What is the background of Harry and Maes Inc.?

  

You are to test your process model based on the attached case study. Take the collected information on current threats, vulnerabilities, risks and controls, and apply them to your case study. Use the attached threat process model along with any tools of your choice to analyze the threats and vulnerabilities associated with the case study organization. First you should collect information on current threats, vulnerabilities, and controls that apply to the assets described in your systems analysis. You should ‘walk through’ your model and use it to identify, analyze, and document threats, vulnerabilities, and risks. Do Not include recommendations at this time. That comes in the next step (Action Plan). Make sure you document any assumptions you’ve made during the analysis. Your entire analysis should be compiled into a single Word or PDF document that provides details on pertinent threats and vulnerabilities and how they apply to the systems in the case study. The audience for this is the executives of your client company. Explain any technical terms used in your report.
Bellevue University Cybersecurity Program
Harry & Maes Case Study
Instructions: Below are details about a fictitious business requiring improvements to its security. You
have been hired as a security consultant for this business. Use the details from this case study according
to the directions found in the various class assignments. The text in italics is the transcript from the video.
The other text contains details on the hardware and software infrastructure in place at the client.
Video Transcript
Welcome! Im Tom Pierce, the president of Harry and Maes Inc. Recently, my company suffered a
security breach where hackers obtained credit card data on over 25,000 of our customers. I need your
expertise to ensure this doesnt happen again. Come on, lets get started. First, Ill give you a little
background about my company and then I will go into detail about the security we currently have in place.
Harry and Maes Inc. is a diner franchise that supports over 100 diners located in New York, New Jersey,
Delaware, and Pennsylvania. Harry and Mae Pierce started the original Harry and Maes diner with two
railroad passenger cars back in 1954. Since then, his children and grandchildren have transformed the
company from a single restaurant into a chain of restaurants, and, most recently, to a publicly traded
franchise business. The franchise business provides restaurant owners with everything they need to open
and run their own operation, including buildings, fixtures, restaurant products, support services, and food.
As another service to franchise owners, we resell credit card payment processing services to them at
competitive rates. Harry and Maes reimburses, up front, for credit card transactions that are funneled
through their payment processing system as an incentive for franchise owners to use our services.
As for location of the corporate headquarters, Harry and Mae Inc. call Windsor, Pennsylvania home. Both
of the corporate headquarters and warehouses are located there. We built the campus from the ground
up at that location because it was central to our operation and both the business climate and tax structure
were favorable. The campus currently employs slightly over 400 people that see to the day to day
business operations.
What about our physical security, you may be asking. Well, the campus physical security system was
designed by a retired Army general. Its main features include a perimeter fence, cameras, smart card
access points, alarms, and a full-time security staff.
The campus also features a three-layer wired network infrastructure. Plus, it has full wireless access
provided by an Aruba Networks grid. Comcast Business Solutions provides Harry and Maes with
Internet. We have a number of security appliances and devices already in place, but Im not sure how
effective they are. As for the active directory domain, there is a single one for the entire campus. It was
configured using default settings, and uses the default domain group policy with one
exception. Password history and complexity requirements have been disabled to make it easier for
employees to use passwords they can remember and reuse them if they want. The rationale for making
this change was that I had difficulty remembering my password, so I began to write it down. A member of
the cleaning crew saw it and used my machine to view pornographic material. When I discovered the
breach, I fired the person responsible and directed the password policy change.
Bellevue University
As of March 2015
Page 1 of 6
Our headquarters also features servers, and web hosting; however, the specifics for each are a bit
detailed. Next, lets focus on the on and off campus workstations. The company has over 400 Dell
Optiplex 3020 workstations on campus. Each computer is installed with Windows 7. Plus, all computers
are joined to the companys Active Directory domain. Off campus, the default configuration for new
restaurants consists of a high speed Internet connection supplied by a local provider, a Network Address
Translation firewall device that includes a wireless access point, an office computer, and two point-of-sale
computer systems that include credit card processing software. Even though we try to stay up-to-date
with the latest software and hardware, our system is not immune to failure. While all employees have user
names and passwords for the system, there have been problems with computers becoming infected with
malware because the point-of-sale software can be minimized.
Now that Ive explained the history and background of my company as well as the infrastructure of our
system, its time to get to work. Visit your course site to check out your assignment. Be sure to ask your
instructor any questions that arise. Good luck!
IT & Security Infrastructure
Below are details on the Information Technology and Security infrastructure, policies, and equipment
currently in place at the client.
Physical security:
The campus physical security system was designed by a retired Army general. Its main features
include a perimeter fence, cameras, smart card access points, alarms, and a full-time security
staff. Access to all buildings on campus is restricted through smart cards. The server room is a
1600 square foot building within the main headquarters building. It has climate control,
redundant uninterruptable power supplies (UPS), and a generator with enough capacity for 36
hours of uninterrupted operation. The walls, floor and ceiling are constructed of reinforced
concrete and are two feet thick. In addition, the entire building is shielded against
electromagnetic radiation. It has an outer set of vault doors and an inner door that is equipped
with a biometric scanner. The interior of the room is equipped with fire, water, and motion
sensors, as well as cameras. The sensor and video feeds from the campus are centrally
monitored by a staff of three people 24 hours a day, seven days a week.
Wired network Infrastructure:
The wired network infrastructure consists of three layers. The innermost layer consists of
consists of two Cisco Nexus 7000 switches populated with M1-Series 8-port fiber optic switches
running NX-OS Release 5.0. These switches provide fully redundant 10Gbit connectivity
between servers, to the Internet, and to the second layer. The second layer consists of a 10 Gbit
dual fiber ring that provides connectivity between the core network and 2 Cisco ME 3600X
Series Ethernet Access Switches located in each building on campus. The third layer consists of
Gigabit copper local area networks that connect computers and Power over Ethernet (PoE)
Bellevue University
As of March 2015
Page 2 of 6
phones with Cisco 2960-S PoE switches that are located in communication closets in close
proximity to their users. Each subnet in the third layer is connected to the second layer through
both Cisco ME 3600X Series Ethernet Access Switches that provide access to the fiber ring for
the building. Layers 1 and 2 are fully redundant. Layer 3 doesnt provide redundant
connections, but less than 50% of the available ports are used on each switch. The
communication closets are equipped with patch panels that would permit network
administrators to manually bypass a defective switch.
Wireless connectivity on the campus:
The campus has full wireless access provided by an Aruba Networks grid. There are two Aruba
6000 Modular Mobility Controllers serving over 100 Aruba Networks AP-125 wireless access
points. The wireless network interfaces directly with the corporate headquarters wired
network. The mobility controller has the ability to serve as a firewall, but the default settings
currently allow all traffic in both directions. In addition, the president of the company has
directed that the current wireless system be configured to provide open access without logon
capability because he wants to make it as easy as possible for employees to use their mobile
devices. When asked about potential security issues, he said that the convenience of mobile
devices outweighs the risk. He is emphatically supporting BYOD throughout the company. He
had his physical security consultant walk the perimeter with a mobile device to confirm that the
signals from wireless devices on the campus were too weak to register.
Internet:
The Internet connection for the company is provided by Comcast Business Services. Comcast
provides a fully redundant 1000Mbps down and 50Mbps up fiber connection to the campus on a
fully redundant dual fiber ring consisting of two fiber pairs.
Security appliances:
The campus network has two Dell SonicWAll NSA 4600 Firewall Security Appliances that connect
the Comcast Internet connections to the core network. These two devices are currently
configured to allow all traffic in both directions. These devices are capable of up to 1000 VPN
connections each. However, the company chooses to forward VPN traffic through the firewalls
and handle it using a Microsoft PPTP solution.
The campus also has two Barracuda Spam & Virus Firewall 300 appliances. These devices are
located on the core network, and all mail traffic is forwarded through them. However, the
company has not activated the subscription that updates the signature files, and some users are
Bellevue University
As of March 2015
Page 3 of 6
complaining about excessive SPAM. Other users (especially Sales and Accounts) are
complaining about missing email.
Active Directory Domain:
There is a single Active Directory domain for the entire campus with two Domain Controllers. It
was configured using default settings, and uses the default domain group policy with one
exception: password history and complexity requirements have been disabled to make it easier
for employees to use passwords they can remember and reuse them if they want. The rationale
for making this change was that Tom Pierce had difficulty remembering his password, so he
began writing it down. A member of the cleaning crew saw it and used Toms machine to view
pornographic material. When Tom discovered the breach, he fired the person responsible and
directed the password policy change. There are five members of the IT group with domain
administrative privileges.
There is a second AD Organization Unit set by the Chief Financial Officer for the Accounting and
Finance Group. In this OU, all administrative assistants are also administrators in order to
quickly add or remove user accounts. This OU has full password complexity turned on.
Servers:
The headquarters has a 200TByte HP StorageWorks Storage Area Network (SAN) that provides
storage for 10 Hewlett Packard ProLiant DL380 G7 servers. The firmware and drivers was last
updated in July 2013. The HP servers are running VMware vSphere Hypervisor (ESXi) version
5.1. On that virtual platform, the company currently hosts redundant virtual servers for their
domain controllers, Inventory Tracking System (ITS) Point of Sale (POS) system, accounting
system, payment processing system, email system, Web site with database support for active
content, Windows Routing and Remote Access Server (used for VPN connections,)
authentication services, and database management systems. All virtual machines are running
Microsoft Windows Server 2012 Datacenter edition. The administrative staff elected to not
install antivirus software on any of the virtual servers, as that would slow them down. After all,
Web browsers are disabled on all servers and by policy administrators are not allowed direct
access or email.
The Web servers (IIS) and Email servers (Microsoft Exchange Server 2010 SP3) have two network
connections: an internal one and external one with a public IP address. There are no firewalls
on the external connections. The Web Server uses SSLv3.0 for any sensitive pages along with
certificates signed by Verisign. Web developers move web pages to the Web server using File
Transfer Protocol (FTP). FTP is enabled for both internal and external networks, as some
programmers access the Web server from home. Security is enabled, so they must log in using
Bellevue University
As of March 2015
Page 4 of 6
their Active Directory user accounts. In addition, the system administrators have discovered
that FTP is a convenient way to move files, and they often log in using their accounts, as well.
Using the FTP server as a staging server, it is possible to move files from the outside to the Web
server, and then from the Web server to a workstation.
Web hosting:
The Web server is used to host the companys web site. The site has two parts that are both
hosted on the same server, a public part that is available over the Internet using the companys
URL http://www.harryandmae.com, and a private part that is available on the internal
network only that is accessible only by using the internal URL http://www.haryandmae.local.
Employees can log into the private Web site using their Windows login credentials and view
their pay statements, work performance reports, vacation time, and other personal information.
The franchise owner in Scranton, PA purchased and uses the domain www.HandMScranton.com
for customers at his three restaurants. He also has an active Facebook page and Twitter and
Instagram accounts. He often runs contest using these sites.
Campus workstations:
The company has over 400 Dell Optiplex 3020 workstations with Windows 7 Professional
installed. All computers are joined to the companys Active Directory domain. These computers
are configured for IPv4 only, and IPSec is disabled by group policy. All workstations have
Symantec Endpoint Protection installed. About 1/3 of employees have local administrator
access in order to install and run applications. The company uses WSUS to update Microsoft
applications. There is no standard process for updating other programs.
In spite of the new relaxed password rules, some employees still write their passwords down,
and they can be found taped to the inside of drawers, on the bottom of mouse pads, or on notes
stuck to their monitors. The company uses a Web front end for all of its applications, and the
workstations are capable of accessing them using Microsofts Internet Explorer. IE10 is the
company standard. Some employees have installed and use other browsers. Remote users
have access to the same applications via the VPN.
Off campus:
The default configuration for new restaurants consists of a high speed Internet connection
supplied by a local provider, a Network Address Translation (NAT) firewall device that includes a
wireless access point, an office computer, and two point-of-sale computer systems that include
Bellevue University
As of March 2015
Page 5 of 6
credit card processing software. The WAP router at each store is procured and set-up by the
franchise owner. All franchises are supposed to have free Internet WiFi for customers. All
computers are Microsoft Windows 7 machines with Norton Antivirus software. All employees
have user names and passwords for the system. There have been problems with computers
becoming infected with malware because the point-of-sale software can be minimized. Pointof-sale computers connect with the corporate headquarters for payment processing using
Microsoft PPTP VPN clients on each machine.
Bellevue University
As of March 2015
Page 6 of 6
Current Trends in Cybersecurity
CYBR 650
Huber, Dennis L, Bellevue University
6/20/2016
Abstract
This document covers the threat model process used to address, mitigate, and ultimately
resolve the Enterprise IT infrastructure service failure. The document briefs the whole
process and also contains the process flow chart of the whole process.
Service Interruption Reporting:
1. Whenever there is a service interruption it can be reported by the end user/ customer or
employees. It can also be reported by phone call or email.
a. If reported by phone:
i.
Record all the important details of failure. The user details, failure details
e.g.: date, time, error, service details, affected sites, impact of the
interruption.
ii.
Verify all the information provided by local IT team.
b. If reported by email:
i.
Review all the information provided by user/customer or employees.
All the necessary information should be there in mail, if not, contact the
sender again to get all the necessary information.
ii.
Verify all the information provided by local IT team.
Determine the Impact of the Issue:
2. Determine the urgency, risk involved and impact of the issue on actual production.
a. Categories the issue as Low/Medium/High urgent problem.
Involve Third Party vendor/ service Provider:
3. Involve third party vendor/service provider responsible for the service.
a. Provide all the required details of service failure to third party Vendor / service
provider.
b. If third party Vendor / service provider are already aware of the interruption;
obtain information about their action plan to resolve the interruption.
c. Request third party Vendor / service provider to provide their trouble ticket
number for the issue so it can be recorded in ITSM ticket and referenced in future
correspondence with third party vendor / provider / end user.
ITSM Incident Management Process:
4. Open an ITSM incident ticket with all the information and create Master Station Log
(MSL) entry ensuring the details obtained from the Vendor /service provider is entered
into both documents for future reference. Also set the SLA as per the nature of impact,
priority, risk and Enterprises standard.
Request for workaround/ Back-up Plan from Service Provider:
5. Request for workaround/ Back-up Plan
a. Depending upon severity of the interruption and / or the length of time with which
the organization can reasonably expect the interference to be resolved, arrange the
appropriate hardware component and request the coordination with the third party
Vendor / service providers engineering department to obtain alternate solution to
restore services to the adversely impacted sites. Also, ask for workaround if any.
Regular update of the Issue:
6. Take regular updates from the service provider on their action plan and Expected time to
restore the service. Send these updates to the impacted user on regular intervals. Also,
update the ITSM ticket with the recent working in work log.
Monitor the incident:
7. Monitoring the incident of service failure:
a. Keep monitoring the incident until resolved and also after resolution because the
chances of it getting failed again are high once repaired within 24-72 hrs.
b. Update corresponding ITSM ticket with the details provided by the third party
Vendor / service provider and the corroborating entities and then place in a 24-72
hour monitor.
Resolve the incident:
8. Resolve the incident of service failure:
a. Once an issue reaches the end of its monitoring period, obtain final UAT from the
impacted customers prior to closing the associated ITSM ticket.
b. After the testing is done from the user side, close the ITSM ticket with all the
resolution steps so that it can be referred in future for similar issues.
c. Also, request for a root cause analysis from the third party vendor/service
provider so that the future incidents can be prevented if cause is known.
Figure 1
Organizations IT infrastructure service (e.g.: UC
services, storage services, network services etc.)
Initial notification
of service failure
NO
By
customers
via mail/call
Failure
affecting
production?
Gather all details of
failure (error, date,
time, service details,
all use case testing
details etc.)
NO
By
employee
via phone
call/mails
Service
Restored?
Notify service
provider and obtain
action plan
YES
ITSM Incident Management
Process
Service Restoration Process
Submit request to local
IT team to change the
hardware as per the
guideline
NO
NO
Send request for backup or workaround
YES
Failure
affecting
production?
Has the
service
provider
been
notified?
Track implementation
of backup or
workaround
YES
Cybersecurity Harry and Maes Case Study Systems Analysis
CYBR
University
6/23/2016
Table Contents
Abstract…………………………………………………………………………………………………………………………………….. 3
Facilities Physical Description ……………………………………………………………………………………………………. 4
Policy Documentation ………………………………………………………………………………………………………………… 4
Case Study Standards and Procedures ……………………………………………………………………………………….. 5
Critical Organizational Assets ……………………………………………………………………………………………………. 6
Network Diagram………………………………………………………………………………………………………………………. 7
Review ………………………………………………………………………………………………………………………………………. 8
Network Diagram………………………………………………………………………………………………………………………. 9
Abstract
The system analysis report offers a description of Harry and Maes IT architecture and
environment in the present. It describes the physical characteristics of the facilities and includes
the list of company IT assets and security structures such as: the servers, workstations, firewalls,
switches, wireless access points and domain controllers. The report also includes a network
diagram to map the companys network infrastructure and a documentation of the set policies
and standards as well as the procedures the company follows to maintain their franchise
business. In addition, the report presents the identified sources of system vulnerabilities and the
potential damage they can cause in the system.
Facilities Physical Description
Both of the corporate headquarters and warehouses are located in Windsor, Pennsylvania.
The campus runs the central operations with a staff of 400 people. The campus has a perimeter
fence, cameras and alarms installed, security staff stationed at all times, and access that is
restricted to smart cards. The building has a 1600 square foot server room where multiple UPS
and a generator are located. The room has cameras and sensors to detect fire, water, and motion.
There are a set of outer vault doors with the inner door having a biometric scanner. The facility is
shielded against electromagnetic radiation and the walls, floor and ceiling are two feet thick
concrete.
Policy Documentation
The campus policy is that the sensor and video feeds are monitored from a central
location throughout the day all year round by a staff of three people. The company encourages
employees to bring their own devices to work as it is now widely accepted by many
organizations. The president influenced the set policy to have the companys wireless system
configured to enable easy access without having to logon. This has made it easier for employees
to use their mobile devices given the convenience that is achieved due to mobility capabilities
and comfort of using personal devices. The wireless devices signal is weak around the perimeters
to make sure that it was impossible to register. The company policy prohibits administrators
from installing or updating the server as it will slow the servers or direct access to emails.
All the new restaurants are required to have high speed Internet connection, a Network
Address Translation firewall with a wireless access point, computers running Microsoft
Windows 7 with Norton Antivirus with one for the office, and a pair of point-of-sale computer
systems that accept credit cards. The franchise owner is responsible for purchasing and setting up
the WAP router at the location. The store should also provide free Wi-Fi for their customers. For
the credit card payment processing, Harry and Maes offers incentives in the form of
reimbursement to franchise owners up front, for credit card transactions made through the
payment processing system.
Case Study Standards and Procedures
The franchise is responsible in providing buildings, fixtures, restaurant products, support
services, and food to restaurant owners to make it easy to open and run. In addition, the franchise
provides credit card payment processing. The franchise must have all computers running
Microsoft Windows 7 with Norton Antivirus. The stores employees should have usernames and
passwords to login to the system.
The standard way to access the facility is through smart cards. The Internet connection to
the campus is a redundant dual fiber ring provided by Comcast Business Services. The facility
has a wired network infrastructure consisting of dual fiber ring to connect the core network and
the campus buildings Access Switches in a redundant manner. The facility has two Modular
Mobility Controllers to serve the wireless network access points.
The campus has a single Active Directory domain with default settings configurations but
the password features on complexity and history are disabled. The Chief Financial Officer has
set up an Organization Unit with full password complexity for the Accounting and Finance
Group with the administrative assistants having the capabilities to add or remove user accounts.
All the computers are in companys domain, have IPv4 configurations with IPsec disabled and
are protected by Symantec Endpoint Protection. Only a third of the employees have
administrator privileges to install and run applications. The policy administrators disable all the
server Web browsers to block the administrators direct access to email or install anything on the
servers.
The company has redundant virtual servers running Microsoft Windows Server 2012
Datacenter edition, for the domain controllers, payment processing system, email system and
other systems such as the Inventory Tracking System and the Point of Sale system. The Web
servers and Email servers both run Microsoft Exchange Server 2010 SP3 and have internal and
external IP addresses. The web server uses the File Transfer Protocol to move web pages with
the sensitive web pages signed by Verisign. The FTP server offers convenience since, it acts as a
staging server making it possible to move files from the outside to the workstation. The mail
traffic in the core network is forwarded through Barracuda Spam & Virus Firewall 300
appliances. The company VPN traffic is forward through the firewalls and handled by the
Microsoft PPTP solution.
There are two sites hosted on the server, one accessible through the Internet through the
companys URL http://www.harryandmae.com, and the other is accessible in the internal
network through the internal URL http://www.haryandmae.local. From the internal URL,
Employees can login with their credentials to personal information relating to their work. The
standard browser is Microsofts Internet Explorer. IE10 which is used to access the applications.
Critical Organizational Assets
The organizations has critical assets that ensure normal running. These assets are the
servers, Uninterruptable power supplies, generators, Storage Area Network, Firewall appliances,
Mobility Controllers, workstations, Network Address Translation, wireless access points and
WAP routers.
The generator and UPS ensure the servers run for 36 hours without the main power
operation. The servers are the domain controllers, Web servers, Email servers, and the FTP
server. The active directory resides in the domain controller. There are two domain controllers to
handle the organizational unit and the whole organization. The 10 Hewlett Packard ProLiant
DL380 G7 servers have a storage of 200TB HP Storage Works Storage Area Network in the
headquarters.
There are 400 Dell Optiplex 3020 workstations running Windows 7 Professional. Each
franchise store has an office computer, and two point-of-sale computer systems all running
windows 7. The campus has two Barracuda Spam & Virus Firewall 300 appliances in the core
network to handle the mail traffic. The Network Address Translation (NAT) firewall devices are
located in all the stores and come with a wireless access point.
The campus has a redundant dual fiber ring with 1000Mbps down and 50Mbps up.
The two Aruba 6000 Modular Mobility Controllers servers that handle over a 100 wireless
access points. The over 100 Aruba Networks AP-125 wireless access points, offer an interface to
connect the wireless devices to the wired network. The WAP router in each store is responsible
for managing network traffic from the store local network and the outside may it be the VPN or
the internet.
Network Diagram
The wired network has three layers. The first layer from the inside has two Cisco Nexus
7000 switches connected to several M1-Series 8-port fiber optic switches. The switches offer
redundant connectivity to the Internet, the next layer and between servers. The second layer has a
dual fiber ring to connect the core network and each campus buildings Cisco Ethernet Access
Switches. The third layer consists of a copper LAN that connects computers and Power over
Ethernet phones. The wireless access points provide an interface through which wireless devices
can connect with the wired network.
Review
The company has several vulnerabilities identified. There are cases of users getting lots
of spam mails or losing emails due to the inactive subscription to signature files updates. Despite
the lenient password policy, the employees are still writing down their passwords making it
easier for attackers to gain unauthorized access. The password policy makes it easy to breach
security with the lack of complexity and repetition of passwords. In case a user happens to know
an administrator password, the user may have access to classified information. The worst case
would be if the administrator reuses the same password over and over making it easier for
unauthorized users to know and consistently use the password.
The lack of authentication and open access to the organization wireless network is a
source of vulnerability, since, anyone who visits the organization and is in a good signal range
can easily get access to the organizations network. This is enough to do network scanning and
port enumeration easily which are crucial social engineering hacking steps.
The organization connects the firewall to the internet and the firewall is behind. The
firewall lacks the each connections VPN encryption keys. Therefore, all tunneled data is
allowed since the firewall can only filter plaintext headers. In addition, the mobile controller can
be used as a firewalls but is left with default settings to allow all traffic in both directions. The
lack of filtering is not advisable since this presents an opportunity to launch a denial of service
attack by sending a lot of requests to the application servers causing them to hang.
Network Diagram
Figure 1

Introduction:

Don't use plagiarized sources. Get Your Custom Essay on
What is the background of Harry and Maes Inc.?
Just from $13/Page
Order Essay

In the modern digital age, cybersecurity has become one of the most critical aspects of any business. Every company strives to safeguard sensitive data and systems from various security breaches and cyberattacks. In this regard, the Harry & Maes case study provides an excellent example of a fictitious business that has suffered a security breach where hackers obtained credit card data on over 25,000 of their customers. The company needs the assistance of a cybersecurity expert to ensure that such an event does not recur in the future.

Description:

As a cybersecurity consultant for Harry & Maes Inc., you have been tasked with identifying and analyzing current threats, vulnerabilities, risks, and controls. Using the provided threat process model and other relevant tools, you should analyze the security status of the organization and document any assumptions made during the analysis. The analysis should be compiled in a single document and presented to the executives of the client company.

Harry & Maes Inc. is a publicly traded franchise business that operates over 100 diners located in different parts of the United States. The company provides restaurant owners with everything they require to open and operate restaurants, including buildings, fixtures, restaurant products, support services, and food. Additionally, the company resells credit card payment processing services to its franchise owners and pays for credit card transactions funneled through their payment processing system as an incentive for franchise owners to use their services. The corporate headquarters and warehouses are located in Windsor, Pennsylvania.

To ensure the security of the company’s assets and data, you need to identify the current threats, vulnerabilities, and controls that apply to the company’s systems. Afterward, you should use the provided threat process model and other relevant tools to analyze the threats and vulnerabilities associated with Harry & Maes Inc. Finally, you should document your findings and provide recommendations on actions that the company can take to minimize future risks.

Objectives:
– To test the process model based on the Harry & Maes case study
– To collect information on current threats, vulnerabilities, risks, and controls
– To apply the collected information to the case study organization using the threat process model and other related tools
– To identify, analyze, and document threats, vulnerabilities, and risks
– To compile the analysis into a single document for the client’s executives

Learning Outcomes:
– Students will be able to analyze current threats, vulnerabilities, risks, and controls in an organization
– Students will be able to apply the threat process model and other related tools to a case study organization
– Students will be able to identify, analyze, and document threats, vulnerabilities, and risks in an organization
– Students will be able to compile an analysis into a single document for client executives
– Students will be able to explain technical terms used in their reports

Solution 1:
Identifying Threats, Vulnerabilities, and Risks in Harry and Maes Inc.
Based on the given case study, Harry and Maes Inc. faces several threats, vulnerabilities, and risks to their security. These include:

Threats:
– Cyberattacks by hackers trying to steal credit card data
– Insider threats by employees with access to sensitive information
– Physical security threats to the corporate headquarters and warehouses

Vulnerabilities:
– Lack of proper network segmentation and access controls for sensitive data
– Poor password management practices
– Outdated software and operating systems
– Lack of monitoring and detection systems

Risks:
– Financial losses due to credit card fraud or data breaches
– Reputational damage due to loss of customer trust
– Legal and regulatory fines due to non-compliance with data protection laws

Solution 2:
Assessing Controls and Making Recommended Improvements in Harry and Maes Inc.
To improve the security of Harry and Maes Inc., the following measures should be taken:

1. Implement proper network segmentation to isolate sensitive data and limit access only to authorized personnel. Use firewalls and access controls to restrict unauthorized access.
2. Enforce strong password policies that require regular changes, avoid default or weak passwords, and implement Multi-Factor Authentication (MFA) where possible.
3. Regularly update software and operating systems on all devices to ensure they are protected against known vulnerabilities and exploits.
4. Implement a security information and event management (SIEM) system to monitor network traffic and detect any suspicious activity.
5. Conduct regular security awareness training for employees to educate them on security risks and best practices.
6. Review and update any third-party contracts, service level agreements, or vendor agreements to ensure they comply with data protection laws and regulations.
7. Develop and implement an incident response plan to address security breaches and minimize the impact of any incidents.

These measures will help protect Harry and Maes Inc. from cyber threats, safeguard sensitive data, and ensure compliance with data protection laws and regulations.

Suggested Resources/Books:
– “Cybersecurity for Beginners” by Raef Meeuwisse
– “Managing Risk and Information Security: Protect to Enable” by Malcolm W. Harkins
– “Security Metrics: Replacing Fear, Uncertainty, and Doubt” by Andrew Jaquith
– “Practical Cryptography” by Niels Ferguson and Bruce Schneier
– “Hacking Exposed: Network Security Secrets and Solutions” by Stuart McClure, Joel Scambray, and George Kurtz

Similar Asked Questions:
1. What are some common threats and vulnerabilities in the restaurant industry?
2. How can a business prevent credit card data breaches?
3. What are some best practices for securing payment processing systems?
4. How can a business analyze its current security controls and identify potential weaknesses?
5. What steps should a business take after experiencing a security breach?

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?