WV and processed there. In the past these orders and transactions have been completed by telephone and e-mail. A secure wide area network would streamline this process making the transactions more secure, and providing faster service to the customers.   Security Requirements ...

Words: 5336 - Pages: 22

Premium Essay

Financial Analysis

...Classroom: Friend 006 Course description: This course covers asset management focusing on quantitative models applied to equities and bonds (with emphasis on mortgage-backed securities). The quantitative models discussed are asset allocation models and portfolio construction models that include optimization models (mean-variance framework and extensions such as robust portfolio optimization), multi-factor risk models, risk control models, and transaction cost forecasting models. Return attribution models for performance evaluation will be covered. Model risk and model/strategy backtesting will be highlighted. Guest speakers from quantitative asset management firms are scheduled. Determination of final grade: Final exam ………………………………. 40% Design project …………………………… 25% Term paper ………………………………. 25% Problem sets ……………………………… 10% Course material and reading assignments: No textbook is required for the book. Instead, the sources for the reading assignments will be (1) articles available from journals that Princeton subscribes, (2) free downloads from the Internet, and (3) material I have prepared for the course. There will be a list posted on Blackboard that will provide the material assigned. I suggest that you download the articles and create a folder with the readings. Updating the course outline:...

Words: 4794 - Pages: 20

Premium Essay

Beyond the Bean Case

...possibilities of opening a potentially successful café with a very unique concept, namely a board game café called “Beyond the Bean”. The café will be located in London, Ontario, and will be owned by two partners. With this report, information and advice is given on every aspect that is essential for a successful launch. The mission of Beyond the Bean is to serve the finest coffee and beverages in a home-like atmosphere, together with the opportunity of playing board games for an hourly charge. This will provide a great opportunity for students and young professionals to socialize and network in a very relaxed manner and atmosphere. A great benefit for Beyond the Bean is that it will not need financing to be able to launch, as financial security is provided with a starting capital of $60,000. From this amount, the two partners bring in $40,000, whereas the other $20,000 is a loan obtained from family members. Estimates show that the company will start generating profit after three months, resulting in a reasonable income from operations after one year. This will enable the owners to pay back the family loan within three years. Beyond the Bean will target the students of the Fanshawe College, the Western...

Words: 7383 - Pages: 30

Premium Essay

Master

...This report is about the RFID project written for evaluation and implementation of project applicability for Officeworks Company. This RFID project for Officeworks is examined and finally decided for Officeworks. In this report, the background of both development of RFID and situation of the business case of Officeworks are given; team work and team roles are assigned as well as the project schedule is planned and executive; the following sections of analysis and solution are involved: team requirements, project scope and assumptions, project drivers and strategies as well as enabler, complementary and competing initiatives, strategic and economic benefit, investment requirements, outsourcing plan, and implementation roadmap. It is concluded that the RFID project is generally valuable and able to be implemented for Officeworks Company ranged stores. Some useful suggestion to successfully construct the RFID into Officeworks is also recommended. Based on the successful experience of Wal-Mart, the RFID is detailed analysed with suitable solutions given. To completely evaluate the project, the ROI model and vertical comparison are also used for the cost/benefit examinations. As the suggested implementation, implementing work flow with detailed sub-steps is developed as well. Table of Content 1. Introduction 1 1.1. Background of RFID 1 1.1.1. Definition and description of RFID 1 1.1.2. RFID technique and history 1 1.2. Background of Officeworks 1 1.3. Project Initiation 1 1.3.1....

Words: 5982 - Pages: 24

Premium Essay

Lakeside Case Book

...The Lakeside Company Case Studies in Auditing Twelfth Edition John M. Trussel Dalton State College J. Douglas Frazer Millersville University Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Donna Battista Acquisitions Editor: Stephanie Wall Editorial Project Manager: Christina Rumbaugh Senior Managing Editor: Cynthia Zonneveld Production Project Manager: Carol O'Rourke Senior Operations Supervisor: Diane Peirano Printer/Binder: BindRite Graphics, Robbinsville Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Copyright © 2012, 2008, 2005, 2003 by Pearson Education, Inc., publishing Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290...

Words: 48183 - Pages: 193

Premium Essay

Business Plan

...ROAD MAP TO SUCCESS Exercise Workshop Objectives By the end of this exercise, you should be able to: • Understand the role of the business plan. • List several reasons for developing a business plan. • Identify sources where you can get help in developing a business plan. • Identify the type of information to include in the business plan. • Prepare an outline for a business plan. All SBA programs are provided to the public on a nondiscriminatory basis. www.ebusinesshelpcenter.com Thousands of eBusiness & eMarketing eBooks 100% Free Downloads Plus Resources To Guarantee Your Success With Your New Or Existing Online Business Free Website Hosting Free Traffic Generators Free Advertising Free Ebook Compilers Free HTML Editors Free FTP Software Free Email Auto-Responders Free Bulk Email Software Free Up-to-Date 80 Million Opt-In Email Lists Free Web Positioning Tips Free Ready to Go Turnkey Websites Free Replicate Any Website Free Tutorials for Everything Free Web Page Creators Small one-time lifetime membership fee then everything is FREE!!! BUSINESS PLAN OUTLINE Below is an outline for a business plan. Use this model as a guide when developing the business plan for your business. Elements of a Business Plan 1. Cover sheet 2. Statement of purpose 3. Table of contents I. The Business A. Description of business A. Marketing B. Competition C. Operating procedures D. Personnel E. Business insurance G. Financial data II. Financial...

Words: 7807 - Pages: 32

Premium Essay

Scavenger Hunt Questions and Answers

...educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the University any student at any time, if it is deemed by the University to be in the best interest of the University, the University community, or the student to do so. The provisions of this publication are subject to change without notice and nothing in this publication may be considered as setting forth terms of...

Words: 130938 - Pages: 524

Premium Essay

Form

...educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the University any student at any time, if it is deemed by the University to be in the best interest of the University, the University community, or the student to do so. The provisions of this publication are subject to change without notice and nothing in this publication may be considered as setting forth terms...

Words: 149595 - Pages: 599

Free Essay

Ifsm

...issued by the Virginia Department of Motor Vehicles (DMV) for the purpose of seeking solutions to address the requirements of the DMV CSI Systems Redesign effort as identified in the attached RFP. An original proposal, signed by your contractually binding authority, with 7 full copies and 2 redacted copies, must be received by DMV Contracts and Procurement Department no later than 3:00 p.m. local time on Tuesday, December 4, 2007. An optional pre-proposal conference will be held at DMV Headquarters, 2300 West Broad Street, Richmond, Virginia, Room 702, on Tuesday, October 2, 2007 at 10:00 a.m. local time. Please refer to RFP Section VII for additional information. All questions or inquiries regarding this RFP must be received by Wednesday, October 31, 2007 at 5:00 p.m. local time and must be submitted in writing exclusively to: Nancy M. Davis, CPPB, CPPO, VCO Contracts and Procurement Manager Department of Motor Vehicles Room 319 2300 West Broad Street Richmond, VA 23220 E-mail: nancy.davis@dmv.virginia.gov Fax: (804) 367-0046 All inquiries must be submitted electronically as indicated in the RFP. Please refer to RFP Section VII for additional information. No verbal inquiries will be accepted. From the date of issuance of this RFP until the selection of a Contractor is announced, all questions concerning any part of this RFP shall be directed to Nancy M. Davis. It is not permissible for any Offeror, or any entity working on behalf of an Offeror, to solicit information from any...

Words: 37401 - Pages: 150

Premium Essay

The Role of Finance in the Economy: Implications for Structural Reform of the Financial Sector

...households to purchase homes without saving the entire cost in advance, and governments to smooth out their spending by mitigating the cyclical pattern of tax revenues and to invest in infrastructure projects. Banks directly provide a substantial amount of credit in the U.S., but, unlike in almost any other economy, financial markets are the ultimate providers of most credit. Liquidity provision. Businesses and households need to have protection against unexpected needs for cash. Banks are the main direct providers of liquidity, both through offering demand deposits that can be withdrawn any time and by offering lines of credit. Further, banks and their affiliates are at the core of the financial markets, offering to buy and sell securities and related products at need, in large volumes, with relatively modest transaction costs. This latter role is particularly important in the U.S., given the dominance of markets, but is often under-appreciated. Risk management services. Finance allows businesses and households to pool their risks from exposures to financial market and commodity price risks. Much of this is provided by banks through derivatives transactions. These have gotten a bad name due to excesses in the run-up to the financial crisis but the core derivatives activities provide valuable risk management services. Many argue that...

Words: 15756 - Pages: 64

Premium Essay

Assessing Information Technology General Control Risk: an Instructional Case

...ISSUES IN ACCOUNTING EDUCATION Vol. 24, No. 1 February 2009 pp. 63–76 Assessing Information Technology General Control Risk: An Instructional Case Carolyn Strand Norman, Mark D. Payne, and Valaria P. Vendrzyk ABSTRACT: Information Technology General Controls (ITGCs), a fundamental category of internal controls, provide an overall foundation for reliance on any information produced by a system. Since the relation between ITGCs and the information produced by an organization’s various application programs is indirect, understanding how ITGCs interact and affect an auditor’s risk assessment is often challenging for students. This case helps students assess overall ITGC risk within an organization’s information systems. Students identify specific strengths and weaknesses within five ITGC areas, provide a risk assessment for each area, and then evaluate an organization’s overall level of ITGC risk within the context of an integrated audit. Keywords: internal controls; general control; ITGC; risk assessment. INTRODUCTION he Sarbanes-Oxley Act (SOX 2002) and the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (PCAOB 2007) require that the organization’s chief executive officer (CEO) and chief financial officer (CFO) include an assessment of the operating effectiveness of their internal control structure over financial reporting when issuing the annual report. External auditors must review management’s internal control assessment as part of an annual integrated audit...

Words: 6299 - Pages: 26

Premium Essay

Gaurav

...9690010114 Yogendera sharma CONTRIBUTED PAPERS A41, Thursday, December 28, 4:00-5:30 P.M. Session: Case Studies - I Session Chair: Prashant Kulkarni Institute of Finance and International Ma 418 Global Marketing and Challenges for Future: Franchising in Banks K. Ravichandran, Gandhigram Rural University, drkravichandran@yahoo.co.in R. Muruganandham, Sudharsana Raamanujan, R, P. Nandakumar, M. Sasi Siddharth Thiagarajar College of Engineering, vr_muruganandham@hotmail.com, siddharth_mss@sify.com raamanujan@gmail.com, nandacivil@gmail.com The global economic scenario is undergoing a major innovative metamorphosis at a rate never experienced before. All organizations have their brands to face the global marketing challenges to secure a role of leader in this state of economic revolution. Our paper identifies the current marketing challenges and global economic threats for service industries. Besides our paper also explores the management strategies to overcome these challenges in the liberalized economy. The banking service is considered, where the franchising marketing strategies, introduction of new products and delightful customer service by new private sector banks and foreign banks pose a serious threat to the existence and survival of public sector banks profitwise. Hence our paper deeply discusses the benefits of e-banking with a view to minimize transaction cost cum operating expenses thereby increasing the overall net profit...

Words: 23823 - Pages: 96