What integration issues do merging companies face

Assignment Help Computer Network Security
Reference no: EM131024925

IT Discussion Questions for 2 Parts

Respond to 2 questions per Part and must be 200 words minimum per a response to a question. So total you will have 2 responses for Part 5 questions and 2 responses to Part 6 questions.

Part 1

1. Legislative Processes: What about Cybersecurity?

a. Periodically, congress attempts to formulate and pass additional Cyber Security legislation. In 2015, the focus was on improving information sharing between government agencies and private entities to combat cyber threats.

Please review this legislative proposal https://www.congress.gov/bill/114th-congress/senate-bill/754 and provide your assessment of the bill's pros/cons and the impact it will have on privacy and the Internet. Keep in mind there are other cybersecurity related bills that have been or will be proposed in the near future. Do some research and compare and contrast the intent of other pieces of cyber security legislation that are relevant to the discussion.

Please remember to cite your sources.

2. Integration Issues

a. What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences? How would the security professional bring together both IT teams so they feel comfortable? One of the most "invisible" barriers to success is the feeling of other IT professionals or teams "loss of control". How can you ease fears and build a positive team?

3. Cultural Differences

a. Cultural differences when companies merge can last for years. There have been instances when the acquired company had more advanced technology then the other company, and they were forced to step back in time. That is a very frustrating experience. How would you tackle this issue?

Part 6

1. Energy Sector and Cybersecurity

a. Please read Energy Cybersecurity Issue.docx. As you can see this article was published in early 2012 and it deals with issues associated with the Energy Sector. The article claims that since 2009 the Energy Sector has not improved its Cybersecurity Programs with money that was given to it by the Federal Government.

Do some research on your own and try and find related articles or issues concerning security concerns regarding the Energy Sector. Based on your research what are some of the continuing concerns and what is the impact if a cyber attack is launched against the Energy Sector. Do you think that type of attack would have a significant impact or is our infrastructure robust enough to withstand an attack? What recommendations would you make if you were a Cyber Analyst giving your opinion to Congress?

Remember to cite your sources!

2. Conflict Management Techniques

a. Conflict management techniques come in handy when you are working in organizations. Most people do not have a good skill set in this area. Read the article, Conflict Management Techniques, available here, https://www.personalityexplorer.com/home/FREEResources/ConflictManagementTechniques.aspx. You might recognize a technique you already use. Select one technique and provide an example of how you think it may be used during a merger, or formation of a team. Provide details.

3. Managing a Remote Workforce

a. Most work forces are moving to more remote access. How do you manage people remotely? How do you make sure that they are included in the team. Our example has only two countries involved, what if there are many? How do you provide them access into the network securely? Especially if they are coming in from other countries that are known for infiltrating networks??

4. Legal Systems

a. There are a lot of security reasons for decommissioning legacy systems at all times, not just at a merger. Discuss two security issues and then provide the business reason for decommissioning that we could present to the business line. In a for-profit company, you have to save the security card for when it is really important. You need to address risk. You can't afford to mitigate all risk, sometimes you have to accept it or transfer it. How will this scenario affect your customer base? How will you be able to continue business? Be creative with your answers.

Reference no: EM131024925

Questions Cloud

Determining the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
Can you tell whether or not a is diagonalizable : What can you tell about the algebraic and geometric multiplicities?
How will the reaction proceed to reach equilibrium : The reaction A2 + B2 ? 2 AB has an equilibrium constant Kc = 1.5. The following diagrams represent reaction mixtures containing A2 molecules (red), B2 molecules (blue), and AB molecules. Which reaction mixture is at equilibrium?
Question regarding the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
What integration issues do merging companies face : What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences?
Write the equilibrium- constant expression for the reaction : The following diagram represents a reaction shown going to completion. Letting A = red spheres and B = blue spheres, write a balanced equation for the reaction. Write the equilibrium- constant expression for the reaction.
Differences in contractual provisions : IBM Bond Pricing. All bonds have some common characteristics, but they do not always have the same contractual features. Differences in contractual provisions, and in the underlying strength of the companies backing the bonds
Are the given equations are dependent or independent : Solve the system of equations by graphing. Then classify the system as consistent or inconsistent and the equations as dependent or independent.
What is equation that characterizes your roommate budget : How many T-shirts can be purchased if your roommate decides to not buy a sweater and brave the harsh winter? What is the price of a sweater? What is the equation that characterizes your roommate's budget

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to design an improved interactive password system

Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.

  How to create one overall network

Complete research project, you must do several things - gain sufficient background knowledge to provide a basis for understanding the topic - find sources of information on the topic.

  Define ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc.

  Network design paper

Network Design Paper

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Examine the pros and cons of hiring white-hat hackers in

ip addresses and network security testing please respond to the following1.examine five reasons why ipv6 has not

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

  Explain information security threats and vulnerabilities

Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Write down a 1400- to 2100-word paper which explains the

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Describe the properties and usage of digital signatures

Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court

  Most threatening security issues firms have to deal with

Research current security trends, countermeasures, and threats. What will be the most threatening security issues firms have to deal with within the next five years?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd