What integration issues do merging companies face

Assignment Help Computer Network Security
Reference no: EM131024925

IT Discussion Questions for 2 Parts

Respond to 2 questions per Part and must be 200 words minimum per a response to a question. So total you will have 2 responses for Part 5 questions and 2 responses to Part 6 questions.

Part 1

1. Legislative Processes: What about Cybersecurity?

a. Periodically, congress attempts to formulate and pass additional Cyber Security legislation. In 2015, the focus was on improving information sharing between government agencies and private entities to combat cyber threats.

Please review this legislative proposal https://www.congress.gov/bill/114th-congress/senate-bill/754 and provide your assessment of the bill's pros/cons and the impact it will have on privacy and the Internet. Keep in mind there are other cybersecurity related bills that have been or will be proposed in the near future. Do some research and compare and contrast the intent of other pieces of cyber security legislation that are relevant to the discussion.

Please remember to cite your sources.

2. Integration Issues

a. What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences? How would the security professional bring together both IT teams so they feel comfortable? One of the most "invisible" barriers to success is the feeling of other IT professionals or teams "loss of control". How can you ease fears and build a positive team?

3. Cultural Differences

a. Cultural differences when companies merge can last for years. There have been instances when the acquired company had more advanced technology then the other company, and they were forced to step back in time. That is a very frustrating experience. How would you tackle this issue?

Part 6

1. Energy Sector and Cybersecurity

a. Please read Energy Cybersecurity Issue.docx. As you can see this article was published in early 2012 and it deals with issues associated with the Energy Sector. The article claims that since 2009 the Energy Sector has not improved its Cybersecurity Programs with money that was given to it by the Federal Government.

Do some research on your own and try and find related articles or issues concerning security concerns regarding the Energy Sector. Based on your research what are some of the continuing concerns and what is the impact if a cyber attack is launched against the Energy Sector. Do you think that type of attack would have a significant impact or is our infrastructure robust enough to withstand an attack? What recommendations would you make if you were a Cyber Analyst giving your opinion to Congress?

Remember to cite your sources!

2. Conflict Management Techniques

a. Conflict management techniques come in handy when you are working in organizations. Most people do not have a good skill set in this area. Read the article, Conflict Management Techniques, available here, https://www.personalityexplorer.com/home/FREEResources/ConflictManagementTechniques.aspx. You might recognize a technique you already use. Select one technique and provide an example of how you think it may be used during a merger, or formation of a team. Provide details.

3. Managing a Remote Workforce

a. Most work forces are moving to more remote access. How do you manage people remotely? How do you make sure that they are included in the team. Our example has only two countries involved, what if there are many? How do you provide them access into the network securely? Especially if they are coming in from other countries that are known for infiltrating networks??

4. Legal Systems

a. There are a lot of security reasons for decommissioning legacy systems at all times, not just at a merger. Discuss two security issues and then provide the business reason for decommissioning that we could present to the business line. In a for-profit company, you have to save the security card for when it is really important. You need to address risk. You can't afford to mitigate all risk, sometimes you have to accept it or transfer it. How will this scenario affect your customer base? How will you be able to continue business? Be creative with your answers.

Reference no: EM131024925

Questions Cloud

Determining the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
Can you tell whether or not a is diagonalizable : What can you tell about the algebraic and geometric multiplicities?
How will the reaction proceed to reach equilibrium : The reaction A2 + B2 ? 2 AB has an equilibrium constant Kc = 1.5. The following diagrams represent reaction mixtures containing A2 molecules (red), B2 molecules (blue), and AB molecules. Which reaction mixture is at equilibrium?
Question regarding the restructuring program : In reporting to its U.K.- based on IFRS, provide all journal entries for June 1st 2004, June 30th 2004, October 31st 2004, Nov 30th 2004 for restructuring program.
What integration issues do merging companies face : What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences?
Write the equilibrium- constant expression for the reaction : The following diagram represents a reaction shown going to completion. Letting A = red spheres and B = blue spheres, write a balanced equation for the reaction. Write the equilibrium- constant expression for the reaction.
Differences in contractual provisions : IBM Bond Pricing. All bonds have some common characteristics, but they do not always have the same contractual features. Differences in contractual provisions, and in the underlying strength of the companies backing the bonds
Are the given equations are dependent or independent : Solve the system of equations by graphing. Then classify the system as consistent or inconsistent and the equations as dependent or independent.
What is equation that characterizes your roommate budget : How many T-shirts can be purchased if your roommate decides to not buy a sweater and brave the harsh winter? What is the price of a sweater? What is the equation that characterizes your roommate's budget

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd