StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software security engineering: Merging IT and Daimler Chrysler - Case Study Example

Cite this document
Summary
This research is being carried out to present a discussion of ten technical requirements that may aid in creating a workable synergy in technology operations for the DaimlerChrysler merger. For example, creating a synergy of software programs used internally related business division…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Software security engineering: Merging IT and Daimler Chrysler
Read Text Preview

Extract of sample "Software security engineering: Merging IT and Daimler Chrysler"

Merging IT and Daimler Chrysler Case Study The Daimler and Chrysler merger was viewed as a land business move in the auto industry that would greatly cut costs and create economies of scale in the premium auto industry. However as a result of the two companies agreeing to join their operations, some key issue emerged after the merger. One of them was the merging of key technological process and operations. Below is a discussion of ten technical requirements that may aid in creating a workable synergy in technology operations for the DaimlerChrysler merger.

Technical Requirements 1. Creating synergy of software programs used internally related business division. Prioritization- Immediate need: 1, Security Posture: 2, Complexity: 3, Resource Availability: 4, Cost: 5 Standards- Consolidating the current infrastructures based on technological systems of Chrysler and potentially saving $30 million in costs. Control- Key areas of focus in security controls include providing cross domain solutions, supply chain security and process control systems. 2.

Using Supervisory control and data acquisitions application in order to establish standards for what constitutes normal use and authorized access to business data and information. Prioritization- Immediate need-1, Security posture: 1, Complexity: 2, Resource Availability:3, Cost: 2 Standards- Implementing an insider threat detection and prevention mechanism for software’s. Controls- Using SCADA systems that are configured in the best way and can alert, monitor and control specific industrial processes. 3. Subscription to heavy internet bundle for the CATIA data exchange.

Prioritization- Immediate need-4, Security posture: 1, Complexity: 1, Resource Availability: 5, Cost: 1 Standard- Using high speed internet to transmit sensitive data in case of emergency requirement of CATIA data usage. Controls- using a network security protocol that will enable data security and no interception during data transfer. 4. Applying distributed control systems for electric car models and systems. Prioritization- Immediate need-3, Security posture: 1, Complexity: 1, Resource Availability:4, Cost: 1 Standards- distributed systems contain supervisory levels of overseeing that integrated subsystems for localized process work properly Controls- Deploying a feed forward control loops where key vehicle components maintain their quality in the long term. 5. Employing programmable logic controllers once the system is merged.

Prioritization- Immediate need-3, Security posture: 2, Complexity: 3, Resource Availability:4, Cost: 3 Standard- the logic controller will be suitable for the small subsidiaries and in synergy creation with the SCADA and DCs systems. 6. Firewall protection for the entire IT system Prioritization- Immediate need-1, Security posture: 1, Complexity: 1, Resource Availability:2, Cost: 1 Standards -In the case of maintenance services on the firewall, the firewall will be down and inactive. At this time the firewall ceases to protect the dedicated T1 connection and the file server.

This will pose a threat to all ePHI and violate the HIPAA security rule. 7. Datagram Protocols should be used in order to secure critical information and communication. Prioritization- Immediate need-2, Security posture: 2, Complexity: 2, Resource Availability:3, Cost: 2 Standard-The UDP (User Datagram Protocol) belongs to the Internet network protocols set, it is one of the major members of the Internet Protocol Suit. Control- send and receive messages in the form of datagrams to single or multiple hosts on an IP (Internet Protocol) network devoid of special transmission data paths or channels set up through prior communications. 8. Using a CDP type for data back-up.

Prioritization- Immediate need-3, Security posture: 2, Complexity: 2, Resource Availability: 2, Cost: 2 Standard-There would be shorter long haul distances between the two sites of data access. This translates to cheaper costs for the dedicated bandwidth required for CDP-type backup. 9. Ensuring management interface compromise is protected for data stored in cloud computing: Prioritization- Immediate need-3, Security posture: 2, Complexity: 2, Resource Availability: 2, Cost: 2 Standards-CPs provide to the users (employees of DaimlerChrysler), management interface for their resources on public Cloud infrastructures.

Controls- using CP audit and compliance tools that will filter out vulnerabilities. 10. IDS applications that isolate threats in the IT systems. Prioritization- Immediate need-2, Security posture: 1, Complexity: 3, Resource Availability: 2, Cost: 3 Standard- IDS alerts hold numerous key benefits. One key advantage of the IDS alerts is the prior notification of an impending breach in the corporate network. Control- employing the IDS alerts system. References

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software security engineering: Merging IT and Daimler Chrysler Case Study - 29”, n.d.)
Software security engineering: Merging IT and Daimler Chrysler Case Study - 29. Retrieved from https://studentshare.org/information-technology/1831246-case-study
(Software Security Engineering: Merging IT and Daimler Chrysler Case Study - 29)
Software Security Engineering: Merging IT and Daimler Chrysler Case Study - 29. https://studentshare.org/information-technology/1831246-case-study.
“Software Security Engineering: Merging IT and Daimler Chrysler Case Study - 29”, n.d. https://studentshare.org/information-technology/1831246-case-study.
  • Cited: 0 times
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us