What change management tasks should kelvin perform

Assignment Help Management Information Sys
Reference no: EM131661193 , Length: word count:2000 + 10 Slides

Information Security Group Assignment

PART 1 -

Students are required to analyse and write a report about the following topics:

1. Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous

2. Using a Web browser, go to eff website. Choose one of the current top concerns of this organization and justify:

a. Why this topic was chosen?

b. How does it relate to information security subject contents?

3. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play.

a. A hacker breaks into the company network and deletes files from a server.

b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained.

c. A tornado hits a local power station, and the company will be without power for three to five days.

d. Employees go on strike, and the company could be without critical workers for weeks.

e. A disgruntled employee takes a critical server home, sneaking it out after hours.

For each of the scenarios (a-e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

PART 2 - Case Exercises

With your team members, please go through each case and answer the relevant discussion questions

CASE 1 - One day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day.

a. Do you think this event was caused by an insider or outsider? Explain your answer.

b. Other than installing virus and worm control software, what can SLS do to prepare for the next incident?

c. Do you think this attack was the result of a virus or a worm? Explain your answer.

CASE 2 - Charlie was getting ready to head home when the phone rang. Caller ID showed it was Peter. "Hi, Peter," Charlie said into the receiver. "Want me to start the file cracker on your spreadsheet?" "No, thanks," Peter answered, taking the joke well. "I remembered my passphrase.

But I want to get your advice on what we need to do to make the use of encryption more effective and to get it properly licensed for the whole company. I see the value in using it for certain kinds of information, but I'm worried about forgetting a passphrase again, or even worse, that someone else forgets a passphrase or leaves the company. How would we get their files back?" "We need to use a feature called key recovery, which is usually part of PKI software," said Charlie. "Actually, if we invest in PKI software, we could solve that problem as well as several others." "OK," said Peter. "Can you see me tomorrow at 10 o'clock to talk about this PKI solution and how we can make better use of encryption?"

a. Was Charlie exaggerating when he gave Peter an estimate for the time required to crack the encryption key using a brute force attack?

b. Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase?

Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key. Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's.

c. Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal?

Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter's illusion of privacy.

d. Is such a "little white lie" an ethical action on Charlie's part?

CASE 3 - Charlie looked across his desk at Kelvin, who was absorbed in the sheaf of handwritten notes from the meeting. Charlie had asked Kelvin to come to his office and discuss the change control meeting from earlier that day. "So what do you think?" Charlie asked. "I think I was blindsided by a bus!" Kelvin replied. "I thought I had considered all the possible effects of the change in my project plan. I tried to explain this, but everyone acted as if I had threatened their lives." "In a way you did, or rather you threatened their jobs," Charlie stated. "Some people believe that change is the enemy."

"But these changes are important." "I agree," Charlie said. "But successful change usually occurs in small steps. What's your top priority?" "All the items on this list are top priorities," Kelvin said. "I haven't even gotten to the second tier." "So what should you do to accomplish these top priorities?" Charlie asked. "I guess I should reprioritize within my top tier, but what then?" "The next step is to build support before the meeting, not during it," Charlie said, smiling. "Never go into a meeting where you haven't done your homework, especially when other people in the meeting can reduce your chance of success."

a. What project management tasks should Kelvin perform before his next meeting?

b. What change management tasks should Kelvin perform before his next meeting, and how do these tasks fit within the project management process?

c. Had you been in Kelvin's place, what would you have done differently to prepare for this meeting?

Suppose Kelvin has seven controls listed as the top tier of project initiatives. At his next meeting with Charlie, he provides a rank-ordered list of these controls with projected losses over the next 10 years for each if it is not completed. Also, he has estimated the 10-year cost for developing, implementing, and operating each control. Kelvin has identified three controls as being the most advantageous for the organization in his opinion. As he prepared the slides for the meeting, he "adjusted" most projected losses upward to the top end of the range estimate given by the consultant who prepared the data. For the projected costs of his preferred controls, he chose to use the lowest end of the range provided by the consultant.

d. Do you think Kelvin has had an ethical lapse by cherry-picking the data for his presentation?

Suppose that instead of choosing data from the range provided by the consultant, Kelvin simply made up better numbers for his favourite initiatives. Is this an ethical lapse? Suppose Kelvin has a close friend who works for a firm that makes and sells software for a specific control objective on the list. When Kelvin prioritized the list of his preferences, he made sure that specific control was at the top of the list. Kelvin planned to provide his friend with internal design specifications and the assessment criteria to be used for vendor selection for the initiative.

e. Has Kelvin committed an ethical lapse?

Reference no: EM131661193

Questions Cloud

Recrystallization solvent for an unknown solid : How would you determine an optimal recrystallization solvent for an unknown solid?
In what ways does given piece reflect contemporary culture : In what ways does this piece reflect contemporary culture? You must use ONE text from this unit to support your ideas.
What do you enjoy most about your work : In what setting do you practice? How long have you been practicing?What are your specialties or areas of clinical focus?
Spectral emission and absorption lines : Using the Bohr atomic model, explain to a 10-year old how spectral emission and absorption lines are created and why spectral lines for different chemical.
What change management tasks should kelvin perform : HS3011 Information Security Group Assignment. What change management tasks should Kelvin perform before his next meeting
Calculate the molar heat of combustion of anthracene : Calculate the molar heat of combustion of anthracene.
Evaluate published nursing research for credibility : Apply research principles to the interpretation of the content of published research studies.
Highlighting the main point and main points of the article : Access and read the article, highlighting main point and main points of article. Print it out if necessary, but make sure to read the entire article carefully.
What are the genotypes of the parental flies : What are the genotypes of the parental flies - Examine the ratios of F1 phenotypes. Is this expected for traits that are not linked

Reviews

len1661193

9/27/2017 8:26:40 AM

Australian student, I have the assignment it is in two parts, each part needs 1000 word and 5 references in Harvard style and we need slides for presentation of this assignment. Need total of 2000+ words with 10 references and 10 slides. For this assignment, you need to work as a group of 3-4 students. Submission Requirements: The assignment should include a list of at least 7 references and a bibliography of the wider reading done to familiarize oneself with the topic.

len1661193

9/27/2017 8:26:34 AM

Presentation and writing style /10 marks -Information is well organized. Correct layout including times new roman, font size 12 or calibri, font size10, double spaced. About the right length. -Very well written, excellent paraphrasing and proper grammar and punctuation are used throughout. Criteria completion /15 Evidence of understanding of the nature and purpose of the discussed requirements. Evidence of understanding of the implications for the organisation.

len1661193

9/27/2017 8:26:29 AM

Evidence of Research /10 marks Substantial range of appropriate and current, supportive evidence. Development of Discussion /15 marks Logical, insightful, original discussion with well-connected paragraphs. Evidence of full engagement with relevant and detailed analysis. Conclusion /5 marks An interesting, well written summary of the main points. An excellent final comment on the subject, based on the information provided.

Write a Review

Management Information Sys Questions & Answers

  Discussing shareholders responsibilities

Any reference to corporate governance results in discussing shareholders responsibilities. Perhaps there needs to be a focus on shareholder rights."

  Management and enterprise systems

Determine, within the health care setting, the main features, capabilities, and operational benefits to a health care organization using the following: management and enterprise systems

  Describe the value the new erp system brought to vodafone

discuss the value the new ERP system brought to Vodafone as a company and summarize your findings in a two to three page paper.

  What layer of the osi model does each device belong

What TCP/IP Address addresses would be used to connect the various networks, explain why you would choose the specific IP address scheme.

  Analyze the need for waterfall and agile methodologies

Analyze the need for waterfall and agile methodologies. Explain the advantages of extreme programming (XP) and analyze the advantages of its application in high-budget short-time projects.

  How a standard such as the ois model assists networks

The developers of the OSI model envisioned a detailed specification of interfaces. Instead, it has become a common reference model that is used by developers to standardize interfaces. Give your opinion on what you believe would happen to networks..

  Define and explain what the strategic technology is

Provide a definition of the term ENTERPRISE as it relates to technology. Select one of the top strategic technologies in the article and then conduct some research on it.

  How a consumer could benefit from asymmetric information

How a consumer could benefit from asymmetric information - Prepare an original example to illustrate how a consumer could benefit from asymmetric information

  Identifies the purpose of the project

Draft a 1-2 page (350 words per page) executive summary that states that identifies the areas of the business to be improved, identifies the purpose of the project, and lists stakeholders associated with the project

  Discuss an organization internal processes and operations

What role does strategic planning play in IS/IT investments? Is this something that can be easily adjusted when necessary? Why or why not?

  Explain how technology is changing face of businesses today

B6111.13- Describe how technology is changing the face of businesses today. Describe the most critical business processes that utilize information systems in your selected company.

  Evaluate your organization''s current sourcing strategy

Supply chain and sourcing strategy - What approach would you take if asked to re-evaluate your organization's current sourcing strategy?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd