The Importance of IT Security-An Intl Market-In Action
11-8-2017
Directions: Unit 5, Discussion 1:
Applying Security Terminology with a Business Audience:
For
this discussion, select one of the two articles you found on communicating
about information security to a global audience. Your choice should be predicated
on its usefulness to your current or future work situation. Evaluate this
article regarding its objective and conclusion as it applies to your current or
future business environment.
Prepare
a communication, translated for a global business audience, that includes why
they need to know this information. Use the levels of the managerial
communications process model in the media piece in the studies for this unit to
craft this communication.
Email Communication:
To: Company Staff/Listserv
From: CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
Intl IT Security Company
Date: November 8, 2017
Subject: Increasing Security Measures to Protect Intl Business: “Overseas Expansionism:”
To Whom It May
Concern:
The Managerial Levels of
Communications-Considered: 1-4:
The purposes, of this email, are, to communicate
to you-the employees, in a fundamental, and easy to comprehend manner, the reasons
why, we-as an Intl IT corporation, must remain vigilant, in our on-going activities,
to: protect, secure, and store, our information data and files, in the most reliable,
and dependable ways. If you have any questions, pertaining to the message presented
below, please bring your concerns, to my immediate attention, at the next: staff,
and board room meeting, or, feel free, to respond to my email. Concerns regarding,
our continuing needs, to provide, the best services possible, to our customers,
are what help us, to maintain, the bottom-line. Thank you.
1) International Market: from the US, to The
World (Nat’l and Organizational Culture):
Basic Background Information: Why America has chosen to enter Intl
Markets (Caveat Emptor):
An enemy of the United States, will
always have to be approached with caution, and a strong insight, into the past
entanglements: “the persistent war,” is referred to, by: Valeriano, and Maness
(2012), in the US Military Intelligence training text: Cyberspace and National
Security, as the: “perpetual enemy” (p. 141). It is clear, that America could
benefit, from entering into Intl markets, for trade-to increase earnings
potential, and to improve Intl relations. However, Intl IT businesses, must
always be wary, of the enemy, who will never walk away, who waits quietly, like
a dormant disease, or a hidden worm-in computer programming, to attack (Valeriano& Maness, 2012, p. 139). Once an enemy,
has announced to America-that he is: “the scorpion, on the Alligator’s back,”
then-America will always have to fear retaliation, and the newest battle
ground, is: cyber warfare.
2) Valid Security Threats: The Reality of Intl IT
(Sender/Receiver/Purpose):
Real IT Threats Exist, and They Increase, When Entering the Intl
Market Place:
Some Americans-even those in law
enforcement, would pretend, that cyber warfare, is not real. Oft times, when
consumers have valid complaints, regarding: computers, ipads, cellphones, and
other electronic devices, and contemporary security risks-out-of-touch,
uneducated, lay persons, argue that the very real threats, and fears, and
stolen IT information, is a sign of: “Paranoia.” The academic community, in
2011, was still accepting, full-length, professional academic journal articles,
for publication, that were supporting an unpopular theory, that cyber-threats,
are not really a valid concern, for Americans (Costanza, et. al., 2012, p. 57).
3) Insider Threat: Most Dangerous and Costly
(Message Channels/Environment/Time):
Lanxoma, The IT Security Software, That Monitors for: “Insider
Threats:”
The insider threat, is the most
dangerous, and the most costly-know your enemy (Lanxoma, 2008, p. 1). In 2008,
an IT security company, with the name of: Lanxoma, created the first software,
designed to track down insider threats, to the IT security, of any given: US
company, Intl organization, or multinational entity, to protect against the:
“enemy within,” the: “insider threat” (Lanxoma, 2008, p. 1). When America,
chose to expand business overseas, new cautions had to be taken, against the
older friends sometimes, and, then-always against the: “perpetual enemies” (Valeriano&
Maness, 2012, p. 139).
There are no guarantees, in the United
States, that your neighbor, is not your worst enemy-the same is true, for an
Intl market, now, with the desperate refugee situations: “WWIII,” the world is
on-the-move, and there are Intl terrorists, everywhere. The Lanxoma software,
protects IT information, as it: tracks every single key stroke, copies every
log-in to verify passwords, all access to the: LAN (local area network), are
monitored, and recorded-as a vital portion, of: security risks management, and
reduction/automated prevention: RAPS Restricted Access Permissions System
(Lanxoma, 2008, p. 1). Laxoma security software is intended, for large Intl
business, as well as, small local companies (Laxoma, 2008, p. 2).
4) Hunting Down the Enemy Within (Strategy):
Protect IT Information, or Suffer Consequences, Through US State&
Federal Courts:
IT security, is a real and valid
threat, in America, and in other Intl markets, overseas. It does a severe
dis-service, for US law enforcement, to pretend, like the problems, of: cyber
warfare, and Intl terrorism, do not exist-I am offended, frankly. There are
simple, and inexpensive ways, to track down-hackers, who support Intl terror (Adkins,
2013, p. 1). The basic directions, of what needs to happen, to track down, the
average: “hacker,” who is illegally boarding, the computer, or other electronic
devices, of any given individual-can be located online (Adkins, 2013, p. 1).
Because, the US government, is refusing
to respond, to valid complaints, regarding: domestic, and Intl terror, who are
actively engaging in: cyber warfare, against American companies, US business,
must work much hard-to protect data, and private, and confidential
information-that would otherwise, be stolen. It should not be left up to
private enterprise, to provide domestic, or Intl protections-against a valid
Intl terror threat, that calls America home. America’s local police, and
Federal law enforcement, are intentionally apathetic, in all matters
concerning, the deterrence of Intl terror.
5) CEO, Director, and President: Miss. Bayo Elizabeth
Cary, AA, BA, MLIS, My Concluding Thoughts:
The Future of IT Safety, Will Revolve Around, Increased Security Management:
As an American IT company, we are
well-aware of the risks associated, with: compiling, storing, trading, and
accessing information online. Security, will always have to be a concern.
Sometimes, the fear, is the enemy, who dwells beyond the safer confines, of the
business, and the physical walls-that should protect, our: servers, computers,
files, and fundamental inter-workings. At other times, your worst enemy, is the
person who is smiling in your face, at the next cubicle over-he appears to be
normal, and he addresses himself, as your neighbor, and your peer. As a
prospering, Intl corporation, we can never be too careful, in-regards-to: our
IT information, and the security, that it will always require.
References
Adkins, Gary. (2013). Red
Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism. Journal of
Strategic Security. Vol. 6, No. 5. p. 1-9. Retrieved from http://scholarcommons.usf.edu/jss
Costanza, S. E., Helms,
Ronald& Nicholas, Johnson. (2011). Crouching Tiger or Phantom Dragon?
Examining the Discourse on Global Cyber Terror. Department of Sociology Western
Washington University. Vol. 25, 1. p. 57-75. Macmillian Publishers, Ltd.
Retrieved from www.palgrave-journals.com/sj/
Lanxoma. (2008). Security Software is First to Tackle
Disquieting Problem of Insider Threats. PR Newswire. New York, New York.
Retrieved from www.proquest.com
Maness, Ryan&
Valeriano, Brandon. (2012). Persistent Enemies and Cyberwar: Rivalry in an Age
of Information Warfare. Cyberspace and National Security: Threats,
Opportunities, and Power in a Virtual World. Georgetown University Press. p.
139-157. Washington, DC. Retrieved from www.press.georgetown.edu
Comments
Post a Comment