All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Preliminary Security Assessment, Research Paper Example

Pages: 4

Words: 1142

Research Paper

Introduction

A network infrastructure refers to an integration of computer systems that are interconnected by various accessories of telecommunications architecture. For the case of an automotive industry, the is that of a Wide Area Network (WAN) since it will be used to serve many departments of the organization as well as other branches of the organization. It will include a wireless set-up but at the particular work-stations, there will be repeater stations installed to receive, amplify and retransmit the signals. For an automotive industry, the establishment of network infrastructure would mainly aim at efficient appointment scheduling, ordering parts, and even processing customer payments. The significance of the networks is to reduce cost and distance inefficiencies. They are implemented to match the current trends in the technological environment. Through automation of customer transaction, the industry can entice as many clients as possible, and in so doing, the revenue generated from such transactions is highly increased.

Automotive Enterprise Security Weaknesses

Automotive enterprises face a number of security challenges that may form part of their weaknesses that lead to inefficiencies in their operations with the employees and customers. One of the main security weaknesses in the enterprise would be data insecurity. Manual handling of customer transactions and the company’s operations processes limits data security.

Data integrity is one of the major issues that any enterprise would major on. A large automotive company like Toyota is under the risk of data pilferage, and this must put in place necessary measures to curb any of the available threats. Security weaknesses may also take the form of information inconsistency. Currently, the enterprise is faced with the challenge of inconsistency in handling customers. Therefore, transactions are done without proper communication with other sub-branches. This implies that the transportation and transfers have to be made physically to the other parts and departments of the organization. The Volvo motor vehicle company,, suffered the risk of data loss and inconsistency in handling customer inquiries and processing the transactions before including the big data transaction system. Due to these risks, in case a network infrastructure has been installed, there are policies that must be employed to defend the established network.

Network Defense Policies

These policies are necessary to ensure that the operations of the network infrastructure are efficient, and free from any security threats. Cybercrime has become the topic of the day, and it takes a number of dimensions. The policies that are used to secure the infrastructure can broadly be categorized into three:

  1. Governing Policy- this defines the security concepts that are vital to the automotive company, more specifically for managers and the technical assistants. This policy controls all security-related interactions among all the departments or outlets of the business enterprise. It exists at the same level with the company policies, and in maintaining proper security to the organization, the network security is defended.
  2. End-User Policies- these are policies relating to the network operators. They are the navigators of the network infrastructure. For an automotive company, this class includes the customers, salespersons, consultants, and other stakeholders of the organization. The policy is availed to the users in a single documentation and regards the security provisions that they must know, comply with, and implement, in their daily transactions.
  3. Technical Policies- Security staff members will put in place this policy to conduct their daily security operations. Within the enterprise network infrastructure, there must be those that are assigned to evaluate the security levels of the system that is implemented constantly. Technical policies are further subdivided into general policies, email policies, remote-access policies, personal device and phone policies, application policies, network policies, and wireless communication policy. There are other special policies relating to the network infrastructure and these include:
  • Extranet policy- this contains the requirements for third party members to access the network systems of the organization.
  • Minimum requirements for network access policy- this spells out the least requirements for a device to get connected to the company’s network.
  • Router and switch security policy: defines the least configuration levels for routers and switches used inside the automotive production network.
  • Server security policy- determines minimal security requirements for servers inside the automotive company’s production system network.

All these policies must be put in place to enhance the effectiveness end security level of the system. The automotive company network infrastructure can, however, be exposed to numerous vulnerabilities, and other potential exposures that pose a threat to its operations.

Network Vulnerabilities

One of the most likely vulnerabilities is the use of USB thumb drives in the individual workstations. This is the most common ways through which the network can be infected from inside a firewall. The Datsun motor company once went through a similar challenge when one of the technical operators infected the network system through a flash drive. The other vulnerability point is the Wireless Access Points (WAP). These points give room to hackers and other unidentified cyber criminals to access the vital information relating to the organization. TJ Stores, the owner of Marshalls and TJMaxx, underwent this kind of attack (Plunkett, 2008). These access points are highly insecure, irrespective of the encryption tools and techniques used to design and install them. The automotive industry is exposed to similar threats under the new network. Similarly, internal connections appear to be another weak point within the network. Internal members of the automotive industry may attempt to access points that are not meant for them. This exposes the entire company to risks of data insecurity and high possibilities of break-downs. It is important to brief and train the employees of the organization about the necessity of limiting their navigations to the restricted areas to avoid such cases as missing data.

Hardware and Software Risks

The automotive industry, however, in establishing the network system faces a number of risks that relate to the software and hardware components. There is the risk that the software and hardware requirements may be valued beyond the budget limits of the company. This implies that the organization may face financial constraints in coming up with an effective plan that can be fully implemented. The software that will be used in designing the networked system may be incompatible to the currently used software. The changeover strategies may eventually be very costly to cater for. In developing the networked system, the hardware components may be inappropriately installed. This may lead to high chances of the system frequently breaking down. The maintenance costs associated with the network may also be unbearable, given that the company is just upcoming. All these variables need to be considered when designing and implementing an effective networked system, especially for the automotive.

References

EC-Council Press. (2011). Security and vulnerability assessment. Clifton Park, NY: Course Technology Cengage Learning.

Manzuik, S., Gatford, C., & Gold, A. (2006). Network Security Assessment: From Vulnerability to Patch. Rockland: Syngress Pub.

Plunkett, J. W., & Plunkett Research, Ltd. (2008). The almanac of American employers 2009: The only guide to America’s hottest, fastest growing major corporations. Houston, Tex: Plunkett Research Ltd.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper