StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cenartech Security - Case Study Example

Summary
In the paper "Cenartech Security Case " the various aspects of the case will be discussed to correct the situation that Lehman Brothers would have changed to avoid the security breach (Rick Lehtinen, 2006, p.24)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Cenartech Security Case
Read Text Preview

Extract of sample "Cenartech Security"

INVESTMENT RISK MANAGEMENT INVESTMENT RISK MANAGEMENT CASE STUDY 2: CENARTECH SECURITY CASE, PART 3B CASE STUDY2: CENARTECH SECURITY CASE, PART 3B Security management in a company is important to lock out any threats arising internally and externally in a company. Deploying a proper security management system is essential as it assist an organization in finding the correct information that could put the company at risk of attack to the management of the company. The various aspects of the case will be discussed to correct the situation that Lehman Brothers would have changed to avoid the security breach (Rick Lehtinen, 2006, p.24). Securing the system on a password lock mechanism was a proper way to ensure that only the authorized personnel could log into the various servers and access information. The elevation of this is however different when dealing with a company that shares the same network but in a different topology. Lehman Brothers was right to ensure that the employees were able to log in, but should have secured the network as password can easily be breached if the user is able to relate to usernames of the employee. Lehman Brothers did not limit the access point of the servers in which the password information was held. Limited authentication was placed in the firewalls, the antivirus and the cyber spying mechanism was compromised for sabotage (Mansfield & Antonakos, 2009, p. 56). Monitoring the traffic on the set firewall and analyzing the generated reports could have solved the problem experienced by Lehman Brothers while going through the proper action to be taken. Relying on information provided by flags should be accompanied by an individual that understands the reports and is able to take the necessary action to stop the process. Lehman Brothers should have kept an eye on the new threats discovered and posted online. A proper email alert system on the incoming mail to confirm on various exploits and vulnerabilities in the system could keep the password information at bay from malicious attackers (Whitman, 2011, p.41). A simple exercise of enabling a regular update on the security system will aid the firewall to remain alert on any unnecessary activities. A good software system like the Cisco protects solution enables the systems to automatically update ensuring that new methods of security breach are realized on time. Unique log in details for employees other than the commonly uses employee names should be encrypted to provide difficult passwords that would make it difficult to hack (Rick Lehtinen, 2006). Ensuring that a firewall is set to regulate incoming internet traffic is difficult for a company as Cenartech as it relies on information of its partner company, which arrives from external traffic. This means that Lehman Brothers would have to sieve the information with a filer, which may take time accessing the relevant information from the harmful one. It becomes a problem as the data received in the company may be required to increase the production of the items required by their customers (Rick Lehtinen, 2006, p.45). The software purchase system may difficult to purchase as large companies require systems that go through long process in the procurement department before a purchase it done. Lehman Brothers can ensure that an individual is there to watch the systems trends, but humans cause errors by relying on the software installed as they assume that it handles the server systems better than him or her (Rick Lehtinen, 2006, p.67). The training of employments lacks in Cenartech, I would ensure that the employees of the company are aware of how to use the security measures placed to protect the company. Enlightening the employees on new technology platforms assists the company to ensure that new security policies are understood. A trained employee can help in noticing any suspicious information such as a failed, correct login attempt. The security levels that Lehman Brothers had settled for were too shallow for the size of the company. Considering an additional security solution for the network both internally and externally will not only secure the company, but also improve its capabilities. A good example on the approach I would implement is to deploy an intrusion prevention system (IPS) (Whitman, 2011, p.42). The system allows the administration to block peer-to- peer traffic common in an internal environment. Threats that arise from instant messaging are taken care of as the system also ensures that users use a secure wireless network for interaction within its radius. Installing a data protecting solution in the company is a solution I would adopt for the completion of the organization. A security breach into an organization affects the organization if vital information is lost. Having a backup system to ensure that information is safe ensures continuity of the organization. Retrieving information of stolen files may be difficult especially if a data recovery company is called in for help. In an organization, management and leadership are closely related but, certainly produce different results. An effective manager possesses extensive skills in planning, motivation and communication. On a generic perspective, “Management is a skill built hence potential managers start with areas in which they have expertise to those that they lack” (13). Long-term success however requires an analysis of human resource management. Aid in analyzing the level of management an individual holds various areas. A model of effective management gives the key points a manager should possess to instill efforts in subordinates. A good manager should be able to; Offer motivation to staff and employees Motivation through reward schemes and recognition improves the attitude of employees. Management of resources and work delivery soon depicts from a motivated employee. Devising schemes that secure the comfort of employees generate good results in product sales. Promote team dynamics and good relationships Teamwork produces better results as compared to single work. Promoting teamwork strengthens an organizations ability to perform as the weak individuals are assisted. Managers who promote teamwork get result as compared to those who do not. Recruit the right people for the job Getting the right people for the job assists the company to save from training and informing new employees on what is expected of them. Human resource managers ensure the company’s success by having scrutiny during the hiring process. Manage discipline Organization culture details the discipline levels of any company. the culture acts like a manual to follow through concerning guidelines on behavior. Managing discipline remains the role of a manger. Deal with conflict resolution People working in the same department or organization are likely to conflict. The management of a company should resolve the issue with etiquette. Finding the route course of the problem stands to gain the organization more other than solving the conflict the easier way out. Ensure continued communication Effective communication channels in an organization provide the manager with feedback concerning a given issue. Display of information to subordinates does not guarantee communication. Managers ensure communication through receiving positive and negative feedback. Make decisions and solve problems Decision-making is a role-played by the manager. As a manager, decision- making comes because of making analysis form information collected from every department. Positive and negative information should be considered before making the final decision. It is good for an organization’s manager to include information from subordinates as they play an important role in sourcing for the information. Avoid common management mistakes Managers make assumptions on the important aspects being technical skills where as the self-development skills play a major role in ensuring growth and development in an organization. A manager improves common mistakes by making conclusions based on the quality of work produced and the level to which it creates positivity to the employee. References Anderson, Neil. Fundamentals of Human Resource Management . London: Sage Publications, 2007. Bakhtin, Mikhail and Carylyn Miller. "The Traps and Trappings of Genre Theory." Applied Linguistics (2012): 1-21. Document. Blanchard, Kenneth and Spenser Johnson. The One Minute Manager . New York: Berkley Publishing Group, 1982. Canton, Lucien G. Emergency management:concepts and strategies for effective programs. Hoboken: Wiley-Interscience, 2007. Charles & Jones, Gareth. Essentials of Strategic Management (2nd ed). Mason,OH: South-West(Cengage), 2009. Drunker, Peter F. The Practice of Management . New York: Collins , 1993. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us