Identify what you consider to be potential security threats

Assignment Help Computer Engineering
Reference no: EM132083592

You are the newly hired Network Security Administrator for UMESCo, a financial consulting company.

This company has seven branch offices around the country, connecting to the primary office over L2TP/IPSEC VPN tunnels.

There are one hundred employees at the main office, and an average of 25 at each remote office.

All employees have access to FinanceWare, the antiquated and proprietary financial ERP system used by your company, via the SSH-based client installed locally on their Windows 8.1 desktops, running in a server/client environment.

The system is maintained by the IT Department, and all IT personnel are located full-time at the main office where the FinanceWare system is housed. Recently, several of the senior staff have asked to access FinanceWare from their mobile devices or web browsers when on the road, or meeting with clients. The software is old, and does not have any sort of web or mobile interface whatsoever.

The back-end product is a Microsoft SQL database, and the front end client application is unable to be modified. The Chief Information Officer (CIO) has stated that his Network and System Engineers will be making changes to the firewall to publish the FinanceWare system to an external public IP address, allowing any mobile or web-enabled devices with Internet access to log in from anywhere.

Due to the age of FinanceWare, a custom interface will need to be created by a 3rd party vendor, as there are no on-staff software engineers at UMESCo and the software version owned does not support a user interface for mobile clients.

The vendor has stated that they will need administrative access to the Application server in order to set up Microsoft IIS and configure the web server functionality to work with their newly-created web app that interfaces directly with the SQL database on the local server.

The vendor has stated that their software will be Javascript based, heavy with SQL statements and use custom views for the security groups set up in SQL as the means of security.

Note that the SQL based access will allow the users to have the same rights in the field that they have in the office based on their user login (read only or read/write).

The CIO has asked you to prepare a report for him detailing what you consider to be potential security vulnerabilities with his new plan.

You must:

Identify what you consider to be potential security threats in the scenario above.

Develop a plan that, by using the methods, tools and ideals covered in this course, integrates effective security and protection against the potential threats you have identified.

You need as many vulnerabilities as possible.

Reference no: EM132083592

Questions Cloud

Working with victims of domestic violence : In working with victims of domestic violence, a human service professional may find it deeply distressing when a client continues to return
What are some potential dangers or drawbacks : What are some of the potential advantages of this shift? What are some potential dangers or drawbacks?
What is the companys quick ratio : Short-term investments of $150,000, Accounts receivable of $50,000, and Inventory of $300,000. What is the company's quick ratio? and how do you find it
Calculate the break-even point expressed : Monterey Co. makes and sells a single product. Calculate the break-even point expressed in terms of total sales dollars and sales volume
Identify what you consider to be potential security threats : The system is maintained by the IT Department, and all IT personnel are located full-time at the main office where the FinanceWare system is housed.
Compute the total net revenue : Compute the Total net revenue - Net income Dividends declared (d) Income attributable to controlling stockholders
Most states now require school social workers : Most states now require school social workers, counselors, and psychologists to hold master's degrees in their fields, with several hundred hours' worth
Nature verse nurture : Nature verse Nurture? Choose a side. Do you think behavior is caused by biology or by social interactions?
Social services with particular reference to sectors : What are the effects of conflict caused by suggesting a reduction of state and federal support for social services with particular reference to sectors of socie

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd