Preview

C200 Task 1

Powerful Essays
Open Document
Open Document
4180 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
C200 Task 1
Task 1: Organization and Leadership Analysis

Assessment Code: C200
Student Name: Ricky Corona
Student ID: 191557
Date: 10/09/2014
Student Mentor Name: Leland Larson

Table of Contents

Organization Overview 3
Organization Description 3
Leadership Practices 4
Relationship Between Leadership and Organizational Culture 7
SWOT Analysis 8
Organizational Strengths 8
Organizational Weaknesses 9
Organizational Opportunities 10
Organizational Threats 10
Leadership Evaluation 11
Leadership Strengths 11
Leadership Weaknesses 13
Recommendations for Leadership Development 14
References 16

Organization Overview

The organization chosen is ABE Defense Systems. ABE Defense Systems is a global organization and a premiere defense contractor, specializing in defense, aerospace and cyber security. The organization that will be discussed is the network operations center of ABE Defense Systems. The leader selected is the director of the network operations center. The reason the director of network operations center was selected was to better understand the role and requirements of the position. This is a challenging position, responsible for the oversight and operations of all information technology’s “break and fix” services provided to its customers, the engineers and non-technical employees of ABE Defense Systems.
Organization Description

In this section an overview will be provided on ABE Defense Systems and the network operations center. ABE Defense Systems is a multinational defense, security and aerospace company headquartered in London England. It is among one of the largest defense contractors in the world with its largest operations in the United Kingdom and the United States. The company was formed about 20 years ago as a result of a merger of 2 British companies. Since the merger, the organization has absorbed multiple aircraft, shipbuilding and armored vehicle companies. The organization is involved in many major defense projects around the world. The



References: Demand Elasticity. (2014, January 1) http://www.investopedia.com/terms/d/demand-elasticity.asp Robina, C., & Brian, S. (2010). Changing the it leader 's mindset : Time for revolution rather than evolution. IT Governance Publishing. Mendonca, M., & Kanungo , R. (2006). Ethical leadership. Open University Press. Aarons, G. (2006). Transformational and transactional leadership: Association with attitudes toward evidence-based practice. National Institute of Health Daft, R., & Lane , P

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Task C 205

    • 376 Words
    • 2 Pages

    Leon tells you that he has a new friend who comes to his home and plays on his games console. A few days later you notice that the games console is missing. Leon tells you his new friend has borrowed it.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    C228 Task 1 WGU

    • 4743 Words
    • 16 Pages

    bordering the north side of the county, Spartanburg County bordering to the east, and Pickens…

    • 4743 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    ITM 309 Summer 2014 Syllabus

    • 1794 Words
    • 13 Pages

    In virtually every industry and every firm, Information Technology (IT) is driving change, creating opportunities, and suppporting complex enterprises. Leaders who fail to understand the…

    • 1794 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3110 PP1T

    • 777 Words
    • 5 Pages

    With the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Agencies within and those that supports the federal government are particularly at substantial risk for cyber attacks. Therefore, risk assessments are very important for network security management and analysis. The DLIS systems that connect via LAN and WLAN with the DLA network will be within the scope of this assessment.…

    • 777 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012)…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The purpose of this paper is to provide the reader with an insight of the Palm Beach County Health Department. The paper will provide details of the organization and its objectives, along with descriptions of the leadership practice used by the director of the organization. The paper will include details of how the current leadership has affected the organization’s culture, and an evaluation of a SWOT analysis to show the organization’s strength, weaknesses, opportunities, and threats. This paper will provide the reader with an evaluation of the primary leader’s leadership, showing strengths and weaknesses, as well as a recommendation of a theory-based practice to maximize the future success of the leader and the organization.…

    • 4717 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    To achieve a pass grade the evidence must show that the learner is able to:…

    • 1677 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    303 Task C

    • 354 Words
    • 1 Page

    I work in the care industry and have clients and honour other people’s religion or non religion that I look after that have had a totally different upbringing that myself. Some of these clients have dementia, I was raised in a different country with different beliefs. I had a traumatic upbringing but I cannot ever let my clients know about what my beliefs and life experiences are about. I through my experience with working in this environment have learnt that I have had to research other religions and beliefs and have learnt to respect all people and their beliefs. Prayers are a daily thing for me even though this was not taught to me in my earlier years. Religion affects people in many different ways mainly because we all come from different backgrounds and were all taught differently. It is therefore very important to respect and honour their personal beliefs. Some want to go to church on Sundays and others do not want to speak about church at all and I must respect the fact that they do not want to speak about anything about the Church. It is part of the work that I do to make sure my clients are happy and therefore am conscious at all times that they feel comfortable about anything they want to talk to me about.…

    • 354 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Our vision is to be the most trusted provider of systems and technologies that ensure the security and freedom of our nation and its allies. As the technology leader, we will define the future of defense—from undersea to outer space, and in cyberspace.…

    • 2097 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP).…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Leadership development in the nursing profession is important because it directly impacts the care that is delivered to clients. Transactional and Transformational leadership styles are two very different methods of leadership in the nursing profession. This Essay will compare and contrast these two styles and support that transformational leadership style inspires quality care, job satisfaction and improved patient outcomes…

    • 1143 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays

Related Topics