Case Study: Creating an Ids Policy.

In: Computers and Technology

Submitted By jae8870
Words 831
Pages 4
SEC280 Week 6 Assignment – Joseph Ercole
Case Study: Creating an IDS Policy.

As the need to secure corporate networks continually increases, the task of ensuring the security of sensitive company data so that it is not compromised becomes increasingly difficult with each day. Gem Infosys, a small software company, has decided to secure their computer systems. The organization uses ten PCs and a broadband connection to the Internet. The management at Gem needs to formulate an IDS policy. We need to identify the steps to be performed when formulating the IDS policy.
One of the best ways to protect company networks and data from attackers is to have an Intrusion Detection System in place. Today, IDS’s are an integral part of many organizations’ network infrastructure. But having the IDS in place and not understanding why it’s in place, how it works or who will deploy and run it or how to respond in the event of an attack is counter-productive to its existence. This is why we need to formulate the IDS policy. Before the IDS is deployed, we will create a basic outline of what we are trying to accomplish with the IDS and from there, devise a strategy. So, what are we protecting the network from and how strict will we make accessibility? Sometimes beginning with the end in mind is a good way to execute the first step of any plan or strategy. Knowing how tightly or loosely you want to allow traffic to flow on the network in order to have better control over it is a good start. We obviously know that we do not want intrusions of any kind. Who will write the policy and deploy it? With that question being posed, I would assign a project leader to the task of formulating the IDS policy and letting that person put a small team together for assistance. The leader should be someone from the company who already has had exposure to network security deployment, if possible, but…...

Similar Documents

Urban Outfitters Continuing Case Study Part 2: Creating a Business

...Urban Outfitters Continuing Case Study Part 2: Creating a Business Anna Hall Dean Carol T. Williams Introduction to Business – BUS 100 July 26, 2010 Creating a Business There are many challenges when starting up a business such as lack of funds, finding the right location, and establishing a customer base. Funding a new business can be one of the biggest challenges because most people do not have enough money saved up to start a business especially if they are young and just starting out themselves. Trying to get funding from a financial institution can be very difficult, therefore it is best to figure out how much it is going to cost to start a business. It is always a good idea to have a financial plan before starting a business; otherwise the likelihood of the business being successful is slim. If the business is going to be a retail store, finding the right location is very important. It is important that the store is visible from the street, and that it has easy access from the street for both automobiles and pedestrians. It is also important to look at the amount of traffic in the area that the retail store is being considered. It certainly would not make sense to put a retail store out in the middle of nowhere. Establishing a customer base is very crucial to the success of a business. Without customers a business will not have any sales, and if a business does not have sales it cannot survive. Doing some light advertizing is one way to start getting...

Words: 665 - Pages: 3

Id Case Study

...Id Case Study 1. Can you rank the projects simply by inspecting the cash flows? Analyzing the sum and the excess of cash flow can give the business an order of the most profitable investments; however it does not give the full details that are important to determining true profitability. As one can see from the charts, Project Number 3 has the highest sum of cash-flow benefits and excess of cash flow, but the payback is not accomplished until the 15th year. Other Projects may not have a high sum of cash-flow; however the initial payback happens very quickly which proves to be important when making these types of investments. The Net Present Value can not be figured from just inspecting the cash flows nor can any of the other procedures necessary to fully get the scope of the investment. It is important when making investments of this magnitude to evaluate all procedures available to decide upon the best one. 2. What criteria might you use to rank the projects? Which quantitative ranking methods are better? Why? Several different procedures are available to analyze potential business investments. Some concepts are better than others when it comes to reliability but all provide enough information to get the general scope of the investment. The five procedures that provide useful information are the Net present Value (NPV), the Payback Rule, the Average Accounting Return (AAR), the Internal Rate of Return (IRR), and the Profitability Index (PI). These procedures will help......

Words: 1001 - Pages: 5

Policies for Budget Development: Case Study 1

...Policies for Budget Development Policy Comments Overall, it appears that Hector Corporation has a solid annual budget development policy in place. There is a budget committee that Hector Corporation sets up in order to drive the budget process. The company’s controller, who is responsible for implementing the master budget, is part of the committee. At the beginning of the budget process, Hector Corporation reviews the plans and determines what the overall goals for the following budget year are going to be. Early in the process, sales goals are determined. The operating budget includes the day to day operations of the company. The financial pro forma can be created in integrated into the budget. Moving into the fall timeframe, after the initial budget information is gathered and compiled into the master budget, this is reviewed and rounds of changes are made as necessary until final approval. Once there is the final approval, it is the policy of Hector Corporation to communication these to the appropriate managers (Crosson, 2011). It is clear that those who have authority over the budget, such as division manager and department heads are involved in the budget process, which is key since they will be held accountable for the results in the following year (Crosson, 2011). What changes would you recommend? I would recommend the budget committee to review the long term goals of the company. As mentioned in the chapter reading, this is critical to setting the......

Words: 482 - Pages: 2

Id Case Study

...payback rule is how long it takes to recover the initial investment. It is noted on the case study as to which year the investment is recouped and it is easy to rank the projects, however this is not the best procedure to use. This rule does not involve discounting which means that time value of money is disregarded, it fails to consider risk differences, and an accurate cutoff period cannot be picked. Third, another possible approach is the AAR. This is defined as an investment’s average net income divided by its average book value. The projects can be ranked according to the excess of AAR compared to the target AAR. Once again, this is a flawed approach because it is not comparable to the returns offered, it ignores time value, it does not have an objective cutoff period, and it does not use the right factors to determine the effects on share price from taking on an investment. It may be easy to compute but overall does not provide valuable investment information. Fourth, the IRR is the next closest alternative to the NPV calculations; therefore it is next in line as far as a method to calculate for investments. The IRR is the discount rate that makes the NPV of an investment zero. An investment should be accepted if it is higher than the required return; if it is lower, the project is not acceptable. The IRR can be a problem if cash flows are not conventional or when in this case with eight projects to compare, the IRR can be misleading and not provide the......

Words: 1002 - Pages: 5

Law and Policy Case Study

...ABSTRACT Being profitable is not the only goal and requirement for all successful organizations, large and a small. To protect an organizations confidential data from its adversaries its information security program ensures the confidentiality, integrity and availability of information and information systems by adhering to government policies and organizational policies. Government policies are those issued by federal, state, local or tribal governments whereas organizational policies are those written to guide and organization's compliance with laws, regulations and policies. In order for an organization's information security program to succeed it needs to operate according to the established government and organizational policies. This case study will give managers a brief overview of the legal environment to assist them in reviewing and commenting upon a new governance policy for their organization's information security program. LAW AND POLICY CASE STUDY CIA TRIAD "The meaning of CIA that is probably most familiar to my readers is the Central Intelligence Agency." In this case study, however, the CIA triad stands for: Confidentiality, Integrity, and Availability. The triad is a security model that helps people remember the important parts of information technology security. The confidentiality portion of the triad determines the appropriate access levels for information. The integrity portion protects unauthorized modification or deletion of......

Words: 596 - Pages: 3

Creating Value Through the Marketing Mix an Aldi Case Study

...Creating value through the marketing mix MARKETING Introduction In increasingly competitive markets, consumers have a greater choice over where they buy their goods and services. For an organisation to meet its business objectives, it has to find out what consumers require and then identify the best way in which it can satisfy these needs and wants. Creating a competitive advantage can be difficult. A unique marketing strategy with clear objectives is vital to ensure effective promotional activity. Since opening its first store in 1913, Aldi has established itself as one of the most reputable retailers in the global business market by providing great value and quality. Aldi’s goal is simple; ‘To provide our customers with the products they buy regularly and ensure that those products are of the highest possible quality at guaranteed low prices.’ Aldi’s products are sourced from hand-picked suppliers whose products are sold under Aldi’s own brand labels. Aldi’s immediate challenge for the ‘Like Brands’ campaign was to increase market share from 2.3% to 2.5%. Although this sounds very little, the retail grocery market is very large. A single 0.1% is worth an extra £65 million revenue. This case study focuses on the marketing strategies used by Aldi to increase its market share and encourage loyal customers. The marketing mix The Chartered Institute of Marketing describes the term marketing as the process ‘The process responsible for identifying, anticipating and......

Words: 2031 - Pages: 9

Creating Value Through the Marketing Mix an Aldi Case Study

...Lesson 3 Commercial viability Adapted from http://businesscasestudies.co.uk Creating value through the marketing mix An Aldi case study Introduction In increasingly competitive markets, consumers have a greater choice over where they buy their goods and services. For an organization to meet its business objectives, it has to find out what consumers require and then identify the best way in which it can satisfy these needs and wants. Creating a competitive advantage can be difficult. A unique marketing strategy with clear objectives is vital to ensure effective promotional activity. Since opening its first store in 1913, Aldi has established itself as one of the most reputable retailers in the global business market by providing great value and quality. Aldi’s goal is simple: ‘To provide our customers with the products they buy regularly and ensure that those products are of the highest possible quality at guaranteed low prices.' Aldi’s products are sourced from hand-picked suppliers whose products are sold under Aldi’s own brand labels. Marketing objectives Aldi’s main marketing objective is to grow its market share within the UK grocery market. Aldi’s marketing strategies therefore focus on generating customer loyalty. Another key focus of Aldi’s marketing strategy is on demonstrating that Aldi brands are of equal quality to well-known brands such as Heinz and Fairy Liquid. To do this Aldi ran blind taste tests amongst a cross section of shoppers.......

Words: 1713 - Pages: 7

Sec 280 Week 5 Case Study Risk Management Policy

...SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://chosecourses.com/sec-280-week-5-case-study-risk-management-policy Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://chosecourses.com/sec-280-week-5-case-study-risk-management-policy Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated......

Words: 691 - Pages: 3

Nestle Case Study- Creating Value Through Supply Chain

...              CREATING  SHARED  VALUE  IN  THE  SUPPLY  CHAIN-­‐     THE  NESTLE  COCOA  PLAN               SUBMITTED  BY:   KUSHAL  RAMESH   (001753444)   SUPPLY  CHAIN  MANAGEMENT  6210             CREATING  SHARED  VALUE  IN  THE  SUPPLY  CHAIN-­‐   THE  NESTLE  COCOA  PLAN       INTRODUCTION   Nestle   was   founded   in   1866   by   Henri   Nestle.   It   has   its   headquarters   in   Vevey,   Switzerland.   Nestle   is   today   the   world’s   leading   nutrition,   health   and   wellness   company.   Nestle   employs   339000   people   worldwide   and   has   442   factories   in   86   countries.   Nestle’s   products   include  baby   food,  bottled   water,  breakfast   cereals,  coffee  and  tea,  confectionery,  dairy   products,  ice  cream,  frozen  food,  pet  foods,  and  snacks.   Creating  Shared  Value:  Nestle  aims  to  create  value  for  society  and  shareholders  in  the  areas  where  the  company  can  have   the  biggest  impact-­‐  nutrition,  water  and  rural ......

Words: 1102 - Pages: 5

Cis 462 Wk 2 Case Study 1 Acceptable Use Policy

...CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-2-case-study-1-acceptable-use-policy/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY CIS 462 WK 2 Case Study 1 - Acceptable Use Policy An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study. Write a three to five (3-5) page paper in which you: 1. Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization. 2. Critique the AUP you selected and provide recommendations for improving the AUP. 3. Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability. Describe how your selected AUP accomplishes these goals. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 462 WK 2 Case Study 1 Acceptable Use Policy in order to ace their studies. CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY To purchase this visit......

Words: 688 - Pages: 3

Sec 280 Week 5 Case Study Risk Management Policy

...280 WEEK 5 CASE STUDY RISK MANAGEMENT POLICY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-5-case-study-risk-management-policy/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 5 CASE STUDY RISK MANAGEMENT POLICY SEC 280 Week 5 Case Study Risk Management Policy You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers’ trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 5 Case Study Risk Management Policy in order to ace their studies. SEC 280 WEEK 5 CASE STUDY RISK MANAGEMENT POLICY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-5-case-study-risk-management-policy/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 5 CASE STUDY RISK......

Words: 785 - Pages: 4

Sec 280 Week 5 Case Study Risk Management Policy

...SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://devrycourse.com/sec-280-week-5-case-study-risk-management-policy Product Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://devrycourse.com/sec-280-week-5-case-study-risk-management-policy Product Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a......

Words: 1669 - Pages: 7

Sec 280 Week 5 Case Study Risk Management Policy

...SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://devrycourse.com/sec-280-week-5-case-study-risk-management-policy Product Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. SEC 280 Week 5 Case Study Risk Management Policy Purchase here http://devrycourse.com/sec-280-week-5-case-study-risk-management-policy Product Description You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a......

Words: 2086 - Pages: 9

Busn412 Business Policy - Southwest Airlines Case Study

...Southwest Airlines Case Study Jared G. Sanders BUSN412 Business Policy April 1, 2012 SOUTHWEST AIRLINES WWW.SOUTHWEST.COM AIRLINE INDUSTRY BACKGROUND /HISTORY/ COMPANY TIMELINE: Southwest, founded by Rollin King and Herb Kelleher, began as a small Texan airline almost 35 years ago and has grown to become one of the largest airlines in America. It was created on the following premise: “If you get your passengers to their destinations when they want to get there, on time, at the lowest possible fares, and make darn sure they have a good time doing it, people will fly your airline!” (www.southwest.com). Today Southwest Airlines flies more than 70 million passengers a year to 60 great cities all across the country, and they do it more than 3,000 times a day. They have 436 of the newest jets in the nation, with each plane being an average age of 9 years. (www.southwest.com). Southwest’s combination of low fares, outstanding customer service, and strong leadership have helped the airline remain profitable even in the midst of tragedies like the terrorist attacks on September 11, 2001. SWOT ANALYSIS: Southwest was set up for success from the beginning because of its unique upside-down organizational structure. Upper management is at the bottom and supports the front line employees, who are the real experts. Kelleher’s unorthodox leadership style, in which everyone in the company makes management decisions, is largely unheard of these days. The company doesn’t...

Words: 1474 - Pages: 6

Creating a Business Urban Outfitters Case Study

...Urban Outfitters Continuing Case Study: Creating a Business Steve Jobs Introduction to Business Professor Mariatta Lewis July 31, 2011 Urban Outfitters Continuing Case Study: Creating a Business Starting a business can be very challenging. There’s always a positive and negative side to it and it’s not always easy. Entrepreneurs and business owners will always over come different challenges when setting up a business. Finances, location, and finding a good staff is all linked together but can be challenging when opening up a business. Finances have a big part to opening up a business. You will have to find the right lender and see who has the best interest rates for business loans. For example, if I was to start up my own restaurant I will need money to buy or rent a facility, buy restaurant equipment, or buying the food. First I will have to sit down and set up a business plan and see what is within my budget. If the bank qualifies you for a $100,000 loan you know that is your budget. Figure out what you need to get for the business, find the location, and hiring a staff. A good way to budget is find stores that sell cheap items and buy things in bulk. Budgeting money can be very challenging because when you have that large lump sum it’s easy to just buy whatever you see. So as a new business owner plan out what you need for the business and budget the money you got. Finding a location can be very challenging. Explore your options to see if it...

Words: 1084 - Pages: 5