Lockheed-Martin Case Study

Improved Essays
In May 2011, Lockheed-Martin faced a cyberattack where hackers used malicious software (malware) to gain access to their VPN via the RSA SecurID software tokens employees have the ability to use in order to remotely gain access to its internal network. Once the attack was identified, the security specialist took the proper steps isolate and stop the attack before there was any loss of data. From what I assess from the case, the vulnerability in the RSA SecurID software is the biggest risk to the company at this point. In my research, from a technology perspective it was identified that there is a way that the number generation of the token can be copied. Lockheed is the United States government’s largest contractor, which make them a target for terrorists, or foreign governments that want to gain access to need-to-know information on weapons, communications, and aerospace systems which could cause grave danger to national security. With the types of data held on Lockheed servers and amounts of data, if compromised there may be a vested interest in possibly researching other remote technologies with hardened security measures to protect its information. Additional layers of malware protection could be an option as well. Keeping browser plugins patched, blocking peer-to-peer usage, and ensuring all operating system patches are applied when …show more content…
In the world of cybersecurity it is taught the user is the weakest link. Training and education to the staff is a vital piece of maintaining a strong security posture. It is recommended annual awareness training is a requirement to all personnel that have access to information or information systems at Sony, requiring them to sign documentation stating they were trained and understand the “do’s” and “don’ts” when accessing those systems. All recommendations provided in this white paper will require awareness and education to senior management and the

Related Documents

  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Furthermore, the savings offered within Northrop Grumman consists of benefit growth, contributions, company contributions, vesting, investment options, loans, rollovers, and retirement account contributions. The benefit growth is gained through contribution, Company Matching Contributions, Company Basic Contributions, Company Retirement Account Contributions, and through any investment earnings on all personal contributions. While growth is dependent on contribution, contribution can be achieved in many ways, including tax-deferred, traditional after-tax, or Roth 401(K) contributions within the annual IRS limits. On top of the employee’s contributions, Northrop Grumman will contribute, also known as Company Matching Contribution, based on a percentage or the current employee’s contribution to a plan. While most of the savings options are available to employees after their start date, there is a 3 year vesting requirement concerning Company Matching Contributions.…

    • 616 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Virginia Commonwealth State Agency-Northrop Grumman Critical System Outage The commonwealth of Virginia experienced an information technology storage area network outage on August 25th 2010. This affected several agencies and caused 13% of the file servers to fail. The failure mainly impacted the Department of Motor Vehicles and Department of taxation. Because of the outage problem, DMV couldn’t process driver’s licenses and couldn’t share data with other agencies. (1) DMV has been unable to process in-person driver’s licenses or ID cards at its 74 customer service centers.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Over time, Northrop Grumman has restated their commitment to hiring and retaining a diverse workforce and promoting women and people of color to mid-level and senior-level management. However, there has been nominal progress in these efforts, except for reported percentages of women and people of color in senior-level management positions. At the same time, participation in their Employee Resource Groups has declined. Women and people of color have reported in numerous studies that leadership development programs and access to strong mentors are important to them.…

    • 219 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Introduction The American company Lockheed Martin is a global, defense, aerospace, security and advanced technologies with worldwide interests. Lockheed martin was founded in March 1995. headquartered in Bethesda, Maryland, in the Washington, DC. Marillyn Hewson is the current President and Chief Executive Officer .my research is on the magnificent marillyn hewson and how she contributed to put the first stones on some of the powerful aircrafts and fighters. My goal is to empower her place in the world and show what women are capable off by writing this essay which I used our college library for amoung some other web sites .…

    • 124 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Background: Treasurer’s Operating Instruction 40-8 (TOI-40-8) for Corporate Guaranties and Letters of Credit (LC) dictates that when a non-U.S. government customer’s payment schedule, for any proposal valued over USD $1M, does not provide a Positive Cash Flow, Lockheed Martin must receive either a standby or documentary LC in the corporation’s favor. Otherwise, the business area must request a waiver of the TOI through the Trade Finance Senior Manager, based upon approval of the negative cash position by the business unit’s finance executive. According to the policy, a Positive Cash Flow is achieved when the program cash receipts will exceed program expenditures plus profit throughout the contract performance period. Expenditures include program…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Purpose The purpose of this document is to provide information about Lockheed Martin’s use of social media. Its social media goals, target audience, and effectiveness will be thoroughly analyzed. Social Media Overview Lockheed Martin implements a variety of social media platforms to promote their services and provide information to users. The company displays its general social media feed through its website.…

    • 765 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Northrop Grumman clearly has made its most significant strides towards diversity and inclusion efforts with respect to the LGBT community and veterans. The data published with respect to the hiring and retention of women and people of color, however, reveals there is room for improvement. A comparison of Northrop Grumman’s Corporate Responsibility Reports published for the last nine years revealed the total number of women comprising their workforce has remained stagnant around 27 percent, far below the reported 45% of women who made up the workforce in 2015. The number of women in mid-level management positions in 2015 were 24.5%, falling short of the 36.8% reported by S&P 500 companies. [cite catalyst]…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Jacob Dale, the director of IT department of Sunnylake needs to execute network security training in the entire hospital. Training of the staffs is also required because most of them were from traditional background and had little knowledge about IT. Some of the security fundamentals such as never leave the systems unlocked, enforcing well-built password policy, reset password every 45 days, take out admin rights so that the staff cannot set up software, execute policy to block weak sites. When workers focus on their own duties, they regularly don’t give attention to the following ordinary instructions for network security. Employees might accidentally guide to other security susceptibilities, as well as the unforeseen reception and spreading of computer viruses.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    As well as creating the legislature, public officials are creating back-up systems for their databases and information in case of a cyber attack. This is one of the best ways to thwart any cyber activity: by always staying one step ahead of the hackers (Kemp, 2012,…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays