The Importance of IT Security-An Intl Market-In Action


11-8-2017





Directions: Unit 5, Discussion 1:



Applying Security Terminology with a Business Audience:

For this discussion, select one of the two articles you found on communicating about information security to a global audience. Your choice should be predicated on its usefulness to your current or future work situation. Evaluate this article regarding its objective and conclusion as it applies to your current or future business environment.

Prepare a communication, translated for a global business audience, that includes why they need to know this information. Use the levels of the managerial communications process model in the media piece in the studies for this unit to craft this communication.



Email Communication:



To: Company Staff/Listserv

From: CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

           Intl IT Security Company

Date: November 8, 2017

Subject: Increasing Security Measures to Protect Intl Business: “Overseas Expansionism:”



To Whom It May Concern:



The Managerial Levels of Communications-Considered: 1-4:



                   The purposes, of this email, are, to communicate to you-the employees, in a fundamental, and easy to comprehend manner, the reasons why, we-as an Intl IT corporation, must remain vigilant, in our on-going activities, to: protect, secure, and store, our information data and files, in the most reliable, and dependable ways. If you have any questions, pertaining to the message presented below, please bring your concerns, to my immediate attention, at the next: staff, and board room meeting, or, feel free, to respond to my email. Concerns regarding, our continuing needs, to provide, the best services possible, to our customers, are what help us, to maintain, the bottom-line. Thank you.



1)      International Market: from the US, to The World (Nat’l and Organizational Culture):



Basic Background Information: Why America has chosen to enter Intl Markets (Caveat Emptor):

  

      An enemy of the United States, will always have to be approached with caution, and a strong insight, into the past entanglements: “the persistent war,” is referred to, by: Valeriano, and Maness (2012), in the US Military Intelligence training text: Cyberspace and National Security, as the: “perpetual enemy” (p. 141). It is clear, that America could benefit, from entering into Intl markets, for trade-to increase earnings potential, and to improve Intl relations. However, Intl IT businesses, must always be wary, of the enemy, who will never walk away, who waits quietly, like a dormant disease, or a hidden worm-in computer programming, to attack (Valeriano& Maness, 2012, p. 139). Once an enemy, has announced to America-that he is: “the scorpion, on the Alligator’s back,” then-America will always have to fear retaliation, and the newest battle ground, is: cyber warfare.



2)      Valid Security Threats: The Reality of Intl IT (Sender/Receiver/Purpose):



Real IT Threats Exist, and They Increase, When Entering the Intl Market Place:



         Some Americans-even those in law enforcement, would pretend, that cyber warfare, is not real. Oft times, when consumers have valid complaints, regarding: computers, ipads, cellphones, and other electronic devices, and contemporary security risks-out-of-touch, uneducated, lay persons, argue that the very real threats, and fears, and stolen IT information, is a sign of: “Paranoia.” The academic community, in 2011, was still accepting, full-length, professional academic journal articles, for publication, that were supporting an unpopular theory, that cyber-threats, are not really a valid concern, for Americans (Costanza, et. al., 2012, p. 57).



3)      Insider Threat: Most Dangerous and Costly (Message Channels/Environment/Time):



Lanxoma, The IT Security Software, That Monitors for: “Insider Threats:”

   

      The insider threat, is the most dangerous, and the most costly-know your enemy (Lanxoma, 2008, p. 1). In 2008, an IT security company, with the name of: Lanxoma, created the first software, designed to track down insider threats, to the IT security, of any given: US company, Intl organization, or multinational entity, to protect against the: “enemy within,” the: “insider threat” (Lanxoma, 2008, p. 1). When America, chose to expand business overseas, new cautions had to be taken, against the older friends sometimes, and, then-always against the: “perpetual enemies” (Valeriano& Maness, 2012, p. 139).



        There are no guarantees, in the United States, that your neighbor, is not your worst enemy-the same is true, for an Intl market, now, with the desperate refugee situations: “WWIII,” the world is on-the-move, and there are Intl terrorists, everywhere. The Lanxoma software, protects IT information, as it: tracks every single key stroke, copies every log-in to verify passwords, all access to the: LAN (local area network), are monitored, and recorded-as a vital portion, of: security risks management, and reduction/automated prevention: RAPS Restricted Access Permissions System (Lanxoma, 2008, p. 1). Laxoma security software is intended, for large Intl business, as well as, small local companies (Laxoma, 2008, p. 2).




4)      Hunting Down the Enemy Within (Strategy):



Protect IT Information, or Suffer Consequences, Through US State& Federal Courts:



         IT security, is a real and valid threat, in America, and in other Intl markets, overseas. It does a severe dis-service, for US law enforcement, to pretend, like the problems, of: cyber warfare, and Intl terrorism, do not exist-I am offended, frankly. There are simple, and inexpensive ways, to track down-hackers, who support Intl terror (Adkins, 2013, p. 1). The basic directions, of what needs to happen, to track down, the average: “hacker,” who is illegally boarding, the computer, or other electronic devices, of any given individual-can be located online (Adkins, 2013, p. 1).



        Because, the US government, is refusing to respond, to valid complaints, regarding: domestic, and Intl terror, who are actively engaging in: cyber warfare, against American companies, US business, must work much hard-to protect data, and private, and confidential information-that would otherwise, be stolen. It should not be left up to private enterprise, to provide domestic, or Intl protections-against a valid Intl terror threat, that calls America home. America’s local police, and Federal law enforcement, are intentionally apathetic, in all matters concerning, the deterrence of Intl terror.



5)      CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA, MLIS, My Concluding Thoughts:



The Future of IT Safety, Will Revolve Around, Increased Security Management:



        As an American IT company, we are well-aware of the risks associated, with: compiling, storing, trading, and accessing information online. Security, will always have to be a concern. Sometimes, the fear, is the enemy, who dwells beyond the safer confines, of the business, and the physical walls-that should protect, our: servers, computers, files, and fundamental inter-workings. At other times, your worst enemy, is the person who is smiling in your face, at the next cubicle over-he appears to be normal, and he addresses himself, as your neighbor, and your peer. As a prospering, Intl corporation, we can never be too careful, in-regards-to: our IT information, and the security, that it will always require.



References



Adkins, Gary. (2013). Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism. Journal of Strategic Security. Vol. 6, No. 5. p. 1-9. Retrieved from http://scholarcommons.usf.edu/jss



Costanza, S. E., Helms, Ronald& Nicholas, Johnson. (2011). Crouching Tiger or Phantom Dragon? Examining the Discourse on Global Cyber Terror. Department of Sociology Western Washington University. Vol. 25, 1. p. 57-75. Macmillian Publishers, Ltd. Retrieved from www.palgrave-journals.com/sj/



Lanxoma. (2008). Security Software is First to Tackle Disquieting Problem of Insider Threats. PR Newswire. New York, New York. Retrieved from www.proquest.com



Maness, Ryan& Valeriano, Brandon. (2012). Persistent Enemies and Cyberwar: Rivalry in an Age of Information Warfare. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Georgetown University Press. p. 139-157. Washington, DC. Retrieved from www.press.georgetown.edu






Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2