Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Preliminary Security Assessment, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
A network infrastructure refers to an integration of computer systems that are interconnected by various accessories of telecommunications architecture. For the case of an automotive industry, the is that of a Wide Area Network (WAN) since it will be used to serve many departments of the organization as well as other branches of the organization. It will include a wireless set-up but at the particular work-stations, there will be repeater stations installed to receive, amplify and retransmit the signals. For an automotive industry, the establishment of network infrastructure would mainly aim at efficient appointment scheduling, ordering parts, and even processing customer payments. The significance of the networks is to reduce cost and distance inefficiencies. They are implemented to match the current trends in the technological environment. Through automation of customer transaction, the industry can entice as many clients as possible, and in so doing, the revenue generated from such transactions is highly increased.
Automotive Enterprise Security Weaknesses
Automotive enterprises face a number of security challenges that may form part of their weaknesses that lead to inefficiencies in their operations with the employees and customers. One of the main security weaknesses in the enterprise would be data insecurity. Manual handling of customer transactions and the company’s operations processes limits data security.
Data integrity is one of the major issues that any enterprise would major on. A large automotive company like Toyota is under the risk of data pilferage, and this must put in place necessary measures to curb any of the available threats. Security weaknesses may also take the form of information inconsistency. Currently, the enterprise is faced with the challenge of inconsistency in handling customers. Therefore, transactions are done without proper communication with other sub-branches. This implies that the transportation and transfers have to be made physically to the other parts and departments of the organization. The Volvo motor vehicle company,, suffered the risk of data loss and inconsistency in handling customer inquiries and processing the transactions before including the big data transaction system. Due to these risks, in case a network infrastructure has been installed, there are policies that must be employed to defend the established network.
Network Defense Policies
These policies are necessary to ensure that the operations of the network infrastructure are efficient, and free from any security threats. Cybercrime has become the topic of the day, and it takes a number of dimensions. The policies that are used to secure the infrastructure can broadly be categorized into three:
- Governing Policy- this defines the security concepts that are vital to the automotive company, more specifically for managers and the technical assistants. This policy controls all security-related interactions among all the departments or outlets of the business enterprise. It exists at the same level with the company policies, and in maintaining proper security to the organization, the network security is defended.
- End-User Policies- these are policies relating to the network operators. They are the navigators of the network infrastructure. For an automotive company, this class includes the customers, salespersons, consultants, and other stakeholders of the organization. The policy is availed to the users in a single documentation and regards the security provisions that they must know, comply with, and implement, in their daily transactions.
- Technical Policies- Security staff members will put in place this policy to conduct their daily security operations. Within the enterprise network infrastructure, there must be those that are assigned to evaluate the security levels of the system that is implemented constantly. Technical policies are further subdivided into general policies, email policies, remote-access policies, personal device and phone policies, application policies, network policies, and wireless communication policy. There are other special policies relating to the network infrastructure and these include:
- Extranet policy- this contains the requirements for third party members to access the network systems of the organization.
- Minimum requirements for network access policy- this spells out the least requirements for a device to get connected to the company’s network.
- Router and switch security policy: defines the least configuration levels for routers and switches used inside the automotive production network.
- Server security policy- determines minimal security requirements for servers inside the automotive company’s production system network.
All these policies must be put in place to enhance the effectiveness end security level of the system. The automotive company network infrastructure can, however, be exposed to numerous vulnerabilities, and other potential exposures that pose a threat to its operations.
Network Vulnerabilities
One of the most likely vulnerabilities is the use of USB thumb drives in the individual workstations. This is the most common ways through which the network can be infected from inside a firewall. The Datsun motor company once went through a similar challenge when one of the technical operators infected the network system through a flash drive. The other vulnerability point is the Wireless Access Points (WAP). These points give room to hackers and other unidentified cyber criminals to access the vital information relating to the organization. TJ Stores, the owner of Marshalls and TJMaxx, underwent this kind of attack (Plunkett, 2008). These access points are highly insecure, irrespective of the encryption tools and techniques used to design and install them. The automotive industry is exposed to similar threats under the new network. Similarly, internal connections appear to be another weak point within the network. Internal members of the automotive industry may attempt to access points that are not meant for them. This exposes the entire company to risks of data insecurity and high possibilities of break-downs. It is important to brief and train the employees of the organization about the necessity of limiting their navigations to the restricted areas to avoid such cases as missing data.
Hardware and Software Risks
The automotive industry, however, in establishing the network system faces a number of risks that relate to the software and hardware components. There is the risk that the software and hardware requirements may be valued beyond the budget limits of the company. This implies that the organization may face financial constraints in coming up with an effective plan that can be fully implemented. The software that will be used in designing the networked system may be incompatible to the currently used software. The changeover strategies may eventually be very costly to cater for. In developing the networked system, the hardware components may be inappropriately installed. This may lead to high chances of the system frequently breaking down. The maintenance costs associated with the network may also be unbearable, given that the company is just upcoming. All these variables need to be considered when designing and implementing an effective networked system, especially for the automotive.
References
EC-Council Press. (2011). Security and vulnerability assessment. Clifton Park, NY: Course Technology Cengage Learning.
Manzuik, S., Gatford, C., & Gold, A. (2006). Network Security Assessment: From Vulnerability to Patch. Rockland: Syngress Pub.
Plunkett, J. W., & Plunkett Research, Ltd. (2008). The almanac of American employers 2009: The only guide to America’s hottest, fastest growing major corporations. Houston, Tex: Plunkett Research Ltd.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee