The Y2K Crisis

Improved Essays
Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time, there are bound to be security issues at times. When attacks happen on the government and big businesses the outcome can disrupt the world around us. The Y2K crisis was nothing compared to the challenge that modern day organizations have to deal with …show more content…
How in the world in 2015 could the federal government allow for this to happen, pension and retirement accounts just exposed to the taking? What was even more troubling is that if this could happen with the world largest financial government, what hope is there for the smaller businesses (Whalen, 2013). The majority of large organizations have a security director. Ever since 9/11 the role of security directors have changed drastically. Before 9/11 the main job of security was to secure the premises and physically protect the surroundings from any visible threats. Today, the physical threats are far more dangerous, now we have to pay special attention to virtual and systemic threats. No matter where a security headquarters is located the element of a team effort still is a top priority (Elson & LeClerc, 2006). There is not, and likely never will be, any substitute for physically interceding between a violent perpetrator and his intended target in a timely manner. Whether the perpetrator is holding a gun, a knife or a suspicious package; muscle on the ground will always be a great asset to and organizations …show more content…
Drawing up a good plan of action of one of the hardest task for any manager (Schimmoellerc, 2012). This requires an active participation from your entire organization. With respect to time and implementation, planning must be linked to and coordinated on different levels. Planning must take the organization’s available resources and flexibility of personnel into consideration, as this will determine success or not. Organizing is an important function of management having a structure with a good division of functions and tasks is of crucial importance. There must be plenty of staff and raw materials so that the organization can run smoothly and that it can build a good working structure (Schimmoellerc, 2012). When given orders and clear working instructions, employees will know exactly what is required of them. Strong leadership helps put all of the work pieces into one big puzzle; this is why successful managers must have integrity, communicate clearly. When all activated are in sync, this is what you call a well-coordinated work

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    As we continue through the 21st century there are numerous missions that the DHS encourages to anticipate terrorist acts, secure the wellbeing of our country, and to save our opportunity and thriving. There are an extensive variety of missions that the division oversees, for example, anticipating terrorism and improving security, overseeing U.S. outskirts, controlling movement laws, securing the internet, and guaranteeing calamity versatility. Our central goal is to organize a far reaching and strong office to battle demonstrations of fear, react in an auspicious way to calamities and to secure the U.S. against acts that are completed to annihilate us. In counteracting terrorism and improving security the office considers this the most astounding…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The Oklahoma City Bombing in 1995 was so horrible because the truck with the bomb was able to be placed right in front of the building. Similar events took place at embassies and other United States controlled buildings over the years. New and existing buildings are now provided with barriers and standoff distance from roads to prevent the reoccurrence of such an event. Additional security and access control are additional measures used to prevent terrorist attacks on public and private buildings (Kemp 2012, p. 32). Protection of information systems is the newest field within the homeland security spectrum.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Manager Interview Essay

    • 1141 Words
    • 5 Pages

    Manager Interview Final Exam Being a manager is not easy, it takes a lot of responsibility, planning, effort, commitment, leadership skills, and communication skills. Interviewing a manager that has been working as a manager for more than at least three years helped me have an idea of what it feels like to be a manager. While interviewing Holly Riser, a full time manager at a retail store named Rue 21, I learned that being a manager is not just about leading your co-workers; there is a lot more to it. It is important for managers to be good communicators, but it is also important for them to be organized and prepared for any outcomes that could happen in the future.…

    • 1141 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Security Analysis Of Yahoo

    • 1989 Words
    • 8 Pages

    As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the…

    • 1989 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Summary Main Characters The Main characters in Suits are Harvey Specter, Mike Ross, Louis Litt, Rachel Zane, Donna Paulsen and Jessica Pearson Setting The setting of Suits revolves around law and order. All the main characters work in a lawyer firm called Pearson Hardman that is located in Manhattan. Central point of view…

    • 1594 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Every industry is plagued with detractors and the security industry is no exception. When you think of this industry you think of extra measures being taken to protect different forms of assets and the extra investments that are made to reach security goals. You also think of certain levels of competence being used to implement security measures. While the security industry often tries to reduce/eliminate its unique detractors, it very often overlooks some of the key causes of security vulnerabilities. These vulnerabilities are often caused by the ‘industry’ aspect of the need to remain employed and the need to turn a profit; ultimately, transferring risk to the unaware stakeholder.…

    • 1393 Words
    • 6 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays