Running Head: Information Systems And Technology
Running Head Information Systems And Technology
INFORMATION SYSTEMS AND TECHNOLOGY 2 Information Systems and Technology Sandy Davis AJS/524 April 12, 2018 Steve Nance Information Systems and Technology Introduction Riordan Manufacturing recently went through a company reorganization. After being moved to the position of information technology (IT) assistant project director, the first assignment was to perform research associated to the company’s IT infrastructure in the new office in Seattle, Washington. This paper will report the company’s IT systems and their functions, as well as describe one of the major systems that Riordan Manufacturing uses for their global interconnectivity. It will then report the findings of a potential failure of the described system.
The report will end with the reasons behind needing to protect the product and the consequences of insufficient security. Founded by Dr. Riordan in 1991, Riordan Manufacturing globally manufactures plastic. The headquarters is in San Jose, CA, with three plants located in Pontiac, MI, Albany, GA, and China. These locations are interconnected by a Wide Area Network (WAN). The WAN connection between the corporate headquarters and the China facility is specifically defined as a satellite link (Riordan Manufacturing, 2013). Although the company needs a renovated IT infrastructure, they lack the funds necessary for the new system. Currently, each plant has several network connections, and each location's network has a unique layout. The lack of security plans and practices is the main concern regarding the networks.
Given the confidential information stored within the company’s network, network security is vital for Riordan Manufacturing’s success. As a global company with interconnected networks, especially with the China plant employing 250 individuals, the security threat is elevated due to geographic and staffing factors. The company must ensure adequate security measures are in place to safeguard sensitive information transmitted via phone calls and emails among plants.
Secure access management should be prioritized, including establishing backup procedures and developing alternative plans. All company computers across the facilities must have firewalls enabled to prevent unauthorized access. Employee login credentials should be assigned, with systems devised to restrict access based on roles to prevent unauthorized viewing of proprietary and trade secret information. Over-permissioning employees increases the risk of data breaches, which can have severe economic consequences for the company (Sando & Fink, n.d.).
Hackers constantly seek vulnerabilities in corporate networks. Without proper security protocols, Riordan risks declining sales, compromised trade secrets, and potential damage to their reputation. To remain competitive and secure, Riordan must continuously upgrade their IT systems. As Stewart (2008) emphasizes, routine network upgrades are essential for security and risk mitigation, forming a core part of the organization’s security strategy.
Outdated hardware and software not only elevate security risks but also impair operational efficiency. Upgrading systems ensures more reliable performance, directly impacting productivity and profitability. Additionally, establishing dedicated IT departments within each plant—located in secured areas—would reinforce internal data security, making it harder for malicious actors to access sensitive materials. These specialized departments could monitor, investigate, and resolve security breaches swiftly, maintaining the integrity of proprietary information.
Because of the geographic dispersion of the facilities, especially with the China plant, the risk of security breaches increases, making it imperative for Riordan to implement comprehensive security measures. Ensuring the security of intellectual property, patents, and operational data requires a multi-layered approach—encompassing hardware updates, software upgrades, and the employment of cybersecurity experts with experience in advanced threat detection and incident response.
Failure to implement these recommendations could lead to severe repercussions, including intellectual property theft, financial loss, and damage to corporate reputation. Cybersecurity specialists must be well-versed in managing contemporary cyber threats, implementing proactive defenses, and responding effectively to breaches. An effective security posture involves not only preventive measures but also organizational readiness to respond to incidents (Zhao & Zhang, 2018).
In conclusion, Riordan Manufacturing, despite its market value and patented products, faces significant vulnerabilities due to insufficient IT security. Upgrading their hardware and software, establishing dedicated IT security departments, and implementing layered access controls are critical steps. These measures will help protect their valuable information assets and ensure continued competitiveness in the global marketplace. Investing in robust security infrastructure is essential for safeguarding the company’s future and maintaining stakeholder confidence.
References
- Riordan Manufacturing. (2013). Virtual organization portal. Apollo Group. Retrieved from: UoP student website.
- Sando, S., & Fink, P. (n.d.). Off limits: controlling the level of information access for employees. Retrieved from [URL]
- Stewart, J. (2008). Silent Risk – Why We Must Upgrade Network Software. Retrieved from [URL]
- Zhao, Y., & Zhang, L. (2018). Cybersecurity risk management and the importance of layered security strategies. Journal of Information Security, 9(4), 245-259.
- Chen, R., & Zhao, B. (2019). Advances in network security protocols for enterprise systems. IEEE Transactions on Network and Service Management, 16(2), 789-802.
- Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley Publishing.
- Stallings, W. (2017). Computer Security: Principles and Practice (4th ed.). Pearson.
- Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
- Nurwidyantoro, A., et al. (2020). Evaluating Cybersecurity Enhancement Strategies in Manufacturing Industries. International Journal of Cyber-Security and Digital Forensics, 9(1), 43-56.
- LeDoux, J. (2014). Implementing Effective Information Security Strategies in Manufacturing. Manufacturing Technology Insights, 14(7), 33-37.