Preview

Chapter 6 Case Study

Good Essays
Open Document
Open Document
1093 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 6 Case Study
Week 3 – Group Alpha

Chapter 6
Case Study – Cami Machado and Listo Systems’ Digital Information Services Team

A recent incident involving hacking and data theft prompted the implementation of a new data security system at Listo Systems. A “black box” system will be installed on every PC in the company and will not only affect the way data moves but also who has access to sensitive files. Nearly everyone at Listo Systems will be doing things very differently once the black boxes are in place.

Cami Machado has worked with Listo Systems for eight years. She is involved in a variety of projects related to “traffic” – the receipt and delivery of clients’ jobs. Her work also involves the training and support of the technical staff at Listo Systems. Cami has expressed interest in spearheading the implementation of the new “black box” data security system. Because she has effectively managed traffic flow at Listo for years, she is excited about the opportunity to move into this critical and visible new position. Her responsibilities would be similar to those that she has had in the past, but the implementation of this new system will dramatically affect nearly every aspect of Listo’s service. The technology is different from what she has used in the past, and the project’s scope is much larger.

Cami has an excellent track record of implementing new hardware and software. She is looking forward to leading this project and the new business opportunities it will help create. However, with this radical change in traffic flow, Cami will have to deal with challenges arising from “people issues.” Many technical staff members think that this change is unnecessary. Staff artists worry that it will hinder the creative process. Cami feels confident that she knows how to handle the scheduling and transition aspects of the new security system, but is worried about dealing with employees resisting the change. She is also concerned about losing key creative staff to other

You May Also Find These Documents Helpful

  • Best Essays

    The department is responsible for educating and assisting in working through the company’s policy and in dealing with policy breaches. Data security, quality, and integrity are valued commodities for a business who wishes to continue to prosper and grow, but the improper handling can also easily jeopardize its future (Pratt, 2008). Riordan’s need to consolidate data that has been created offline and potentially could be out-of-date is a data manager idea of a horror story. Through the use of data management solutions that support transactions processing in one location supports a more secure and efficient high-volume business. What also need to be considered are the multinational laws that Riordan had to adhere to because of its global footprint; legal requirements relating to data vary by country. It would be remiss to overlook the security of employees within the company because security falls under the domain of human resources. To take a safer, smarter approach toward personnel security the proposal will also include recommendations for company badges. A badge policy would keep track of employees as they come and go plus alert employees to the presence of a visitor. Monitoring equipment should also be considered as this would be ideal for public gathering places to record any activity after hours by using a motion sensor…

    • 3105 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Chapter 6 Case Study

    • 459 Words
    • 2 Pages

    The economy is down due to recession and a Florida hotel resort is trying to change their cleanliness policy to bring customers back. To do this, the hotel managers propose the “$10 dollar test”. The cleaning staff clean rooms based off of an instructional video. The manager observes them and then picks one random room to inspect. If the room is clean to the manager’s expectations, he or she will leave ten dollars. However, the manager will subtract a dollar for every mistake that they find. The housekeepers disapproved of this test at first because they were not confident that they would receive a big portion of that money. Eventually however, they became motivated and started correcting their mistakes so that they can receive the whole ten dollars.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 2: Case Study

    • 686 Words
    • 3 Pages

    Brett and Kathy’s filing status used to be married, filing jointly. Although both of Brett and Kathy want to get divorce, they have not divorced considering financial pressure and their three children. From 2014, Brett begins to contribute more than Kathy do to support the home and their children. Also they want to file income tax returns separately. Thus Brett believes he can claim head of household filing status.…

    • 686 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Study Week 5

    • 346 Words
    • 2 Pages

    Beatty, J. F., Samuelson, S. S., & Bredeson, D. A. (2013). Introduction to business law. In Introduction to business law (4th, Ch. 11). Mason, OH: South-Western Cengage Learning.…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Case Study Week 8

    • 1175 Words
    • 5 Pages

    Kevin Pudney and Malcolm Rose have worked in the care sector for over 20 years. Their most recent job is part of a European project aimed at improving training and development in business and 'speeding the time to competency'. More information on the research project is available on the Prolix website (www.prolixproject.org). The project was conducted in partnership with Social Care Institute of Excellence.…

    • 1175 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    6 3 Case Study

    • 408 Words
    • 2 Pages

    Strategic planning refers to a course of action for outlining organizational objectives, carrying out planning to achieve those objectives, and measuring the usefulness of those strategies (Kovner & Knickman, 2011).…

    • 408 Words
    • 2 Pages
    Good Essays
  • Good Essays

    case study 5

    • 411 Words
    • 2 Pages

    What is the crisis experienced in Erikson’s first stage of psychosocial development? How did Chrystell resolve this stage? What was the outcome of the crisis? Was it favorable or unfavorable?…

    • 411 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lesson 4 case study

    • 289 Words
    • 1 Page

    1) Travis eats steak and cheese subs every day of the week. Explain the types of fats, as well as the properties of each type, that are found in these subs.…

    • 289 Words
    • 1 Page
    Satisfactory Essays