Case Study on Firewalls

In: Computers and Technology

Submitted By cmhunter
Words 543
Pages 3
Casonya Hunter – Case Study #1 (SECR 5080) In today’s world, identity and technological theft is at a new high. Companies such as Wells Fargo are considered to be a target for such intrusions. In addition to protecting information, firewalls were created to stop intrusions. Though with all of these risk of information getting stolen or possibly corrupted, Wells Fargo does not use firewalls in its card data security system. The company does have other preventive technology, why not a firewall? (http://www.wellsfargo.com/biz/merchant) Firewalls are a system that limits access between networks to prevent intrusions. Unfortunately, this does not signal if any attacks are taken from the inside of a network. It is clear to say that this particular form of security stops the action before it takes place. As an example, someone tries to retrieve into another person’s Wells Fargo banking information through the use of obtaining it from they’re credit card. A firewall will detect the attempted breach and will block the system immediately from taking further action. If that is the case, why does the company Wells Fargo have a firewall system set up for this particular system? (http://en.wikipedia.org/wiki/Firewall_(computing) Wells Fargo use an organization called Payment Card Industry Data Security Standard (PCI DSS) to protect account holders information (wellsfargo.com). The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures (http://www.pcisecuritystandards.org/security_standards/index.php). This means it only deals with intrusions once it has occurred. Even though the account holder is credited back whatever was stolen, the attack was not stopped in its tracks in the beginning. This serves as a greater disadvantage to the…...

Similar Documents

Study Case

...at Duke Universit y Business Ethics GOOGLE IN CHINA “The Great Firewall” Prepared by Kristina Wilson, Yaneli Ramos, and Daniel Harvey under the supervision of Professor Wayne Norman (edited by Professor Chris MacDonald) In early 2006, search-engine giant Google struck a deal with the People’s Republic of China and launched Google.cn, a version of its search engine run by the company from within China. Launching Google.cn required Google to operate as an official Internet Service Provider (ISP) in China, a country whose Communist government requires all ISPs to selfcensor, removing content that is considered illegal from search results. From a financial perspective, China represented for Google a dynamic and fast-growing, though increasingly competitive, market. Google’s decision to self-censor Google.cn attracted significant ethical criticism at the time. The company’s motto is “Don’t Be Evil,” and prior to entering China, Google had successfully set itself apart from other technology giants, becoming a company trusted by millions of users to protect and store their personal information. The choice to accept self-censorship, and the discussion and debate generated by this choice, forced Google to re-examine itself as a company and forced the international community to reconsider the implications of censorship. This case was prepared as the basis for class discussion rather than to illustrate either the effective or ineffective handling of an administrative......

Words: 7843 - Pages: 32

Case Study

...University of Phoenix Material Case Study Analysis Paper Prepare a 1,400 to 1,750-word case study analysis paper based on the University of Phoenix Material, “Case Study for Student Analysis,” located in Week Two of the COMM/215 page. Below is a detailed description explaining how to prepare a case study analysis paper. _____________________________________________________________________________ Typically written in narrative form, a case sets forth, in a factual manner, the events and organizational circumstances surrounding a particular managerial situation. Placing the reader at the scene of the action, the real events presented provide an opportunity to help evaluate alternative courses of action. Case analysis is used in academics to help you demonstrate your ability to evaluate situations critically, to apply concepts you have learned in a class, to solve problems, and to communicate your findings and conclusions. The purpose of this exercise is to introduce you to case studies and the analysis process, and to a proper format for writing the case study analysis report. Try not to worry about trying to find the "right answer" to a case. Usually, there is no single right answer. Most cases are intentionally ambiguous and can be viewed from many different perspectives. Several feasible solutions are usually available to any give case. The best solution is the one you can best support with thoughtful analysis, logical arguments, and substantiating evidence from......

Words: 539 - Pages: 3

Nt1210 Case Study 10

...In this case study we have been asked to create a report about disaster recovery and the best practices involved for such an incident. There are many types of disaster recovery systems that can be employed. For our purposes I will talk about two of the currently industry standards. First is the "Cloud-Based" disaster recovery. In this type of recovery, SMPR would be required to lease network storage space from a cloud-based DR vendor and SMPR would set up proprietary backup software that would communicate with the vendors system and remotely and securely store SMPR's backup data and network configurations on the Cloud, or in other words in a server farm of hosted SAN devices. This option is typically a little more cost effective because the vendor has to maintain the hardware for storage, and ensure that it can be accessed within an agreed upon SLA. The next method of disaster recover we will talk about is called a Co-Location shorted to Co-Lo in the industry. In a Co-location setting, you pay rental space for a building, you then bring in your own hardware and setup and manage your own connections to this location for your data backups and storage. Typically in a Co-Lo, you will need to worry about how much power you will use, how much rack space will be required, and how much bandwidth you will need between the SMPR offices and Co-Lo. A Co-Location typically has many redundant systems to ensure that your servers do not lose power, or data connection, they generally have......

Words: 520 - Pages: 3

Case Study Case Study Case Study

...This case study is an excellent example of how different types of parties can be brought together in a large scale transaction and how the original energy of those early meetings can be lost over time. I imagine that when Anthony Athanas was purchasing those old piers back in the 1960s many, if not all, of his colleagues, friends, and family members told him that he was off his rocker. I’m sure Athanas was looking at this land as his family’s ticket to financial prosperity and somewhat of a legacy that he could leave to his descendants for years and years to come. One of the items I wish the case would have divulged is the amount of money that Athanas had invested in the properties. For me this information would have given an insight to his net worth and how much he had riding on this investment. I assume it was substantial given his actions later in the process. Twenty years later Athanas’ dreams came true and all those naysayers were more than likely green with envy. The amount of pride Athanas’ had in his investment at that moment had to have been insurmountable. Being approached by a big time real estate development company and their extremely wealthy client, Hyatt Corporation, must have made Athanas feel larger than life and made him feel like something he isn’t, which is a developer himself. The case doesn’t give much insight into whether Athanas had any representation or anyone consulting him throughout the process. From the beginning, I saw this as matchup...

Words: 1190 - Pages: 5

Case Study

...Case Study: Oops Is Not An Option Isaacnette Mathurin Devry University 12/03/2014 Introduction Patients private information and private hospital documents are often leaked by internal employees or vendors who work throughout the organization. Each hospital or organization has strict policies and guidelines for which each employee or vendor must abide. Often Times these policies and guidelines are breached due to employees misusing the information for their own personal gain. Not only is this a breach of hospital policy, it is also a violation of the Health Insurance Privacy and Portability Act (HIPPA). So when the HIPPA law is broken different protocols have to come in and the situation has to be dealt with so the hospital will not be reliable for that . Not only is the hospital liable for the patients information being released to a third party without the patients consent it is also a violation of the HIPPA Law. Employees must really have to follow the different policies and protocols that there hospital have. For instance, if you do not know the procedures they have a book that they give to their employees when you are hired on. The information on polices and procedures are included in the employee handbook. The handbook is usually located in Human Resource office ,if you lose the handbook that is given to you at the beginning of employment. However HIPPA policies and procedures are typically posted......

Words: 1574 - Pages: 7

Case Study

...The Case Study Approach Linda P. Williams Liberty University Online Author Note Linda P. Williams, Department of Psychology, Liberty University Online Correspondence concerning this article should be addressed to Linda P. Williams, Department of Psychology, Liberty University Online, 1971 University Blvd, Lynchburg, VA 24515, E-mail: lwilliams91@liberty.edu The Case Study Approach Introduction At some point during the pursuit of a degree psychology, the time comes when a student must learn various research techniques. One of the many approaches is case study, which this paper will focus on. Areas of discussion include reasons for using a case study, advantages/disadvantages to the approach, and ways acquire information to perform a case study. The essence of a case study A case study is used to offer a mental accounting of a person, school, neighborhood, business, or group of individuals over the course of time, way of research. It is sometimes referred to as naturalistic observation, but does not always follow the same protocol. Mental accounting is done by means of observation of various behavior or mind sets operating in their natural environment. This is noteworthy, especially when participants have a distinct disorder worthy of being studied to further the cause of research and development. Depending on the purpose of the investigation, the case study may present the individual’s history, symptoms, characteristic behaviors, reactions to......

Words: 671 - Pages: 3

Case Study

...Case Study 2 Solution Date:-08/10/2014 LJB Company :- Internal control No | Particular | Page no | 1 | Introduction | 1 | 2 | Topic 1 Explanation | 1-2 | | Internal control requirement | | 3 | Topic 2 Explanation | 2-3 | | Internal control requirement | | 4 | Topic 3 Explanation | 3-4 | | Internal control requirement | | 5 | Summary of recommendation | 5 | 6 | conclusion | 6 | case study 2 solution Dear president of LJB Company, * If the LJB Company should decide to become a publicly traded company, a few internal controls should be implemented to comply with the Sarbanes-Oxley Act (SOX). Management will need to provide periodic quarterly reports to evaluate the effectiveness and reliability of LJB’s internal controls over financial reporting procedures. Management should certify the accuracy and fairness of presentation of their financial statements. Independent auditor(s) outside of LJB will need to attest to management’s assessment of said internal controls. Additionally, non-audit services between these two parties (LJB and said independent auditor) are prohibited. * There are a few internal control measures that LJB already has in effect and are better for it: the use of pre-numbered invoices by the accountant and your (the President’s) involvement in the approval and hiring process of new employees. I also recommend the purchase of the indelible ink machine as per the accountant’s......

Words: 2287 - Pages: 10

Case Study

...Case Study Phase III Edgar Pavon-Hernandez American Military University Case Study Phase I Defining risk to an organization means identifying which assets are susceptible to a threat. This threat can cause damage to a company or can be costly. The most important aspect is to mitigate risk to keep tangible and intangible costs low. For example Amazon.com is an online shopping website. Because it is a website its revenue is from online orders. In the following sentences I will go over a few things which can be potential risk to the site. A risk to the company, Amazon.com, could be a hacker gaining unauthorized access to the websites server. The hacker could then begin attacking other servers within the site. If the main server as well as back up servers were to become infected and be brought offline. Another example could be a disgruntle employee who sells personal information which includes names, date of birth, credit card numbers as well as email addresses and passwords. Both of the above mentioned risks can cause the company damage in loss of revenue, which would be a tangible cost. But on the more serious side, the site would lose customers. This is the intangible costs. Because loyalty is an aspect of customers that cannot be bought or sold. Regaining lost customers due to a risk becoming a threat causes the site to have to take different measures to attempt to regain the lost customers. Another area that is susceptible to risk is the......

Words: 1450 - Pages: 6

Case Study

...107 Information Security Governance 72 Answers to Exam Questions 109 The Role of Strategy, Policies, Planning, and Procedures 74 Policy Development 75 Policies and Procedures 76 Risk Identification and Management 79 The Risk-Management Team 80 Asset Identification 81 Threat Identification 81 Risk-Analysis Methods 83 Management Practices and Controls 88 Employee Management 89 Sourcing 93 Change Management and Quality Improvement Techniques 95 Understanding Personnel Roles and Responsibilities 99 Employee Roles and Duties 100 Segregation of Duties 101 Need to Know More? 110 06_0789735733_ch02.qxd 4/5/07 1:29 PM Page 66 Study Strategies This chapter discusses IT governance, which involves control. This control includes items that are strategic in nature. Senior management and the IT steering committee help provide the long-term vision. Control is also implemented on a more tactical level that includes personnel management, organizational change management, and segregation of duties. The following are the primary topics a CISA candidate should review for the exam: . Understand the way IT governance should be structured . Know the methods of risk management . Describe how tools such as CobiT and the capability maturity model are used . Detail proper separation of duty controls . Describe good HR management practices . List methods for measuring and......

Words: 14503 - Pages: 59

Case Studies

...Case studies Name: Tutor: Course: Institution: Date: Flying to the Auto Bailout on a Private Jet Basic problems In this case study, there is wastage of resources. The CEOs of the nation's three largest automobiles uses private jets to attend the corporate public relations congress. This is wastage of resources since they are using private jets to travel when their companies are struggling to stay afloat. Ignorance is another basic problem evident in this case study. These CEOs are very ignorant. They attend the corporate public relation congress in Washington unprepared and thus appear to know nothing about their problems. The three companies, GM, Ford and Chrysler, lack the concepts of public relations. The main issues American economy is melting down. Most of the workers are losing their jobs since the companies cannot handle many workers anymore. The companies have got inadequate cash. Bankruptcy is another main issue experienced in this case study. The General Motors Company and the Chrysler can no longer pay their debts. Key decisions * According to the case study, the leaders have to come up with a new public relations strategy. * The CEOs should correct any mistakes they have made before such as using private jets to travel. * Introduce innovation in products * The auto industry of the US should promote its products. * Ensure transparency in business operations. SWOT analysis Strengths * Availability of resources for the......

Words: 657 - Pages: 3

Case Analysis Firewall

...planes per hour)? What is the total cost (operational and passenger costs) associated with arrival rates of 50 planes per hour, for all three types of planes mentioned? What are your results if the arrival rate is i) 55 planes per hour? ii) 59 planes per hour? b) ( ) Now resolve the above question using the FAA’s definition of delay? Do you think this definition of delay is more reasonable? c) If you think the above definition of delay is not reasonable, suggest an alternative. d) Based on your calculations in part a) and part b), do you believe PPP is a potential solution (by reducing the arrival rates during periods where demand is much higher) to reduce the costs of over scheduling? QUESTION 2 Once you read the Delay at Logan Airport case it is clear that peak periods exist for a reason. That is, they are not random fluctuations but rather a result of passenger’s desires for landings and takeoffs at certain times of the day. Therefore airlines will shift flights to different periods only if the costs of incurring peak charges outweigh the costs (in terms of lost revenue and customer dissatisfaction) of shifting flights to off-peak periods. Continue to assume that planes fly with 35% of passenger seats empty (that is, 65% load factor) and also assume that per passenger revenue for different aircraft sizes are as follows; $230 for a turboprop airplane with 15 seats; $154 for a regional jet with 50 seats; $402 for a jet with 150 seats. a) ( ) Which airplane types......

Words: 526 - Pages: 3

Case Study

...<Your name> MISM 2301 Final Case (Slusser) <Date> Q1. For the 3 Information systems described in the case (they are in capital letters in the case) and fill in the following table. Information System (ISs) | Location(s) the IS is used | Who is the main user | Briefly what it helps the user do (not how the system works) Do not repeat the answers from Q2 and 3. | Day Planner | The computer | The store manager | * Retrieving sales for the previous year from the corporate servers * Generating growth trends * Forecasting daily sales * Realization of the customer count * Developing steps to lure people into the store * Provides focus on customers * Provides Knowledge on availability of freshly baked cookies and the ability meet the revenue goals. | Crew Scheduler | The corporate servers | Managers | * Allocation of tasks to people on the basis of time and skills i.e. scheduling | Store Status | Headquarters | Store controllers | * Knowledge on the daily sales and staffing of stores * Detecting anomalies in sales i.e. discrepancy between the daily report of batches of cookies baked, and the sales report | Q2. For the 3 ISs fill in the following table. Information Systems | List the data the IS needs as input. | List the Information/data the IS produces as output | Day Planner | Command from user | * Questions on the type of day whether normal day, sale day, hot day, school day or holiday * Information on when to......

Words: 1859 - Pages: 8

Week 5 Case Study

...Week 5 Case Study Risk Management Policy By Jovan Kirby SEC 280 Professor T. Campbell DeVry University Risk management is the process of making and carrying out decisions that will minimize the adverse effect of accidental losses upon our company. The risk management process is vital to the personal health and safety of employees and the safety of the public. In financial terms, it is vital to our ability to pursue our goals, commence and operate programs, and to perform duties in an efficient and professional manner. We will implement a plan to cover credit card theft and as well as internal breach of personal company information. Some ways to protect against credit card information being compromised is this. We have implemented some ways such as firewalls, restricted policies, and proxy servers. We will go through each one and explain why and how they will make this company stronger and better. First firewalls using a firewall will help build a strong defense. A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. For example, if a firewall is configured with a rule to block Telnet access, then the firewall will drop packets destined for TCP port number 23, the port where a Telnet server application would be listening. The role of a firewall is to prevent malicious traffic reaching the resources that it is protecting. Some security experts feel this is an......

Words: 765 - Pages: 4

Case Study

...ASSIGNMENT GUIDANCE – NRSG258 ASSESSMENT 1: CASE STUDY Dear students here are some guidelines to assist you in writing Assessment 1: Case Study. If, after reading through these, you still have questions please post on the relevant forum. If you are still unsure then please contact your campus specific lecturer to arrange to discuss your assignment. We ask that you bring these guidelines to any meeting and highlight the areas about which you are still unsure. In this case study you do not need an introduction or conclusion for this case study of 1500 WORDS ± 10% due by midnight 8th April Turnitin. Just answer the questions. Turnitin is located in your campus specific block. Although we suggest you do your background reading in the current textbooks for basic information, the case study also requires you to find current literature/research/articles to support your discussion throughout the case study. Do NOT use Better Health Channel, WedMed, dictionaries, encyclopaedias etc. These are NOT suitable academic sources. If you use these you will not meet the criteria for this question and you will lose marks. You must follow the APA referencing format as directed by ACU in your case study and in your reference list. The Library website has examples of how to do this referencing and you can find the correct format at the end of your lectures and tutorials as well as in the free Student Study Guide. This essay should have approximately 10 relevant sources.......

Words: 1111 - Pages: 5

Case Study

...questions out of which students will be required to attempt any four questions. Section B carrying 20 marks will contain one or more cases. Cases prescribed below are only for classroom discussion and internal evaluation and not for end semester examinations Course contents 1. Concept of Management Functions and Responsibilities of Managers, Fayol's Principles of Management, Management Thought The Classical School, the Human Relations School, Systems Theory, Contingency Management, Developing Excellent Managers. Cross cultural issues in management. Case:Shui Fabrics. 2. Planning Nature and Purpose of Planning, The Planning Process, Principles of Planning, Types of Planning, Advantages and Limitations of Planning. Case:Planning for Diversified Activities in a Changing Environment 3. Concept and Nature of Objectives: Types of Objectives, Importance of Objectives, Setting Objectives, Management by Objectives (MBO), Benefits and Weaknesses of MBO. Case:Detroit and Toyota 4. Strategies and Policies: Concept of Corporate Strategy, Formulation of Strategy, Types of Strategies. The Strategic Planning Process, The TOWS Matrix, The Portfolio Matrix, Three Generic Competitive, Strategies by Porter, Effective Implementation of Strategies, Types of Policies, Principles of Formulation of Policies, Decision Making Process, Individual Decision Making Models. Case: Coke verses Pepsi 5. Organizing Nature and Purpose of Organizing, Bases of Departmentation, Span of Management, Determinants......

Words: 8599 - Pages: 35