Assignment 5
.docx
keyboard_arrow_up
School
Louisiana State University, Shreveport *
*We aren’t endorsed by this school
Course
703
Subject
Business
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by DukeChinchilla4255
Assignment 5
Louisiana State University, Shreveport
MBA703
February 18, 2024
As read about in Information Systems: A Manager’s Guide to Harnessing Technology there are many steps a company can take to prevent cyber-attacks from occurring. Some of the critical controls that could have been employed to prevent this attack include controlled use of credentials, malware defenses, monitoring, audit logs, data encryption/protection and having an incident response plan/team (Sanchez,2016). Organizations who adopt these critical controls are less likely to be attacked and are more capable of preventing and responding to future attacks.
The 2014 hack on Sony was not the company’s first attack either. While it was not as large the company suffered a massive breach to their online network and at the time it was the largest breach of personal data in history (Sanchez,2016). After this breach, it was released that Sony did
not encrypt its data and did not have proper security measures in place. It was also revealed that the company did not use up to date applications or employ firewalls to protect information at all. Sony released that it was going to rectify these issues and the company was going to implement new security and procedures to prevent this from happening in the future (Sanchez,2016).
The company should have learned from their initial attack in 2011 and had stated that they were going to introduce monitoring and malware defenses. If even a few critical controls were implemented, then the company would have been notified of the 2014 breach and would have been able to respond accordingly even with it being “a very sophisticated cyberattack” (Sanchez,2016). Sony obviously did not adequately handle their technology when it came to being breached. After the attack in 2014, the company made a list of changes they said they would make (The Sony Pictures Entertainment Hack Case Assignment). A few of these included securing their firewall, data encryption/ protection and two step authentications. As long as these things as well as the other systems they stated are put in place the company should be in a lot better of a spot to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Principles of Information Security
Q : Explain how understanding the available cybersecurity defenses would help organizations prioritize risk mitigations as part of a defense-in-depth strategy
arrow_forward
Suppose your company has an e-commerce Website for selling different types of goods and services. Discuss the followings:
i) Ethical concerns associated with storing and analyzing user data?
ii) How would you use intrusion detection system to control security threats that face this website?
arrow_forward
5 You are a midlevel manager at a major metropolitan hospital and are responsible for capturing and reporting statistics regarding the cost and quality of patient care. You believe in a strict interpretation when defining various reportable incidents; as a result, your hospital's rating on a number of quality issues has declined during the six months you have held the position. Your predecessor was more lenient and was inclined to let minor incidents go unreported or to classify some serious incidents as less serious. The quarterly quality meeting is next week, and you know that your reporting will be challenged by the chief of staff and other members of the quality review board. How should you prepare for this meeting? Should you defend your strict reporting procedures or revert to the former reporting process for the "sake of consistency in the numbers," as several people have urged?
arrow_forward
Please read carefully and answer the questions in the case scenario:
SBM CHAPTER 3
You Make the Call-Situation 3
Please read carefully and answer case questions:
Jay Sorenson of Portland, Oregon, created a product called the Java Jacket, which is a patented
honeycombed insulating sleeve that slides over a paper cup containing a hot beverage to make it
comfortable to hold. Having introduced the new product to the market, Sorenson has already cut deals
with coffeehouses, specialty stores, and convenience stores nationwide. He started the business with
$15,000 in 1993, but his 2003 sales were projected to be between $12 and 15 million. Sorenson is now
in a position where he would like to continue expanding his business, but he is concerned that large and
established competitors could introduce their own variations of the same product.
Question 1
Will the market for Sorenson's product continue to grow in the years ahead?
Question 2
If he is successful, what sources of competition should he…
arrow_forward
Describe briefly the Classifications and Spectrum of disaster management. (500words)
arrow_forward
(iii)What actions can people take to reduce these kinds of incidents?
arrow_forward
Recite all elements of the health and safety management model in HSE’s ‘Successful Health and Safety Management’ (HSG65)
arrow_forward
Chapter 8 Interactive Session: Technology: BYOD: A Security Nightmare?
What management, organizational, and technology issues must be addressed by smartphone security?
arrow_forward
Prioritize identifying and explaining at least three recommended practices to businesses, especially those using the cloud, so that they can safeguard their data and other resources.
arrow_forward
Research what CERT is in relation to cybersecurity. What is the purpose of a CERT? Is there more than one CERT? Provide a summary of the most frequent, high-impact types of security incidents currently being reported by US-CERT
arrow_forward
•You’re applying to work in the human resources department of a large retail organization. During the application process, you’re asked to take a test that gives you scenarios related to theft working as a cashier.
•Does this test have high or low face validity given the position you’re applying for? Explain exactly what aspects are of the test/scenario that lead you to believe that there is either high or low face validity behind this integrity test.
arrow_forward
PO6 The Engineer and Society (ESSE) - Apply reasoning informed by contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to
professional engineering practice and solutions to complex engineering problems;
LO1 To internalizes the roles as responsible engineers towards Creator and society
PO8 Ethics (ESSE) – Apply professional ethics with islamic values and commit to responsibilities and
norms of professional engineering code of ethics
LO3 To demonstrate ethical principles in leadership, behavior and character with continuous self-
development
By using the 7 steps method - Please evaluate the case.
Questions
False Trip Report. A Senior Design Engineer and a Senior Fabrication Engineer scheduled a trip to review a very complex tool for an injection molded part at the supplier's plant. They had been there on previous occasions over a span of many months. This complex long lead part was being developed with early…
arrow_forward
Ethical Dilemma
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.”
The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting…
arrow_forward
Assume your organisation has an e-commerce Website where you sell various items and services.
Discuss the following points:
I Are there ethical considerations with retaining and analysing user data?
ii) How would you employ an intrusion detection system to combat security risks to this website?
arrow_forward
Safety? What Safety?
Topic: Corporate Social Responsibility
Characters: Bob, President John, Chemical Engineer Henry, Controller Kirk, Assistant
Controller
Kirk was a bright individual who was being groomed for the Controller’s position in a
medium-sized manufacturing firm. After his first year as Assistant Controller, the
officers of the firm were starting to include him in major company functions. For
instance, today he was attending the monthly financial statement summary given at a
prestigious consulting firm. During the meeting, Kirk was intrigued at how all the
financial data he had been accumulating was transformed by the consultant into
revealing charts and graphs.
Kirk was generally optimistic about the session and the company’s future until the
consultant started talking about the new manufacturing plant the company was
adding to the current location and the costs per unit of the chemically plated products
it produced. At that time, Bob (the President) and John (the…
arrow_forward
Give a short overview of each of the five risk-management techniques.A 39
arrow_forward
Review the AS ISO 31000:2018 Risk Management – Guidelines.
1. Outline the purpose and key features of organisational policies, procedures and processes for risk management. (200 - 250 words)
arrow_forward
Development of an organization's information system (IS).
arrow_forward
identify specific controls and tests of controls related to IT governance, including:
Organizing the IT function.
Controlling computer center operations.
Designing an adequate disaster recovery plan.
arrow_forward
Provide a brief synopsis on Ziggle (– A social media service that allows people to manage spontaneous events and to upload images and videos related to the event).
Identify one strength, weakness, opportunity, and threat related to Ziggle (– A social media service that allows people to manage spontaneous events and to upload images and videos related to the event.)
arrow_forward
List and explain the techniques for cushioning bad news? Please support your answer with examples.
ENG
07:43
II
!!!
arrow_forward
How does this organisation put its new risk management strategy into action? How does this compare to the accreditation and certification of government IT systems?
arrow_forward
principles of information security
A) Discuss the relationship between Contingency planning security risk management and business continuity.
arrow_forward
"How can a company effectively utilize CRM software to improve customer satisfaction and retention, and what are some key features and best practices that should be considered during implementation?"
arrow_forward
2. Information poster on differences in responses to loss, grief and bereavement.
In a poster or series of posters that would be suitable to display in a community service facility, identify and discuss the various social, cultural, ethnic and spiritual differences people may experience in responses to loss, grief and bereavement.
arrow_forward
Topic: Management information systems
Please read and answer throughly beening a operational manager of the Marketing department
The MGMT Insurance Ltd. accepts payments on various insurance policies from employees of businesses across the island. These businesses deduct payments from employees’ salaries and pay the insurance company a lump sum each month. This total amount deducted is shown on each employee’s payslip. Deductions are due at the end of each month and each participating business submits one payment for its employees to the insurance company via online payments through the bank. However, if payments were received after 11:00 a.m., the bank does not process them until the next business day. At the beginning of each month an administrative assistant at MGMT Insurance Ltd. downloads the deductions for each company and allocates payments to the various policies. These payments include the client’s unique number along with his/her relevant policy numbers and amounts due.…
arrow_forward
You are required to assess key functions including risk management and compliance for J.P Morgan Chase, and present a written report based on J.P Morgan Chase on the following in 2,000 words:
Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the J.P Morgan Chase (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used.
Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, J.P Morgan Chase approaches/ strategies to combat money laundering and terrorist financing issues.
Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that J.P Morgan Chase must be compliant with.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Related Questions
- Principles of Information Security Q : Explain how understanding the available cybersecurity defenses would help organizations prioritize risk mitigations as part of a defense-in-depth strategyarrow_forwardSuppose your company has an e-commerce Website for selling different types of goods and services. Discuss the followings: i) Ethical concerns associated with storing and analyzing user data? ii) How would you use intrusion detection system to control security threats that face this website?arrow_forward5 You are a midlevel manager at a major metropolitan hospital and are responsible for capturing and reporting statistics regarding the cost and quality of patient care. You believe in a strict interpretation when defining various reportable incidents; as a result, your hospital's rating on a number of quality issues has declined during the six months you have held the position. Your predecessor was more lenient and was inclined to let minor incidents go unreported or to classify some serious incidents as less serious. The quarterly quality meeting is next week, and you know that your reporting will be challenged by the chief of staff and other members of the quality review board. How should you prepare for this meeting? Should you defend your strict reporting procedures or revert to the former reporting process for the "sake of consistency in the numbers," as several people have urged?arrow_forward
- Please read carefully and answer the questions in the case scenario: SBM CHAPTER 3 You Make the Call-Situation 3 Please read carefully and answer case questions: Jay Sorenson of Portland, Oregon, created a product called the Java Jacket, which is a patented honeycombed insulating sleeve that slides over a paper cup containing a hot beverage to make it comfortable to hold. Having introduced the new product to the market, Sorenson has already cut deals with coffeehouses, specialty stores, and convenience stores nationwide. He started the business with $15,000 in 1993, but his 2003 sales were projected to be between $12 and 15 million. Sorenson is now in a position where he would like to continue expanding his business, but he is concerned that large and established competitors could introduce their own variations of the same product. Question 1 Will the market for Sorenson's product continue to grow in the years ahead? Question 2 If he is successful, what sources of competition should he…arrow_forwardDescribe briefly the Classifications and Spectrum of disaster management. (500words)arrow_forward(iii)What actions can people take to reduce these kinds of incidents?arrow_forward
- Recite all elements of the health and safety management model in HSE’s ‘Successful Health and Safety Management’ (HSG65)arrow_forwardChapter 8 Interactive Session: Technology: BYOD: A Security Nightmare? What management, organizational, and technology issues must be addressed by smartphone security?arrow_forwardPrioritize identifying and explaining at least three recommended practices to businesses, especially those using the cloud, so that they can safeguard their data and other resources.arrow_forward
- Research what CERT is in relation to cybersecurity. What is the purpose of a CERT? Is there more than one CERT? Provide a summary of the most frequent, high-impact types of security incidents currently being reported by US-CERTarrow_forward•You’re applying to work in the human resources department of a large retail organization. During the application process, you’re asked to take a test that gives you scenarios related to theft working as a cashier. •Does this test have high or low face validity given the position you’re applying for? Explain exactly what aspects are of the test/scenario that lead you to believe that there is either high or low face validity behind this integrity test.arrow_forwardPO6 The Engineer and Society (ESSE) - Apply reasoning informed by contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to professional engineering practice and solutions to complex engineering problems; LO1 To internalizes the roles as responsible engineers towards Creator and society PO8 Ethics (ESSE) – Apply professional ethics with islamic values and commit to responsibilities and norms of professional engineering code of ethics LO3 To demonstrate ethical principles in leadership, behavior and character with continuous self- development By using the 7 steps method - Please evaluate the case. Questions False Trip Report. A Senior Design Engineer and a Senior Fabrication Engineer scheduled a trip to review a very complex tool for an injection molded part at the supplier's plant. They had been there on previous occasions over a span of many months. This complex long lead part was being developed with early…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education