What integration issues do merging companies face

Assignment Help Computer Network Security
Reference no: EM131024925

IT Discussion Questions for 2 Parts

Respond to 2 questions per Part and must be 200 words minimum per a response to a question. So total you will have 2 responses for Part 5 questions and 2 responses to Part 6 questions.

Part 1

1. Legislative Processes: What about Cybersecurity?

a. Periodically, congress attempts to formulate and pass additional Cyber Security legislation. In 2015, the focus was on improving information sharing between government agencies and private entities to combat cyber threats.

Please review this legislative proposal https://www.congress.gov/bill/114th-congress/senate-bill/754 and provide your assessment of the bill's pros/cons and the impact it will have on privacy and the Internet. Keep in mind there are other cybersecurity related bills that have been or will be proposed in the near future. Do some research and compare and contrast the intent of other pieces of cyber security legislation that are relevant to the discussion.

Please remember to cite your sources.

2. Integration Issues

a. What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences? How would the security professional bring together both IT teams so they feel comfortable? One of the most "invisible" barriers to success is the feeling of other IT professionals or teams "loss of control". How can you ease fears and build a positive team?

3. Cultural Differences

a. Cultural differences when companies merge can last for years. There have been instances when the acquired company had more advanced technology then the other company, and they were forced to step back in time. That is a very frustrating experience. How would you tackle this issue?

Part 6

1. Energy Sector and Cybersecurity

a. Please read Energy Cybersecurity Issue.docx. As you can see this article was published in early 2012 and it deals with issues associated with the Energy Sector. The article claims that since 2009 the Energy Sector has not improved its Cybersecurity Programs with money that was given to it by the Federal Government.

Do some research on your own and try and find related articles or issues concerning security concerns regarding the Energy Sector. Based on your research what are some of the continuing concerns and what is the impact if a cyber attack is launched against the Energy Sector. Do you think that type of attack would have a significant impact or is our infrastructure robust enough to withstand an attack? What recommendations would you make if you were a Cyber Analyst giving your opinion to Congress?

Remember to cite your sources!

2. Conflict Management Techniques

a. Conflict management techniques come in handy when you are working in organizations. Most people do not have a good skill set in this area. Read the article, Conflict Management Techniques, available here, https://www.personalityexplorer.com/home/FREEResources/ConflictManagementTechniques.aspx. You might recognize a technique you already use. Select one technique and provide an example of how you think it may be used during a merger, or formation of a team. Provide details.

3. Managing a Remote Workforce

a. Most work forces are moving to more remote access. How do you manage people remotely? How do you make sure that they are included in the team. Our example has only two countries involved, what if there are many? How do you provide them access into the network securely? Especially if they are coming in from other countries that are known for infiltrating networks??

4. Legal Systems

a. There are a lot of security reasons for decommissioning legacy systems at all times, not just at a merger. Discuss two security issues and then provide the business reason for decommissioning that we could present to the business line. In a for-profit company, you have to save the security card for when it is really important. You need to address risk. You can't afford to mitigate all risk, sometimes you have to accept it or transfer it. How will this scenario affect your customer base? How will you be able to continue business? Be creative with your answers.

Reference no: EM131024925

Questions Cloud

Determining the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
Can you tell whether or not a is diagonalizable : What can you tell about the algebraic and geometric multiplicities?
How will the reaction proceed to reach equilibrium : The reaction A2 + B2 ? 2 AB has an equilibrium constant Kc = 1.5. The following diagrams represent reaction mixtures containing A2 molecules (red), B2 molecules (blue), and AB molecules. Which reaction mixture is at equilibrium?
Question regarding the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
What integration issues do merging companies face : What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences?
Write the equilibrium- constant expression for the reaction : The following diagram represents a reaction shown going to completion. Letting A = red spheres and B = blue spheres, write a balanced equation for the reaction. Write the equilibrium- constant expression for the reaction.
Differences in contractual provisions : IBM Bond Pricing. All bonds have some common characteristics, but they do not always have the same contractual features. Differences in contractual provisions, and in the underlying strength of the companies backing the bonds
Are the given equations are dependent or independent : Solve the system of equations by graphing. Then classify the system as consistent or inconsistent and the equations as dependent or independent.
What is equation that characterizes your roommate budget : How many T-shirts can be purchased if your roommate decides to not buy a sweater and brave the harsh winter? What is the price of a sweater? What is the equation that characterizes your roommate's budget

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Lab- vulnerability assessment

Lab: Vulnerability Assessment, Probably the most overlooked process in any type of security system is the vulnerability assessment. Vulnerability assessments are incredibly useful (and necessary) tools

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  What is the peak data rate out of the router in one second

What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?

  Analyze and discuss the vulnerabilities

Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Describe the fundamental security policies outlined by pci

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standa..

  Identification of preventative controls

Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  De-cipher the message using vigenere cipher analysis tool

Using statistical analysis only on Caesar cipher, decrypt this cipher. Show your work in detail. Do not use brute force - De-cipher the following message using Vigenere Cipher analysis tool

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd