Free Essay

Use of Key Fob

In:

Submitted By martinezvjvv
Words 1104
Pages 5
THE USE OF SECURE IDENTIFICATION 2
Abstract

Organizations today rely on information-sharing processes that are so manually intensive, duplicative, and inefficient that they cannot scale to meet critical computer network defense requirements of speed, agility, relevance, and accuracy. This gap ultimately translates into lost opportunities to avoid serious losses, improve security practices, prevent attacks, and predict threats. The aim of this report is to review the popularity and affordability of Secure Identifications (ID) devices when logging into our work laptops, portable devices, and how staying connected is now easier and safer than ever. Many of us have received an e-mail, either from a web portal we frequent, or from the IT department, telling us that we need to reset our password due to a security breach. In the event of a smash and grab attack that compromises user passwords, having users reset their passwords is one of the first steps in remediation. There’s no question that the old password is now gone, and should most definitely be changed. As employees, we welcome the simplicity of the portable platforms and continue to increase device usage for everything from maintenance, inventory, pay/finance, and professional development learning courses. However, as more personal and sensitive data is available on mobile devices, fraudsters are quickly developing ways to exploit this new platform. A staff survey on the use of Secure Identification on company devices was conducted. The results indicate that the majority of our staff agrees that using a Secure ID for our computer log-in to be more beneficial and secure.

THE USE OF SECURE IDENTIFICATION 3
The Use of Secure Identification:
A Review of the Security Virtually everything against which assets require protection involves people. Digital and physical attacks are all created and carried out by people. It is therefore essential to be able to clearly and accurately identify those who should have access to what belongs to you and the company. Such identification capabilities are carried out by a secure identification (ID) system. Desktop and laptop users must make use of business loaded Secure ID Digital Key software to check all data on their PCS’s, download data or data transferred via CD/DVD disks and portable storage devices. All employees must be logged-in the network servers using secure identification; users must not be allowed to disable such software. Administrators can maintain better control of PC’s by implementing group policies as per departmental functions so that users cannot tamper with configurations. Always make sure that the latest updates/patches for all operating systems and application have been installed thus ensuring any known vulnerabilities have been taken care of. Clearly creating systems that provide protections in addition to, or instead of, passwords are a great way to mitigate this risk, especially if those systems can take only a minor or even negligible dependency on a password provided by the user. In addition to systems such as those, users must also be sufficiently educated on how their password histories enable attackers to predict their next passwords, so that they are aware of just what they lost when a password breach occurs and how they can
THE USE OF SECURE IDENTIFICATION 4 protect themselves, their own personal accounts, and the corporate account to which they have been entrusted with privileged access. Keeping proprietary knowledge away from competitors is essential to maintaining alliance advantage.
Method
This research was conducted by questionnaire and review of staff members that were issued a RSA Secure ID token to use on work computers. A total of 50 questionnaires were distributed. The questionnaire used a scale to assess common workplace sites such as MAXIMO Maintenance, Global Portal, E-Room, and Employee Self Services (ESS) when employees are logged-in securely. Survey collection boxes were located at each work site for a period of six weeks. No personal information was collected; the survey was voluntary and anonymous.
Results
Use of Secure ID Strongly Agree % Agree % Don’t Like % Disagree % Either Way % Easy to use 80 10 5 0 5 Slight problem 4 5 0 90 0 Disruptive 5 5 5 85 0 Safer 85 5 0 10 0
There was a 100% response rate to the questionnaire. A breakdown of the responses is listed below in Table 1. This survey unmistakably shows that every employee surveyed agreed that using Secure Identification is considered to be the safest and most secure source for company and personal information.
Table 1

THE USE OF SECURE IDENTIFICATION 5
Discussion
Applications and users are increasingly distributed. Users demand access to important resources regardless of location or device. These types of security identification systems will allow us to maintain security, extend strong authentication to all of our applications with a single implementation and create stronger access methods that meet our corporate security requirements.
Conclusion
As shown in this report, secure ID systems offer significant benefits for individuals and businesses. Employees using smart ID enjoy greater satisfaction through faster, more convenient and more secure access to information and services. The efficiency and security features provided through the use of smart ID systems would enable our company to enhance security while also improving services and reducing operating costs. Secure identification provides an optimal technology platform for a secure ID system that can meet our business requirements for secure and accurate identification verification.
Recommendations
It is recommended that Computer Science Corporation purchase a "RSA Secured” Integration Kit for each site assigned to this contract. Each kit supports all Secure ID authenticators, hardware tokens, software authenticators, smart phone tokens, SMS-based solutions and more. It also supports Secure ID Authentication, Next Token Code and PIN Reset. Customizable HTML templates are included, allowing organizations to customize the user experience.
THE USE OF SECURE IDENTIFICATION 6
References
Transforming Expectations for Threat-Intelligence Sharing by Kathleen M. Morlarty URL: http://www.emc.com/collateral/emc-perspective/h12175-transf-expect-for- threat-intell-sharing.pdf
The Password Reset Conundrum- by Kenneth Ray,URL:https://blogs.rsa.com/the- password-reset-conundrum/
Smart Card Alliance Report- Secure ID Systems: Building a Chain of Trust, 2004 URL: http://www.library.ca.gov/crb/rfidap/docs/SCA-secure_id_systems.pdf
Action Plan for Small Enterprises by Author: Rashmi Knowles URL: https://blogs.rsa.com/action-plan-for-small-enterprises/
Developing Security Policies for Protecting Corporate Assets by Jasu Mistry; Security Essentials Version 1.2d; URL: http://www.sans.org/reading- room/whitepapers/policyissues/developing-security-policies-protecting-corporate- assets-490?show=developing-security-policies-protecting-corporate-assets- 490&cat=policyissues
RSA FraudAction Research Labs – Speaking of Security; Anatomy of an Attack, 2013 URL: https://blogs.rsa.com/anatomy-of-an-attack/

Similar Documents

Premium Essay

New Product Development

...Description * Benefits of Product * Competitive Analysis * Market Research * Safety and Health within innovation * Development Strategy * Launch Strategy * Reference Page Executive Summary This report was commissioned to recognize the problem at hand of time and money lost by consumers and retailers in the process of enrolling in and paying for retail rewards programs. Member products have recognized this problem. Did you join? The answer right now may be no, however give it time and you will understand why the answer will soon be yes! “ReWards” is an incremental innovative product that is due to release early next year. With ReWards, you will now have the ability to purchase a single, recycled hard plastic key fob which allows you to have one device that acts as your rewards membership card for all retail locations that offers a rewards program. ReWards is a company that originated in Algonquin, Illinois by a retired Army veteran who took note of the excessive amounts of rewards programs there were on the market and the hassle that seemed to go hand in hand with the enrollment and management of each program. ReWards is a fast growing company that has completely eliminated the hassle behind rewards programs! But what is the true problem at hand? Let us think back on our current shopping experiences. When was the last time you were in a retail store? Think of that experience and think back to when you were standing in line to purchase your product...

Words: 2960 - Pages: 12

Free Essay

Order

...information that could lead to further elimination of the insurgent threat in our AO. B.A. ENEMY. 2.2.1. DISPOSITION: Insurgents appear to have established a base of operation in the town of McKenna IOT disrupt the freedom of movement of Coalition Forces responsible for providing security, training, and operational support to the ANA in the AO. The insurgents are currently occupying two buildings on the eastern side of the town, grid GL06528372.They are using one building as a safe house and the other to produce IEDs. This group of insurgents is focused on emplacing IEDs on the MSRs and on any area that has a high concentration of Coalition Forces traffic. They are also using snipers to harass any patrols that are sent off the FOB into the battalion’s area of responsibility. B.B.B.A. COMPOSITION: The Cell of insurgent is estimated at 20 men of ages 20 to 35. They operate in 2-3 men teams. The group has been seen operating 2 x...

Words: 3660 - Pages: 15

Premium Essay

Hot Wheelz Dealership Case Study

...On 05/19/17, I was dispatched to 1601 W. College (Hot Wheelz Dealership) in reference to a disturbance where a male was located on the lot. Dispatch informed me the caller followed the suspect to College and Fort. The caller was holding the male down waiting for officers to arrive. I arrived to find a male (identified as Shawn Crosby) holding down another male (identified as Christopher Doiron). Doiron was on the ground prone not fighting when I had Crosby get up off him. I had Crosby get off Doiron that way I could speak with him. Doiron informed me that he found a bag of keys on the ground at Kansas Expressway and College. He then said, "I guessed the keys most likely went to the dealership across the street." Doiron said, "I went to return...

Words: 842 - Pages: 4

Premium Essay

2222

...CHAPTER LOGISTICS AND THE SUPPLY CHAIN Special logistics staffs handle the mO\'cIllent of items and displays for trade shows and special events. This sleek Mercedes racer is being loaded aboard a KLM Boeing 747. Photo KLM-Ro\'a! Dutch Airline, Photo Archi\es. Reproduced with permission, 2 CHAPTER 1 Logistics and the Supply Chain 3 Key Terms • Channel intermediaries • Phantom freight • Place utility • Possession utility • Postponement • Power retailer • • Reverse logistics Stock-keeping units (SKUs) • Cost trade-offs • Economic utility • FOB destination pricing • FOB origin pricing • Form utility • Freight absorption • Inbound logistics • Landed costs • Logistics • Mass logistics • Materials management • Stock outs • Systems approach • Tailored logistics • Time utility • Total cost approach Learning Objectives • To learn the definition of logistics • To understand the economic importance of logistics • To learn of recent events and their int1uences on logistics practices • To gain an understanding of logistics practices within a firm • To learn different pricing policies • To know about logistics careers ECONOMIC IMPACTS OF LOGISTICS At this point. you may have limited awareness of. and knowledge about, logistics- the subject matter of this textbook. However. if that is the case. you 're really not very different from lots of other people who inhabit this planet. and it might come as a surprise to you that logistics tends to have significant economic...

Words: 8277 - Pages: 34

Free Essay

Opord

...SITUATION: Recent HUMINT sources have indicated that there is a large Insurgent cell operating in the town of McKenna. They are currently occupying two buildings on the eastern side of the town GL06528372. This insurgent cell is focused on emplacing IEDs on the MSRs and on any area with a high concentration of Coalition Force traffic. They also employ snipers to harass friendly patrols in the BN AO. ENEMY FORCES: Composition: The Cell of insurgent is estimated at 20 men of ages 20 to 35. They operate in 2-3 men teams. The group has been seen operating 2 x Toyota pickups and 2 x Mazda sedans. The insurgents have an unknown number of AK-47s, AKMs, RPG-7s, and Dragunov sniper rifles, as well as an assortment of handguns and explosives. Strength: The enemy has the ability to blend in with the local population and an extensive knowledge of its operating environment. Capabilities: The enemy has the ability to displace very quickly and to blend with the local population making it difficult to discern civilians from the insurgents. With the number of men in the cell it is possible for the enemy to affect a formidable defense using the two buildings they are occupying as a strong hold. Most Probable Course of Action: If friendly forces are detected by the enemy prior to the raid of target area the enemy’s most probable course of action will be to attempt to flee the town of McKenna or to attempt to blend in with local population to avoid capture. Most Dangerous Course of...

Words: 1880 - Pages: 8

Free Essay

Wine Industry Report

...for the use of WFA. No part of it may be circulated, quoted or reproduced for distribution outside the addressees without prior written approval from Centaurus Partners. 2 Expert Report on the Profitability and Dynamics of the Australian Wine Industry Centaurus Partners INTRODUCTION AND REPORT CONTENTS The Australian (and global) wine industry is highly fragmented with many different business models, and significant variations in performance. Players within the industry make decisions based on their individual position, strategy and view of economic fundamentals. The intention of this review is to provide facts and perspectives to help WFA determine where it should focus its industry efforts and how it can support individual participants in their decision-making processes. The Report has four sections:   ummary Findings of the Expert Review S   ecommendations for the WFA Board to Consider R   xecutive Summary of the Fact Base Supporting the Findings and Recommendations E  Appendices • Recommended Next Steps for WFA • Overview of Approach, Analysis, and Sources •  dditional Analyses and Exhibits—Available on the WFA Website www.wfa.org.au/review A Segment Definitions. To enable clear evaluation of the Australian wine industry quality segments for grapes and wine were developed and agreed with the WFA Board. There are five segments—A, B, C, D, E/F. The definitions are: Grape Price Domestic Retail Price Export FOB Price ...

Words: 1394 - Pages: 6

Premium Essay

Dirt Bikes Memo

...TO: Carl Schmidt, CEO & Steve McFadden, President and Chief Operating Officer FROM: Raizy Fridman, Management Consultant DATE: November 15, 2015 SUBJECT: Dirt Bikes Knowledge Management CONTEXT Dirt Bikes was founded in 1991 and since then have grown tremendously. They employ over 120 workers, and continue to expand their product line and services offered. They rely on their network of distributors to sell to their retail customers across the globe. Their products are produced with parts from various sellers, and they continually improve upon their services. With all their success, they can definitely use the help of an information system and information technology to improve their organization. Market research has shown that while Dirt Bikes’ management has allowed it to run successfully up until now, they need to update their management information systems if they want to continue their smooth sailing for the remainder of their time. The information world is constantly changing, and Dirt Bikes needs to change with it. While they have many knowledge assets available to them, they need some knowledge assets that are not currently available to them which would provide more business opportunities in the future. PROBLEMS One issue facing the company is the line of communication between employees. The company has a lot of knowledge assets in the fact that their various teams work with each other to design and manufacture the best dirt bikes. They have been doing this...

Words: 1695 - Pages: 7

Premium Essay

Statement of Cash Flows

...activities and focuses on the valuation of inventory. Topics include the items in inventory, costs assigned, costing methods used, and inventory estimation techniques. Chapter 4 focused on the final steps of the accounting process. We explained the importance of proper revenue and expense recognition and described the closing process. We also showed how to prepare financial statements from a work sheet. Larson−Wild−Chiappetta: Fundamental Accounting Principles, Seventeenth Edition 5. Accounting for Merchandising Operations Text © The McGraw−Hill Companies, 2004 Learning Objectives CAP Conceptual Analytical Procedural merchandising activities C1 Describeincome components for aand A1 Compute the acid-test ratio and explain its use to assess liquidity. identify merchandising company. (p. 178) (p. 193) P1 Analyze and record transactions a for merchandise purchases using perpetual system. (p. 180) perpetual system. (p. 185) C2 Identify and explain the inventory asset of a merchandising company. ( p. 179) both perpetual and C3 Describeinventory systems. ( p. 179) periodic C4 Analyze and interpret costaflows and operating activities of...

Words: 23377 - Pages: 94

Free Essay

Nutrition

...the soldier was depressed about being deployed and not having anything to do on the FOB like he would normally do at home. I tried to assure him every day that the FOB would get better and that it worse when we first got there so I took it upon myself to keep the young soldier up under my wing to assure that the deployment would go by fast and he would be home before he know it nut two days he committed suicide and it bothered me because I felt like I could have done more to save the young soldier. Then after that I went to a suicide prevention class and the speaker spoke on how people should relate to the suicide problem that we have in the military and the different resources that we have if we needed to talk to someone that made me better listener because of the guilt that I felt when the soldier committed suicide I felt like I could have listen more or told the young soldier to go to the chaplain instead of trying to take it upon myself to help the soldier out and the speaker made a lot key points for me to take the guilt away that I was feeling talking about the suicide and listening to the speaker help me get over the suicide and also made me a better listener when it comes down to people and what is going on around me because you never know what might on people’s minds and what they are trying to tell you so it is very important to listen and it also made me a very good speaker because I use to be nervous when I get up to talk to people but when I had to get up speak to the...

Words: 403 - Pages: 2

Free Essay

Chemeng Project

...acetic acid. It hydrolyzes in water to yield acetic acid. In its liquid or vapor state, acetic anhydride can irritate body tissues, possibly leading to the death of such tissue. Acetic anhydride melts at –73EC, boils at 139EC, and has a density of 1.080 g/mL at 15EC. It is flammable with a flash point of 54EC. This compound is readily combustible and representsa fire hazard. As the name indicates, an acid anhydride is a compound that is related to an acid by the loss of water. Acetic anhydride can by prepared by the dehydration of acetic acid at 800°C. As with acetic acid, the primary use of acetic anhydride is used in the manufacture of cellulose acetate for films and plastic goods; about 75 percent of the acetic anhydride produced annually in the United States is used for this purpose. Approximately 1.5 percent of the annual acetic anhydride production is used in the synthesis of aspirin. Other uses include the manufacture of industrial chemicals, pharmaceuticals, perfumes, plastics, synthetic fibers, explosives, and weed killers. Because acetic anhydride reacts with water, it is sometimes used as a dehydrating agent in reaction mixtures where removal of water is necessary. Market Overview http://www.orbichem.com/userfiles/CNF%20Samples/aca_13_11.pdf US acetic anhydride prices remained flat in the first half of October, but later in the month market conditions began to change. Spot methanol prices jumped up to 160 c/gal during the week of 21-25 October, and November methanol...

Words: 535 - Pages: 3

Premium Essay

Huffman Truck

...defined. The entities are listed in all capital letters. The entity’s respective attributes are listed below the entity. For example, for the entity “Parts_Inventory_Issues”, the attributes listed in the document are: • Transaction ID • Issue Date • Purchase Price • Quantity In creating the table, the attributes must be examined to ensure that the table is organized logically and contains no chances of redundancy. Because of this, the entities and attributes used in the actual database will be modified from the attributes listed in the document. Repeating attributes will be deleted or reorganized to ensure logical structure. Each table will contain a primary key. The creation of a table will have an added attribute; it will be the table’s primary key. For instance, in the table “Part_Issues”, the primary key will be “Issue_ID.” The attributes “Purchase Price” and “Quantity” will be deleted since that data is present in another table and does not directly relate to part issues. The attribute “Description” will be added...

Words: 968 - Pages: 4

Premium Essay

Tactics of Commercial Activities

...Tactics of Commercial Activities PREPARED BY Saiful Islam Biplob | CAN-150221 | Date of Submission: Dec 07, 2015 Executive summery Exporting is a challenging job in the garments sector. Now it’s an adopting concept in garments industry. In this regard commercials play an important role in the RMG manufacturing company. The Commercial Officer is an executive-level position whose occupant is responsible for the commercial strategy and development of an organization. It typically involves activities relating to marketing, sales, product development and customer service to drive business growth and market share. As a corporate officer position, the commercials generally reports directly to the chief executive officer (CEO) and is primarily concerned with ensuring the integrated commercial success of an organization. The role typically must combine technical knowledge of the relevant field with strong marketing and business development skills. This means that they are closely linked to the organization's strategic management function, in drafting, implementing and evaluating cross-functional decisions that will enable an organization to achieve its long-term objectives. Merchandiser has to understand the buyer’s requirements after receiving specification in the sample order. In many cases, there are modifications pertaining to the specifications in the order to dispatch on time and the right quality. He has to talk with the in-house veterans...

Words: 5381 - Pages: 22

Premium Essay

Huma 2033

...approaching the nation’s appetite for condensed soup products deteriorated. This weakening demand caused the company’s executives to use an assortment of questionable business practices and accounting schemes to enhance the company’s reported earnings. The alleged scams included trade loading, improper accounting for loading discounts, shipping to the yard, and guaranteed sales. In this case, these four main scams represent how Campbell Soup used improper business practices to manipulate its periodic income statements. Pricewaterhouse Coopers (PWC) was the auditor’s for Campbell soup. Campbell offered sizable trade discounts near the end of accounting period to entice customers to make product purchases that they would otherwise defer. By doing so, Campbell Soup not only used price concessions to prop up its reported revenues and profits but they also manipulated the reports on their periodic income statement. During the audit PwC also learned that Campbell recorded some trade discounts as Selling General and Administrative expenses (SG&A) instead of reduction to Gross revenues. However, Campbell officials guaranteed that in the future proper recording of key amounts would be reported in its statement. Campbell also recorded all customer sales on an FOB shipping point basis. In fact, the actual shipping terms for many of Campbell sales were FOB...

Words: 943 - Pages: 4

Premium Essay

Service Request Srkf022

...this reason Kudler is going to implement its own reward program but in its own way. Rather than providing customers with discounts customers will accumulate points. The customer can then purchase rewards from the program with the point he or she had acquired. This incentive program would have to contain a type of tracking device to maintain customer information and purchases. To develop this program a database, application and printed materials need to be designed. The scope of this project is to incorporate a system into or replacing the existing system that will track the current customers and maintain records of their spending at Kudler Fine Foods. The customer will come to the store, purchase products check out at the registers and use his or her Kudler club card to receive their earnings for that purchase. The system will record the items, purchase price and total in a...

Words: 1687 - Pages: 7

Premium Essay

It/244 Week 1

...Associate Level Material Appendix C Introduction Student Name: Philip J. McCarthy UNIVERSITY OF PHOENIX IT/244 INTRO TO IT SECURITY Instructor’s Name: JAMES SERSHEN Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security...

Words: 924 - Pages: 4