Contemporary IT Security Matters Always Relate To Cyber Warfare


11-3-2017



Unit 4 Discussion 1 Response 2 Markeita Drew

Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



Original Post from Markeita Drew:



When policies or strategies are introduced in a proactive manner, there are usually high-level meetings with executives, stakeholders and other decision-makers, as well as approvals that take place before they are put into practice.  Not all instances that require Information Security activities occur with enough lead time to include input from all employees that will be affected by the change.  In situations such as those, it’s nearly impossible to follow the same communication plan if the change is due to a problem that requires an immediate change request and action to thwart an intrusion or recover from a breach.  Global companies may not have the opportunity to reach individuals or confer with all departments or geographical locations within their business during a crisis, so it may appear offensive to end users when they aren’t included in the decision-making process.  This is especially bothersome when the blanket change that is implemented doesn’t take into account how differently business is conducted in other regions or how they will directly be affected.

To reduce or eliminate potential areas of tension or conflict between these two groups within a global organization, I would make sure that we have a proper business continuity plan as well as a communication plan that has provisions for steps to take during disaster recovery as well as normal business conditions.  These plans will need to include all areas of the business and the potentially affected stakeholders.  I would also institute company-wide surveys related to the execution of those plans to get feedback and achieve more inclusion from the business community at large.  Continual process improvement would be developed as a by-product of the measures in this strategy.



Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

         It would have never occurred to me, to care about what every-other-person, thought, in-regards-to running a company, and IT decisions. I took a-number-of business classes, as an undergraduate student, through the College of Business, at: Florida State University. Multinational businesses, are divided-up, into numerous specializing departments-each with a specific function. A business is run, by a: CEO, then a board-of-directors, then by the various heads of departments, at different International locations. It is inappropriate, for any given individual, who has no specialized knowledge in a specific area-to then attempt, to contribute to a conversation, regarding that issue.

        For instance-an analogy, all medical doctors, study medicine, however-a cardiologist specializes in the heart, a neurosurgeon, specializes in brain surgery. At n given point in time, could a psychiatrist-who has also attended medical school, decide, that because he is concerned about the final out-come personally, say-perform a neurosurgery. The business world, is the very same way-if the issues at hand, do not pertain, to your specific department, and academic training, then, you must courteously decline, from contributing your input. The IT field is complicated, and although, tensions arise in any given International business, the tensions should never be, about something-that an individual, has not trained in.

      In-regards-to, the scenario presented in class, and the tensions that may arise, because the business is International-I inferred the word: “tensions,” to refer to, the various levels, of security, that may or may not exist, in differing locales. My best recommendation, for relieving tensions, related to securing information, in an International market, and working environment, is to develop a holistic: defense-in-depth, methods, and securing protocols, that can be shared, and reinforced-through the International data environments (Brooke, 2001, p. 75).

      The online and computer world-a virtual reality, is circumscribed, by certain real and existent boundaries (Brooke, 2001, p. 75). By looking for end points, and where: “the side-walk ends,” security measures, can be created, and then reinforced-to better secure data. It is a myth, to think, that at any given point in time, any-given, security: measure, practice, control-technique, or management theory, will provide-complete, or total security. The boundaries are imperfect, and flexing-moving in and out, like the ocean tides, as the hacker, would approach, and attempt access-then flee, regardless of whether-or-not, the attempt was successful. The battle for security, is everlasting, and must be presumed to be-a continuous battle, a war that never heeds warning, and: “a never-ending story.”



References



Brooke, Paul. (2009). Building An In-Depth Defense. Network Computing: Workshop Security. 12, 14. p. 75-77. Retrieved from www.networkcomputing.com




Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2