Smith System Consulting Essay Sample

Smith Systems Consulting was founded in 1984 by Blair Smith. In the late seventies. Blair Smith was a spouse with a big public accounting house in Houston. Texas. Having an advanced grade in computing machine scientific discipline and an undergraduate grade in accounting. Mr. Smith would frequently utilize engineering applications to work out the finance and accounting jobs of Mr. Smith clients. Sing the explosive growing of the personal computing machine industry. Blair Smith decided there were sufficient market chances to establish an independent engineering services adviser concern ( Smith. 2006 ) .

From an initial group of five. Smith Systems Consulting has grown to go a major regional confer withing company with locations in Houston. Texas ( central office ) . Atlanta. Georgia. and the newest venture to Beijing. China. Smith Systems Consulting clients for engineering services are from a broad assortment of industries including: Transportation system. retail. fiscal services. fabrication. and instruction.

Smith Systems Consulting services include: Designing and implementing web or web site or usage scheduling undertaking ; offering the latest waiter engineering to supply safe and unafraid web site hosting ; developing new engineering and upgrading current system ; supplying web site care ; scheduling and offering premier support services. Smith Systems Consulting offer these services to their clients with high value Web and Business application services.

AREAS OF THE BUSINESS TO BE IMPROVED

Smith Systems Consulting is researching the possibilities of heightening Smith Systems Consulting security processs and methods to keep an honest. corporate workplace that will in bend benefit the clients in which Smith Systems Consulting service.

The figure one precedence is the safety of the informations that Smith Systems Consulting maintains on Smith Systems Consulting waiters and who has entree to that information. Everyday. 100s of minutess are taking topographic point on Smith Systems Consulting waiters for Smith Systems Consulting clients that include sensitive informations. such as societal security Numberss. recognition card Numberss and bank history Numberss.

For the safety and security of Smith Systems Consulting employees. propinquity readers have been installed all throughout the edifice and are maintained at certain workstations. The propinquity readers grant or deny entree to a peculiar country of the edifice or database within a computing machine. Each employee is issued a image designation card with encoded information implanted in the cards micro chip. denoting what entree the employee is given.

Smith Systems Consulting has approximately 50 waiters at each location. Texas. Georgia and China. These waiters maintain the company’s merchandises that help them serve their clients. All web sites. personal databases and local country webs are maintained on Smith Systems Consulting waiters for easy entree to Smith Systems Consulting clients and Smith Systems Consulting employees working on undertakings for Smith Systems Consulting clients. All databases. web sites and package created at Smith Systems Consulting are copyrighted and to the full non-pirated. This gives the client the full rights to Smith Systems Consulting package and to no 1 else.

THE PURPOSE OF THE PROJECT

Client’s information must be held and kept secure from outside beginnings every bit good as employees that might see to compromise unity. There are controls and cheques in topographic point to supervise employees and the information that they are go throughing to guarantee security.

At Smith Systems Consulting the employees that work at that place have different degrees of entree as to the information that Smith Systems Consulting can see and entree for Smith Systems Consulting clients. Depending on what the employee works on or is the employees’ occupation responsibility will depend on the entree. If the employee works straight with a client than of course the employees have entree to that information. If the employees work indirectly with a client than the entree the employee have to that clients information is limited. Therefore. holding monitoring tools. badge entree Stationss and proctors for information that is being passed on that client is extremely monitored. This is another manner to maintain client information secure and confidential.

Stakeholders ASSOCIATED WITH THE PROJECT

Some of the industries that use Smith Systems Consulting services are transit. retail. fiscal services. fabrication and instruction. Smith Systems Consulting strives and has achieved this excellence because of Smith Systems Consulting employees. they take attention of the employees. the employees take attention of the clients and the remainder will take attention of itself ( Smith. 2006 ) .

ALSO READ  A Life Without Fear Essay Sample

Smith Systems Consulting is looking at spread outing Smith Systems Consulting services to the full United States. Presently. merely the Western United States from Houston Texas is being served. Expansion of services will intend rather a spot for SSC. More clients will make a demand for more work and more work requires employees. Smith Systems Consulting end is to go on to keep Smith Systems Consulting mark audience of companies. The companies have given Smith Systems Consulting experience to make new thought and implement new schemes non merely for Smith Systems Consulting clients. but for Smith System Consulting every bit good.

Service Request

Service Request

ORGANIZATION Name:

Smith Systems Consulting

Location:

Houston Texas. Atlanta Georgia. Beijing China

Petitioner:

Tanika McClain. Chris Posey. Josephine Smith and Hilary Wilton

Description OF Request:

Smith Systems Consulting ( SSC ) measuring ways in which the procedure of security and information direction can be improved to protect the employees of SSC every bit good as our clients and their concern. Outside judges will work closely with internal staff at SSC to find weak countries that can be improved with up -to-date processs to set up 100 % satisfaction within production.

BACKGROUND OF Request:

In early 2006. SSC expanded its United States operations to Beijing China for the 2007 Olympics every bit good as future concern after the Olympics are completed. The Olympic board chose SSC as their top pick to keep the web site and all databases for the Olympic games being held. Our web sites and databases would go information all over the universe in real-time so no 1 is left out. SSC feel that a security analysis will be good to us at this clip. as the Olympics taken really earnestly and are considered a prestigiousness around the universe.

EXPECTED RESULTS/IMPACT WHEN COMPLETED:

When the rating is completed. SSC program to sit down with internal section squad leaders and discourse the recommendations that the outside hearer has recommended and take them into consideration for execution. The consequences of the audit are non to state SSC what to alter. but to set up new thoughts to do informations direction and security that much more secure.

Smith Systems Consulting is researching the possibilities of heightening security processs and methods to keep an honest. corporate workplace that will in bend benefit the clients in which Smith Systems Consulting service.

The figure one precedence is the safety of the informations that Smith Systems Consulting maintains on Smith Systems Consulting waiters and who has entree to that information. Everyday. 100s of minutess are taking topographic point on Smith Systems Consulting waiters for Smith Systems Consulting clients that include sensitive informations. such as societal security Numberss. recognition card Numberss and bank history Numberss.

For the safety and security of Smith Systems Consulting employees. propinquity readers have been installed all throughout the edifice and are maintained at certain workstations. The propinquity readers grant or deny entree to a peculiar country of the edifice or database within a computing machine. Each employee is issued a image designation card with encoded information implanted in the cards micro chip. denoting what entree the employee is given.

Smith Systems Consulting has approximately 50 waiters at each location. Texas. Georgia and China. These waiters maintain the company’s merchandises that help them serve their clients. All web sites. personal databases and local country webs are maintained on Smith Systems Consulting waiters for easy entree to Smith Systems Consulting clients and Smith Systems Consulting employees working on undertakings for Smith Systems Consulting clients. All databases. web sites and package created at Smith Systems Consulting are copyrighted and to the full non-pirated. This gives the client the full rights to Smith Systems Consulting package and to no 1 else.

Client’s information must be held and kept secure from outside beginnings every bit good as employees that might see to compromise unity. There are controls and cheques in topographic point to supervise employees and the information that they are go throughing to guarantee security.

At Smith Systems Consulting the employees that work at that place have different degrees of entree as to the information that Smith Systems Consulting can see and entree for Smith Systems Consulting clients. Depending on what the employee works on or is the employees’ occupation responsibility will depend on the entree. If the employee works straight with a client than of course the employees have entree to that information. If the employees work indirectly with a client than the entree the employee have to that clients information is limited. Therefore. holding monitoring tools. badge entree Stationss and proctors for information that is being passed on that client is extremely monitored. This is another manner to maintain client information secure and confidential.

ALSO READ  Dramatic Irony In J.B.Priestley’s Plays Essay

SYSTEM DEVELOPMENT LIFE CYCLE METHODOLOGY

In order for Smith Systems Consulting to stay confident in the organization’s ability to show due diligence for information security and privateness. SSC hired KPG scrutinizing company to carry on a high-ranking security reappraisal called the Compliance Infrastructure. Policy and Physical ( CIPP ) . The CIPP provides IT direction with penetration into the major issues environing the direction and care of information and web systems. as mandated by current federal ordinances and industry enfranchisements. The CIPP will help direction in placing bing security and non-compliance failings specific to the organisation and supply clients and sellers with acceptable certification that the information is protected.

Analysis

The probe conducted by KPG scrutinizing company detected failings within the database waiter and package for information protection. To assist procure database connexions and define entree controls. a information flow diagram was created to track how information flowed through the applications. Next. topographic points where informations enter or issue were identified and the trust degree assigned to these entry and issue points. Privileges of any external user or procedure necessitating entree to the system were defined. The intent of the flow diagram is to configure and construct database applications with security as a cardinal driver to guarantee that informations stay secure.

Design

The CIPP is the most cost-efficient. non-intrusive ( 1-2 twenty-four hours ) manner for a security reappraisal to be performed. At the completion of the CIPP reappraisal. a elaborate written study with the findings and the recommendations were given to the senior executives and IT direction. The findings and recommendations will turn out to be really effectual in assisting to place the failings. The costs that are associated with the audit are estimated at $ 3500 for each security reappraisal.

Recommendations included. put ining package for information protection. such as a sensing engine and a information blocker. IT security of this type will protect client or employee information with names. references. societal security Numberss. and other identity-related information. IT security will protect client lists that could be used by a rival for poaching clients. trade secrets and rational belongings. confidential technology and fabrication programs for merchandises. and fiscal information or selling programs.

KPG recommended three taking companies that created data-leakage bar tools. They are Vontu. Inc. . Reconnex Inc. and Vericept Corp. TheVontu 6. 0 suite from Vontu. Inc. contains a set of tools that can supervise all types of web traffic. Vontu 6. 0 can be finely tuned to aim specific groups of employees. locations. or types of content.

Reconnex’s iGuard is a web contraption that monitors the content of outbound traffics and musca volitanss malicious activity. The Reconnex platform can be tuned to accommodate a company’s needs.

Vericent’s 360-degree Visibility and Control is a customizable tool preponderantly used for content monitoring. Vericent from Vericent Corp non merely monitors the whole scope of web traffic but besides proctors blog posters. confab suites and Web sites. all topographic points where sensitive company informations and secrets could stop up.

Execution

From the findings of the KPG auditing house. Smith Systems Consulting has decided to implement two of the three informations escape bar tools. The first to be implemented is the package Vontu 6. 0 suite. Keeping information secure is the highest precedence with the company so a tool that proctors all web traffic and can be customizable to supervise employees. other locations and types of content is the tool that is needed. After Vontu 6. 0 suite is implemented. the staff is to the full trained. and monitoring procedures are in topographic point. the Vericent package will be implemented. This package will give the company the capableness the go beyond supervising web traffic.

This will let for the monitoring of all web log posters. confab suites and web sites. This package will be on chat suites and net sites that are known for hackers and crackers to see so that the company can guarantee that our content is non placed at that place. Smith Systems confer withing believes that these tools will enable the company to travel above and beyond in client’s outlooks of security. To implement both package bundles will take about eight months with four months set aside to implement both package bundles. In order to fix staff there will be developing over a 6-week period per package bundle for a sum of 12 hebdomads.

ALSO READ  Security Guard and Dependable Security Agency Essay Sample

Support

In order to guarantee that the procedure that is implemented stays fine-tuned and refined a support construction will be developed and created to guarantee truth. Smith Systems Consulting will hold KPG Auditors come in every six months to supervise these new package bundles and the procedures that are put in topographic point for these systems. Outside of that Smith Systems Consulting will make two squads one to supervise and continuously back up both Vontu 6. 0 Suite and Vericent. These squads will be dedicated forces that will purely work with these package companies in the event of an outage job. supply ongoing preparation to forces and maintain the software’s in conformity. With these two schemes in topographic point the company should have maximal public presentation from this new-implemented package.

Decision

The overall undertaking proposal is to heighten the ambiance in which SSC operates while supplying their clients the most dependable and unafraid services possible. With locations in Texas. Georgia and China. SSC is committed to the truth of its work every bit good as the security and protection of sensitive client informations held within our informations substructure.

The audit from KPG will let senior IT staffers to place and modify any country that may demo a defect or failing and that could possible be a menace to our clients or their concern. The aim of SSC is to take the considerations into history and to keep unfastened communicating between the employees of SSC and KPG.

Security systems that presently monitor all SSC informations are our first precedence. This information contains sensitive information such as societal security Numberss. recognition card Numberss. phone Numberss and references. Smith System Consulting’s firewall system will undergo a strenuous trial to find if there are any loop holes within the system. KPG will try to chop into the system to prove the strength of our firewall.

The appraisal of secured entree informations at terminuss is recommended to be non merely watchword protected. but security clearance authorized. All employees will be issued a propinquity card which will so in bend give the employees entree to the edifice. but at their desk besides. they will be the lone one to entree the information at his or her terminal by showing the propinquity card to the reader at his or her desk.

KPG has besides informed us that they will be reexamining our systems development life rhythm program. SSC like to remain in front of the engineering kingdom and keep the highest quality of waiters. firewalls. and personal computing machines and laptops. This newer. quickly equipment will salvage SSC clip and money and will forestall SSC from holding to utilize the same computing machine for 10 old ages. The same will travel for our waiters. The waiter room is presently house at the chief central office of SSC in Houston Texas. The waiter room is a monolithic infinite lodging more than 100 waiters keeping 1000000s of spots of informations for our clients.

The Chief Information Officer of SSC hope that with the current audit of KPG. SSC will be able to supply the clients with a criterion of excellence and a preparedness to server. Smith System Consulting’s informations will be ready available to SSC employees at the point of a mouse chink. Smith System Consulting’s clients will be able to entree their informations 25 hours a twenty-four hours from secured waiter locations. and are guaranteed non to lose informations. At SSC. they guarantee. they will “make the net-work for you” !

Mentions

Smith Systems Consulting Virtual Organization. ( 2006 ) . Retrieved November 16.

2006. from hypertext transfer protocol: //ecampus. Phoenix. edu/secure/aapd/CIST/VOP/Business/Smith/SmithHome003b. htm