服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Justice
2013-11-13 来源: 类别: 更多范文
Information Systems
TABLE OF CONTENTS
Abstract…………………………………………………………………………………………..
• Information technology…………….……………………………………………………
• Conclusion……………………………………………………….………………………
• References……………………………………………………………………………….
Abstract
The role of the Riordan Manufacturing information systems is critical for the protection of important information that can be obtained by cyber criminals. The production is one of the major systems of the organization. If this component suffered an attack by cyber criminals the consequences could be critical for the organization. Production records have all the information of products, customers and deliveries of the organization.
Based on the type of customers the organization has like the Department of Defense, cyber criminals from the globe could try to gain access to the organizations net and files. If outsiders gained access to the organizations files, customers would also be in danger of an illegal intrusion. The organization has to have risk assessment to analyze the impact of security threats to the information system and production system files. Then the task of Risk mitigation will be to develop preventive strategies to reduce the threats and risks.
Information Systems
Founded in 1991 by DR. Riordan, a professor of chemistry, Riordan Manufacturing has become a global plastic manufacturer. The company is also one of Fortune 1000 enterprises with more than 1 billion in excess. The products manufactured by Riordan include plastic beverage containers made at Albany, Georgia, custom created plastic parts produced at Pontiac, Michigan facility, and several types of plastic fan parts and accessories created in the facility at Hangzhou, China.
Their main operations building are in San Jose, California. At this location all of the company’s development and research is done. The company’s main clients are manufacturers of appliances, automotive parts, aircraft, beverage bottlers and makers, appliances and the Department of defense. This shows that the company has a variety of costumers and with all types of manufacturing needs all over the world.
Riordan like most businesses around the world understand the importance of technology and its role in their organization. All over the globe industries and businesses utilize computers for their operations from basic to complex operations. In the past and present technology has had a major key role in the growth of commerce and trades around the world. In the present a large amount of industries and businesses depend of technology at every level of their organizations from researching, developing, production and delivering.
Riordan Manufacturing keeps records of units produced yearly in all shifts and that can be rolled up showing the group and year produced. Riordan handles several accounts, customers and production records that can suffer an attack from cybercriminals to breach in to their system to gain access to the accounts, customers and production records specially the account with the Department of Defense.
The role of Information technology personnel at all of Riordan Manufacturing facilities will be to defend their organization and customers from breaches, failure to do can represent the loss of contracts, production records, company reputation and prestige and most likely adverse financial consequences. Access to the production records of the company by cybercriminals could lead to not having accurate production records, alterations and not delivering the products to the clients.
The real damage to Riordan Manufacturing would be the loss of their customers trust in their trademark. A breach in the system would mean impossible and irreparable loss in monetary term. Information technology at Riordan Manufacturing must recognize that the organization has the obligation to provide customer protection and help the organization assemble and create strong and secure software.
Riordan Manufacturing uses a Wide Area Network (WAN) connection in their operations. The amount of information and computers that connect from all of the plants can increase the risk of cybercriminals. Most frauds and abuses are committed by internal personnel that make wrong use of the system or put it at risk. The Wan utilize by Riordan connects several remote computers that are at long distances for example the Hangzhou, China facility.
The functionality of WAN is almost identical to LAN, with the exemption that WAN is more of a bigger scale that moves applications, files and Emails in the wide internet of the business. Routers and bridges are the principal Internetworking devices of WAN. The units that provide routing and bridging are hybrids units also named brouters. Depending on the network topology, security requirements and protocols will lead to decide if routing or bridging will proceed.
Riordan network management must be intense and technical. Some of the products that can be used for network management are network analyzers, monitors, and integrated managing systems that will show event history data and network status. There are several accesses controlling mechanism that Riordan network can utilize. For Riordan to control who logs in there system there must be access control. It will also control users of the resources, and where and when their will be availability of access.
The company should also intensify their Network file security by assigning password protection or any other mechanism that the software allows as a method of preventing outside users. There is no doubt that technology advances and subsequently increases the potential and principles of criminal conduct. The ability to communicate worldwide has diffused criminal activity. Even though experts in field comment that all cybercrimes will ascend and then decrease (e.g., Parker, 1998), there is nothing to prove the assumption.
A survey conducted in 2002 by the FBI and Computer Security Institute revealed that 90% of the responders had been affected by a computer security breach that past year (Whitman, 2003). Riordan Manufacturing should take serious risk management because of its cost and criticality. In another study this time conducted by Ernst and Young in 2002, concluded that the main source of unavailability of businesses critical systems were software failures or hardware with more than (56%) and telecommunication failure. Most of the problem revealed operational errors and system capacity (Ernst & Young, 2002).
Without no doubt the battle on information security threats involves small and large organizations. Information technology at Riordan management should combine efforts by cooperating with each other to reach an corporate information security solution. Keeping things simple and fixing security holes with patches, only stops hackers when they discover obstruction in the place (Atkinson, 2005).
.
References
* Atkinson, W. (2005). Integrating Risk Management & Security, Risk Management, 52(10), 32–37.
* EBOOK COLLECTION: Britz, M. T. (2009). Computer forensics and cyber crime: An introduction (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
* Ernst and Young LLP Global Information Security Survey, 2001, 2002, 2003.
* Beebe, N., & Rao, V. (2009). Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process. Communications of AIS, 2009(26), 329-358. Retrieved from EBSCOhost.
* Sumner, M. (2009). Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness. Information Systems Management, 26(1), 2-12. doi:10.1080/10580530802384639
* Whitman, M. E. (2003). Enemy at the Gate: Threats to Information
Security. Communications of the ACM, 46(8), 91.

