EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Huffman Trucking

By:   •  Essay  •  582 Words  •  January 5, 2010  •  1,172 Views

Page 1 of 3

Join now to read essay Huffman Trucking

Huffman Trucking Information Systems Security Review and Upgrade

Background and Statement of Need

An increasing growth of the Huffman network infrastructure and architecture requires review of existing network security hardware and software/application resources. This review will help to determine requirements for new systems and possible upgrades to protect Huffman Information Systems from exploitation and ensure security features are in place to combat increasing threats to customer information bases, industry information, technology and assets, and existing and increasing identity theft threats. Negative consequences of neglecting these information security issues can be measured in predictable loss of revenue due to identity theft, network sabotage, legal and liability fees, and commercial espionage.

Without any changes, impact to operations can be catastrophic. Critical customer and business information may be vulnerable to Denial of Service (DoS) and other malicious attacks. In these days of increasing identity theft, the legal consequences if customer information is not effectively protected could be extremely detrimental to Huffman business objectives.

Goal Statement / Project Objectives

The goal of the Huffman Information System Security Upgrade is to successfully implement sufficient and required security applications, processes, and measures identified in the following analysis.

The Information System Security Review will identify existing and required levels of security measures across Huffman’s Information Systems and recommend appropriate modifications and upgrades. The security features will eliminate DoS attacks on Huffman Networks and secure Huffman Information Systems and eliminate all identified vulnerabilities.

Existing security functionality will be measured by comparing performance parameters currently available in/on the existing security applications with current global standards. A determination of how much security required for the type of operations and data will help determine the type of security to be implemented.

Mission and Goals & Project Plan

The Plan will start with an examination of current network architecture and components and then identify security features that might be implemented in this network. The project plan will begin with analysis of existing security processes and identify specific vulnerabilities. The vulnerabilities will then be addressed to ascertain the specific level of security and applications required for acceptable protection. Firewalls, cryptographic algorithms, software applications will be implemented on an as-need basis as vulnerabilities are identified.

A schedule will be developed with the evolvement of the Work Breakdown Structure (WBS), but generally the team

Download as (for upgraded members)  txt (4.3 Kb)   pdf (75.5 Kb)   docx (11.5 Kb)  
Continue for 2 more pages »