What change management tasks should kelvin perform

Assignment Help Management Information Sys
Reference no: EM131661193 , Length: word count:2000 + 10 Slides

Information Security Group Assignment

PART 1 -

Students are required to analyse and write a report about the following topics:

1. Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous

2. Using a Web browser, go to eff website. Choose one of the current top concerns of this organization and justify:

a. Why this topic was chosen?

b. How does it relate to information security subject contents?

3. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play.

a. A hacker breaks into the company network and deletes files from a server.

b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained.

c. A tornado hits a local power station, and the company will be without power for three to five days.

d. Employees go on strike, and the company could be without critical workers for weeks.

e. A disgruntled employee takes a critical server home, sneaking it out after hours.

For each of the scenarios (a-e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

PART 2 - Case Exercises

With your team members, please go through each case and answer the relevant discussion questions

CASE 1 - One day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day.

a. Do you think this event was caused by an insider or outsider? Explain your answer.

b. Other than installing virus and worm control software, what can SLS do to prepare for the next incident?

c. Do you think this attack was the result of a virus or a worm? Explain your answer.

CASE 2 - Charlie was getting ready to head home when the phone rang. Caller ID showed it was Peter. "Hi, Peter," Charlie said into the receiver. "Want me to start the file cracker on your spreadsheet?" "No, thanks," Peter answered, taking the joke well. "I remembered my passphrase.

But I want to get your advice on what we need to do to make the use of encryption more effective and to get it properly licensed for the whole company. I see the value in using it for certain kinds of information, but I'm worried about forgetting a passphrase again, or even worse, that someone else forgets a passphrase or leaves the company. How would we get their files back?" "We need to use a feature called key recovery, which is usually part of PKI software," said Charlie. "Actually, if we invest in PKI software, we could solve that problem as well as several others." "OK," said Peter. "Can you see me tomorrow at 10 o'clock to talk about this PKI solution and how we can make better use of encryption?"

a. Was Charlie exaggerating when he gave Peter an estimate for the time required to crack the encryption key using a brute force attack?

b. Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase?

Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key. Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's.

c. Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal?

Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter's illusion of privacy.

d. Is such a "little white lie" an ethical action on Charlie's part?

CASE 3 - Charlie looked across his desk at Kelvin, who was absorbed in the sheaf of handwritten notes from the meeting. Charlie had asked Kelvin to come to his office and discuss the change control meeting from earlier that day. "So what do you think?" Charlie asked. "I think I was blindsided by a bus!" Kelvin replied. "I thought I had considered all the possible effects of the change in my project plan. I tried to explain this, but everyone acted as if I had threatened their lives." "In a way you did, or rather you threatened their jobs," Charlie stated. "Some people believe that change is the enemy."

"But these changes are important." "I agree," Charlie said. "But successful change usually occurs in small steps. What's your top priority?" "All the items on this list are top priorities," Kelvin said. "I haven't even gotten to the second tier." "So what should you do to accomplish these top priorities?" Charlie asked. "I guess I should reprioritize within my top tier, but what then?" "The next step is to build support before the meeting, not during it," Charlie said, smiling. "Never go into a meeting where you haven't done your homework, especially when other people in the meeting can reduce your chance of success."

a. What project management tasks should Kelvin perform before his next meeting?

b. What change management tasks should Kelvin perform before his next meeting, and how do these tasks fit within the project management process?

c. Had you been in Kelvin's place, what would you have done differently to prepare for this meeting?

Suppose Kelvin has seven controls listed as the top tier of project initiatives. At his next meeting with Charlie, he provides a rank-ordered list of these controls with projected losses over the next 10 years for each if it is not completed. Also, he has estimated the 10-year cost for developing, implementing, and operating each control. Kelvin has identified three controls as being the most advantageous for the organization in his opinion. As he prepared the slides for the meeting, he "adjusted" most projected losses upward to the top end of the range estimate given by the consultant who prepared the data. For the projected costs of his preferred controls, he chose to use the lowest end of the range provided by the consultant.

d. Do you think Kelvin has had an ethical lapse by cherry-picking the data for his presentation?

Suppose that instead of choosing data from the range provided by the consultant, Kelvin simply made up better numbers for his favourite initiatives. Is this an ethical lapse? Suppose Kelvin has a close friend who works for a firm that makes and sells software for a specific control objective on the list. When Kelvin prioritized the list of his preferences, he made sure that specific control was at the top of the list. Kelvin planned to provide his friend with internal design specifications and the assessment criteria to be used for vendor selection for the initiative.

e. Has Kelvin committed an ethical lapse?

Reference no: EM131661193

Questions Cloud

Recrystallization solvent for an unknown solid : How would you determine an optimal recrystallization solvent for an unknown solid?
In what ways does given piece reflect contemporary culture : In what ways does this piece reflect contemporary culture? You must use ONE text from this unit to support your ideas.
What do you enjoy most about your work : In what setting do you practice? How long have you been practicing?What are your specialties or areas of clinical focus?
Spectral emission and absorption lines : Using the Bohr atomic model, explain to a 10-year old how spectral emission and absorption lines are created and why spectral lines for different chemical.
What change management tasks should kelvin perform : HS3011 Information Security Group Assignment. What change management tasks should Kelvin perform before his next meeting
Calculate the molar heat of combustion of anthracene : Calculate the molar heat of combustion of anthracene.
Evaluate published nursing research for credibility : Apply research principles to the interpretation of the content of published research studies.
Highlighting the main point and main points of the article : Access and read the article, highlighting main point and main points of article. Print it out if necessary, but make sure to read the entire article carefully.
What are the genotypes of the parental flies : What are the genotypes of the parental flies - Examine the ratios of F1 phenotypes. Is this expected for traits that are not linked

Reviews

len1661193

9/27/2017 8:26:40 AM

Australian student, I have the assignment it is in two parts, each part needs 1000 word and 5 references in Harvard style and we need slides for presentation of this assignment. Need total of 2000+ words with 10 references and 10 slides. For this assignment, you need to work as a group of 3-4 students. Submission Requirements: The assignment should include a list of at least 7 references and a bibliography of the wider reading done to familiarize oneself with the topic.

len1661193

9/27/2017 8:26:34 AM

Presentation and writing style /10 marks -Information is well organized. Correct layout including times new roman, font size 12 or calibri, font size10, double spaced. About the right length. -Very well written, excellent paraphrasing and proper grammar and punctuation are used throughout. Criteria completion /15 Evidence of understanding of the nature and purpose of the discussed requirements. Evidence of understanding of the implications for the organisation.

len1661193

9/27/2017 8:26:29 AM

Evidence of Research /10 marks Substantial range of appropriate and current, supportive evidence. Development of Discussion /15 marks Logical, insightful, original discussion with well-connected paragraphs. Evidence of full engagement with relevant and detailed analysis. Conclusion /5 marks An interesting, well written summary of the main points. An excellent final comment on the subject, based on the information provided.

Write a Review

Management Information Sys Questions & Answers

  Differences between data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to loca..

  What are the global issues that sony faced

What are the global issues that Sony faced in all the above. Comment on the security culture at Sony more so considering that Sony is one of the leading technology company yet has had at least 4 attacks in the recent past and the lessons learnt fro..

  Paper on child protection in cyberspace

Paper on CHILD PROTECTION IN CYBERSPACE. You have been asked to investigate and make recommendations regarding ethical, compliance and legality issues.

  Plot stress s11 and thickness t3 as a function of stretch

Apply uniform extensions in both X1 and X2 directions so that the deformed shape will be 5 x 5 x t3. Plot stress σ11 and thickness t3 as a function of stretch.

  What are the advantages of easily obtainable information

What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media? What are the advantages and disadvantages of easily obtainable information?

  Demonstrate accurate spelling-grammar and punctuation

Information is data that is framed in a specific context. In this sense, information is contextual data that has a level of inherent value.

  Discuss about the post given below

As a mother, breastfeeding is a topic that I have an interest in. Over the last few years, I have done much research on the topic along with the benefits of breastfeeding, social aspects, culture, and other breastfeeding related information. The..

  Use of analytics and cloud technology within this company

Support the need for the use of analytics and cloud technology within this company. Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes

  Explain any challenges related to use of data to prevent

Explain at least three ways in which law enforcement may utilize data from crime mapping to prevent and/or address crime.Explain any challenges related to the use of this data to prevent or address crime.Explain how crime mapping as a technological s..

  Challenges of managing a global telecommunications network

Identify the major challenges of managing a global telecommunications network and tell how firms can effectively manage international data communications

  Identify what is at risk from these threats

Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment and physical controls.

  Who do you think larger or smaller clients will benefit most

Do some Internet research to identify examples of "tap & go" applications. What are some typical types of "tap & go" payment applications .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd