StudentShare solutions
Triangle menu

The Security Breach at Nelm - Case Study Example

Nobody downloaded yet

Extract of sample
The Security Breach at Nelm

However, there are serious flaws in the system configuration and the access control.
The first concern should be that an insider might be acquiring the information in question. There are currently members of the sales, engineering, and production that are sharing the files on the LAN. The files should be restricted and only available on a need to know basis. There should only be a limited number of people in the marketing department that have access to the advertising files. This would eliminate unauthorized access to this sensitive information by a member of the production or engineering staff.
If the attack is coming from an outside source, system access needs to be secured and limited. This may be done by the addition of an effective User ID and password system. The system should require regular changing of the passwords and have a mechanism to lockout the user after a limited number of failed attempts to stop a brute force attack. In addition, IP address monitoring should be implemented and users should be restricted to entering the system only from approved IPs. This would prevent off site hackers from gaining access to the system.
To further secure the system, the Web server needs to be properly configured. The web based e-mail system will give unauthorized users a portal that may be exploited if the server has security flaws in it. ...Show more


The security breach at Nelm has resulted in data being acquired by unauthorized users tapping into the system and gaining access to sensitive files. There is a concern that an insider is gaining the information on the advertising campaign and making it available to the Erm Company…
Author : harrisalana
The Security Breach at Nelm essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the case study on your topic
"The Security Breach at Nelm"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Security protocols
As per the scenario, Birmingham is considered to be the head office consisting of IT, Human Resource, Research and Development, Management, Marketing, Sales, operations and Finance. The other two branch sites have IT, sales, operations and manufacturing departments.
12 pages (3000 words) Case Study
Sony: The World's largest Data Breach
This essay discusses the internet has become vulnerable due to presence of many hackers ready to pounce on any control and security breach in systems, to make a fortune. Though the internet is a strange world that has not been perfectly maneuvered, firms have tried to incorporate different security systems though sophisticated hackers still get access to such systems.
4 pages (1000 words) Case Study
In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom.
6 pages (1500 words) Case Study
Network Security
With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised.
3 pages (750 words) Case Study
Notion of fiduciary trust and its breach
First and foremost, Merchant LTD is a shipper which engaged in a consignment agreement with Wavy Line Carriers wherein Wavy Line was responsible for the transport of 3,000 tons of timber from Felixstowe to Rotterdam. Upon receipt of the timber, Wavy Line issued a bill of lading.
6 pages (1500 words) Case Study
Security Plan
A computer system must be protected to access it from unauthorized persons. In addition, different methods and techniques are used to protect a computer system from unauthorized access. In this scenario, a
7 pages (1750 words) Case Study
It security
The company has employee strength of about 500 including IT workgroup of 112 personnel. Given that DechTech Solutions is an IT company, most of its processes and functions are automated
3 pages (750 words) Case Study
Using there published journals on computer science and information technology, the paper will draw up improvements and necessary changes that need to be done so as to make sure that the system works efficiently. The paper will also contain the steps
5 pages (1250 words) Case Study
Homeland Security
The term Homeland security started in 2003 when there was a reorganization of the state agencies after the devastating September 11th attack, hence seeing the formation of the Department
5 pages (1250 words) Case Study
Aviation Security
Due to the significance of this industry to a country, security is one of the primary concerns associated with aviation. Threats facing the aviation industry include terrorism, drug trafficking,
2 pages (500 words) Case Study
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us