Verified Document

Security Failures And Preventive Measures Summary Of Essay

Security Failures and Preventive Measures Summary of the Case

The Sequential Label and Supply company is a manufacturer and supplier of labels as well as distributor of other stationary items used along with labels. This company is shown to be growing fast and is becoming highly dependent on IT systems to maintain their high end inventory as well as the functioning of their department.

The case started with the inception of a troubled employee who called up the helpdesk agent to resolve the issue he is facing. Likewise, other employees start calling in to launch similar complaints. Later, the technical support help desk employee, while checking her daily emails, accidentally opened an untrusted source file sent from a known work colleague. This led to a number of immediate problems in her network computer which led to her being not able to access the information over the network and the call management software that she used to work upon stopped functioning. It was then found out the other day that their office systems were hit by a worm and they had to end up restoring their entire systems for their timely retrieval.

The CEO of the company called in a meeting to discuss this issue with their CIO -- Chief Information Officer in order to brainstorm and ensure that such attacks by worms and viruses are not repeated. The CIO offered a long-term solution which included the involvement of information security in this process. Charles, the person who was called in by the CIO to discuss the avenue of information security, told the CEO that he studied the business function of his company and realized the fact that any failure in the computer systems led to a huge...

Charles suggested that the solution to this issue is not pertaining to computer security only but is rather more related to the information security process, for which an entire risk management program needs to be executed. Charlie brought in an entire proposal plan to the CEO which was approved by their audit meeting. This led to a successful installation of information security software as well as Charlie's promotion as a Chief Information Security Officer.
Problems faced:

The SLS Company, during the attack from the worm, faced the following problems:

The breach in the information system

The Trojan and Worms had invaded the systems that were making the existing data insure

The Computers in the network started to respond slowly

Workstations' internal resources were being occupied by the worms that led to more problems

The call attendants were not able to service their clients properly

Not all calls were attended properly due to the slowness of the system

Customer Relationship Management policy through which Amy had to say the name of the caller was not being followed due to the slowness of the system

3. Statement of the Problem

The Trojans and worms that entered into the company's network were disturbing the internal processes of the entire system. The software systems that were important nodes of the business processes were badly affected due to which business policies were violated and timely service to clients was not possible. Employees were not able to perform to their complete potential because of the slowness of…

Sources used in this document:
References

Baker, W. (2007). Is information security under control?: Investigating quality in information security management, Security & Privacy, retrieved October 14, 2011 from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4085592

Chapin, D. (2005). How can security be measured, information systems control journal, retrieved October 14, 2011 from http://naijaskill.com/cisa2006/articles/v2-05p43-47.pdf

McAdams, A. (2004). Security and risk management: a fundamental business issue: all organizations must focus on the management issues of security, including organizational structures, & #8230;, Information Management Journal, retrieved October 14, 2011 from http://www.freepatentsonline.com/article/Information-Management-Journal/119570070.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Security Privacy and Ethics in the Surveillance State
Words: 6863 Length: 23 Document Type: Research Paper

Physical Security in Public AreasAbstract/SummaryThis paper examines the effectiveness of physical security measures in public areas, by looking at spaces such as schools, airports, stadiums, and malls. It discusses current strategies, including surveillance cameras, metal detectors, and access control systems. It also examines the need customized approaches since all spaces are different. Schools require security that balances safety with an open, welcoming environment, whereas airports can use stricter, more invasive

U.S. Strategy on Terrorism There
Words: 2818 Length: 10 Document Type: Thesis

(White House, 2003) II. The NATIONAL STRATEGY for SECURE CYBERSPACE The National Strategy for Secure Cyberspace strategic plan states that its strategic objectives are "consistent with the National Strategy for Homeland Security' and that those objectives include: (1) prevention of cyber attacks against America's critical infrastructure; (2) reduction of national vulnerability to cyber attacks and; (3) minimization of damage and recovery time from cyber attacks that do occur. (White House, 2003)

Environmental Hazards As a Consequence of Crude
Words: 9344 Length: 30 Document Type: Term Paper

Environmental Hazards as a Consequence of Crude Oil/Natural Gas Exploration, Transportation, Refining and Storage Ever since crude oil was first successfully drilled in the U.S. In Titusville, Pennsylvania, in 1859, the demand for oil has only been increasing over the years in countries all over the world. (Camden, 1883) Crude oil, from which various petroleum products are obtained, is a naturally occurring hydrocarbon component found trapped in rocks below the

HSMS Gap Analysis Hazard Identification and Risk Assessments
Words: 14774 Length: 5 Document Type: Essay

HSMS Gap Analysis and Hazard Identification Risk Assessments Description of APM Terminals Legal Environment Review of the Health and Safety Management System Description Gap Analysis Hazard Identification Physical Hazards Health and Welfare Hazards Risk Assessment Physical Hazard -- Working at Height - Scaffolding Health & Welfare Hazard -- Noise Action Plans Action Plan 1 - Management System Action Plan 2 -- Hazards and Risks Barbour Checklist: BS OHSAS 18001 Audit Checklist Occupational health and safety management has numerous benefits for business, not only an employer's duty

Rural Healthcare Facilities Context of
Words: 5552 Length: 20 Document Type: Term Paper

Provide sustained technical assistance (Expert Panel Meeting: Health Information Technology: Meeting Summary, 2003) Evaluation of the process in rural and small communities includes: (1) scope of the project; (2) goals; (3) critical success factors; and (4) technical assistance." (Expert Panel Meeting: Health Information Technology: Meeting Summary, 2003) Community grants have been focused on the provision of 'personal digital assistant (PDA) systems in assisting with the decision support role. The initiative is

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now