Reference no: EM131432219
This is a true story (with minor details changed). Microsoft had uncovered several licensing discrepancies in its software that clients were using while claiming they had purchased it from an authorized software retailer. The sale of one software package to a company in Tampa was traced back to a retailer in Pennsylvania, and yet the retailer had no record of any sales to the Tampa company. A private security consulting agency was called in, and they discovered that the network system administrator "Ed" in Pennsylvania was downloading pirated software from the Internet and selling it to customers as legitimate software behind the company's back. Ed had sold almost a half-million dollars in illegal software. The security firm also noticed a high network bandwidth usage. Upon further investigation they found that Ed was using one of the company's servers as a pornographic website with more than 50,000 images and 2500 videos. In addition, a search of Ed's desktop computer uncovered a spreadsheet with hundreds of credit card numbers from the company's e-commerce site. The security firm speculated that Ed was either selling these card numbers to attackers or using them himself.
The situation was complicated by the fact that Ed was the only person who knew certain administrative passwords for the core network router and firewall, network switches, the corporate virtual private network (VPN), the entire Human Resources system, the email server, and the Windows Active Directory. In addition, the company had recently installed a Hardware Security Module (HSM) to which only Ed had the password. The security consultant and the Pennsylvania company were worried about what Ed might do if he was confronted with the evidence, since essentially he could hold the entire organization hostage or destroy virtually every piece of useful information.
A plan was devised. The company invented a fictitious emergency situation at one of their offices in California that required Ed to fly there overnight. The long flight gave the security team a window of about five and a half hours during which Ed could not access the system (the flight that was booked for Ed did not have wireless access). Working as fast as they could, the team mapped out the network and reset all the passwords. When Ed landed in California, the chief operating officer was there to meet him and Ed was fired on the spot.
Now it's your turn to think outside of the box. What would you have done to keep Ed away so you could reconfigure the network? Or how could you have tricked Ed into giving up the passwords without revealing to him that he was under suspicion?
Describe the trait approach to leadership
: Describe the trait approach to leadership and identify the characteristics that distinguish successful leaders from ordinary people. Describe the nature of charismatic leadership and how it compares to transformational leadership
|
Develop an employee compensation and benefits package
: Choose the type of organization for which you are designing the package. Develop an employee compensation and benefits package for this new position. Support your ideas for the compensation/benefits package
|
Discuss about the federal emergency management policy
: In the Congressional Research Service Report for Congress, Federal Emergency Management Policy Changes After Hurricane Katrina: A Summary of Statutory Provisions (2006), eight areas are identified for policy changes to improve FEMA's capabilities...
|
Describe the impact of sir robert peel
: Describe the impact of Sir Robert Peel on American policing and Analyze the relationship between the U.S. government and the policing organizations throughout the United States.
|
Licensing discrepancies in software
: This is a true story (with minor details changed). Microsoft had uncovered several licensing discrepancies in its software that clients were using while claiming they had purchased it from an authorized software retailer.
|
How you deal with conflict in relationships
: Is it similar to how you handle conflict in non-work relationships? Discuss your conflict style and how this style has affected your relationships. In addition to noting any similarities or differences, consider explanations for each. (Length 2 p..
|
Define organizational effectiveness
: Define organizational effectiveness - Apply theories of organizational effectiveness to the management of criminal justice personnel.
|
Explain the significance of the selected category
: Describe the selected content and explain the significance of the selected category across all of the religions studied. Show in what ways the category is significant for each religion
|
How can graphics be used to misrepresent data
: How can Graphics and/or Statistics be used to misrepresent data?Where have you seen this done?
|