SlideShare une entreprise Scribd logo
1  sur  23
Running head: EMERGING THREATS AND
COUNTERMEASURES 1
LITERATURE REVIEW
Emerging threats and countermeasures in the U.S. critical
infrastructure
Table of content
Background information 3
Research questions 3
Methodological approach 3
Data analysis and findings 3
Challenges in confronting threats 6
Conclusion and discussion 8
References……………………………………………………………
……………………………9
Background information
In recent times, the province of security architecture has
profoundly transposed by the escalation of threats targeting
critical national infrastructure. The rise in such threats is
directly related to the rapid integration of the infrastructures
with emergent information technologies (IT). That said, it is
easy to conclude that the destructive threats to the
infrastructures are from cybercrime. Cybercrime manifests in
several dimensions from worms, viruses to malware. It would be
easy if such threats confronted quickly. However, the state of
affairs is that it is not an easy endeavor at all, and hence
protecting national infrastructure is even more challenging than
it has ever been.Research questions
This essay answers the questions of the literature related to the
emergent threats in the protection of critical national
infrastructure. More also, it answers the question of the
challenges involved in securing the
infrastructures.Methodological approach
The study of data collection is conducted using a qualitative
approach. Qualitative research is the scientific study of
observations that seeks to describe, explore, explain, and
diagnose phenomena by gathering non-numerical data.Data
analysis and findings
It has not been easy protecting national infrastructure in the
last two decades thanks to an increase in cybercrime. Public
information systems are lucrative targets for hackers and other
ill-motivated criminals. The state affairs have led to a
conclusion that in a time in the current generation, the world is
increasingly veering toward cyber warfare. The cost of
cybersecurity threats is estimated to be over billions of dollars
and still learning. Even with new measures, it appears the rate
at which cybercriminals are expanding their technological
dominion in the deep web is exceedingly strange.
Cybersecurity attacks take different dimensions. Perhaps one of
the most devastating has been related to user inefficiency when
handling systems. Most cybercriminal activities have shown an
impeccable ability to surpass both the human and system shields
that protect systems. In the dawn of the early 2000s, for
example, the world was in a panic following an attack unleashed
by two Philippine students. The attack, known as love bug
exposed the value system behind the human-based security
system. It is one of the weakness and which is solely flexible to
easy manipulation. Following the love bug attack, the national
intelligence system had to be switched off for several hours.
The cutting-edge world has seen a multiplication in the
development of web associations and data innovation gadgets
which applied in business set-up, both private and open division
enterprises, for proficiency in tasks the board. The creators note
that these fresher inventive advances have prompted a massive
ascent in instances of digital assault occurrences which, to a
more prominent degree, have unsatisfactory results to the
business and money industry. Spread of malware into data and
correspondence innovation frameworks and systems for
malevolent goals has been a scandalous standard. The national
security facts from remote-based strikes and its PC organize the
U.S. Government protects systems. The National Cybersecurity
and Protection framework program named Einstein initially
dependent on the examination innovation sent more than ten
years earlier, and the system's guaranteeing $218 million
overhauls should make it ready to do dynamically ambush
expectation.
There have been several attacks lately targeting information
systems across the world. These attacks included denial of
service attacks, which takes over a system. The second type of
cybersecurity attack is a man in the middle attack. The third
attack is phishing. Phishing exploits the human bridge between
systems and security. It makes no difference how secure a
system is. It is always non-immune to attack. The fourth
cyber-based challenge is the eavesdropping attack. Finally,
critical national infrastructure systems are also vulnerable to
smurf attacks. The standard form of attacks involves the hacker
saturating a system with traffic to the extent that such systems
fail to perform essential functions. The attack medium ranges
from viruses to worms and malware. Worms are a potential
source of concern as they can easily permeate through a network
system. The leading type of malware is computer viruses,
spyware, adware, rootkit, Trojan horse, ransomware, worm, key
logger, and botnet (Hansen et al., 2016). Computer viruses are
infectious software that quickly self-replicates intending to
destroy confidential and valuable data or cause irreparable
damage (Holt et al., 2015). The scholar utilized a qualitative
method in analyzing the risks. Cyber-attacks are growing at a
rapid rate nowadays. Most of the threats focus on Government
Systems, businesses, and commerce. One of the recent attacks
on Barclays bank was made using a remote-controlled
Keyboard, Video, and Mouse (KVM).
Threats are physical as well. Currently, the world faces a
political and violent conflict situation in their endeavor to
protect critical infrastructure. There is an escalation in terrorist
activity, mainly emanating from the developing nations in the
Middle East and parts of Africa such as Somalia, Northern
Nigeria, and some areas in North Africa such as Libya.
Terrorism activities are as much related to religious
radicalization as they exhibit an element of resources and
resource conflict. They have a resources element because they
motivated by the unabated flow of dark money, which is used to
control and pacify an already disappointed bulging youth
population in the countries (Olmstead, & Smith, 2017).
Furthermore, the conflicts are related to resource conflict
because most of the time, it is the authoritative allocation of
resources that is to blame for radicalization. Terrorism
activities are diversified, and in recent times the world is
increasingly conscious of biothreats among others.Challenges in
confronting threats
Confronting cybersecurity threats have proven to be one of the
most challenging dispensations in recent times (Sood, Rohit, &
Richard, 2012). First, there has been a revolution in hacking
technologies. Hidden in the dark and deep web, and operated by
malicious experts in advanced data centers, hacking
technologies have progressed even quicker than the preventive
capacities. Sood, Rohit, & Richard (2012) also argues that it is
also straightforward to acquire the technologies on the dark
web. They are all sorts of sites in such places which deal with
startup packages for anybody wishing to live their lives as a
hacker. Individuals are seeking crime display a remarkable
ability to adapt to changing technologies, environments, and
lifestyles. The ability of hackers to infiltrate new protection
systems and hack has shown impeccable revolution lately.
Singh, & Singh (2016) argue that the main reason behind the
revolution in cyber-attacks because cybercrime has become
more lucrative with the introduction of digital currencies. These
currencies are the mainstream medium of exchange between
hackers and victims of breaches. The currency can also not be
tracked down by law enforcement agencies, and they leave very
little forensic evidence behind (Singh, & Singh, 2016).
The advancement in the technologies is directly related to
increased monetization of cybercrime. The last decade has seen
the growth of digital currencies. The currencies are indeed a
catalyst for concealing cybercrime as financial payments easily
flow from victims to criminals without a trace. Digital currency
lacks identification details which complicate the ability of law
enforcement agencies to track and respond to crime. They were
designed to mirror traditional currencies, in hard notes, where it
would never be easy to monitor where a dollar note goes after it
leaves the federal bank.
Forensic experts have also been a little bit incapacitated in the
fight against cybercrime. One of the main reasons is the
complication of cybercrime (O'Dowd, 2017). The agencies are
incapable of confronting cybercrime as quickly as possible and
arresting the culprits. The fundamental deterrence to any form
of crime is the probability of arrest. Even with arrest, the
agency has an inadequate forensic capacity to gather and handle
evidence. The challenge in protecting against crimes with a
global magnitude is multifaceted. Cybercrime, for example,
faces a challenge as a result of overlapping jurisdiction. For
terrorism activities, challenges are originating from resources
and resource conflict.
More also, cybercrime is not the province of local politics and
control but supersedes boundaries, to the reach of often rogue
states that also sponsor such activities (Thornton-Trump 2012).
The scholar also argues that where, however, there exists the
will to prosecute criminals in different states, the problem of
jurisdiction and sovereignty works hand in hand to frustrate the
quest of law enforcement agencies. The problem is that not all
nations in the globe have an elaborate legal system that defines
hacking as a crime (White, 2016). The weakness of such a state
of affair is evident in the love bug case where the two
Philippines would not prosecute because the Philippines lacked
in statutes that addressed cybercrime directly. The ultimate
hurdle facing law enforcement agencies is its inability to keep
up with the innovation speed. It emanates from the fact that
there lack specially dedicated labs in several states for dealing,
detecting, and ultimately handling threat modeling. Threat
modeling deals with speculations aspects and relies on the
premise of preventing and identifying threats before it occurs.
One of the greatest hindrances to overcoming cybercrime threats
is the human elements. User-based links to threats is
undoubtedly a point of concern because, as it is evident, most
threats are related to phishing attempts. Threat agents permeate
through a weakness in systems, and on most occasions, the
weakness caused by human beings who operate the systems.
(Von & Upton, 2016). User-based threats result from inadequate
education. Users who operate and run critical infrastructure
systems need thorough training on system security. The training
is currently insufficient or probably inadequate, though it is not
surprising because phishing attempts and attacks focus on
human emotional weaknesses.Conclusion and discussion
Critical national infrastructure currently faces a myriad of
threats, whether physical or cyber-based. The most devastating
of the crime is cyber, which manifests in several dimensions.
The world surely is increasingly and inflexibly veering toward
cyber warfare. USA has recognized cyberspace as a fifth domain
in the security agenda after land, sea, air, and space (Harrop.W
& Matteson.A, 2015). Critical infrastructure has also been a
victim of domestic and international sabotage and terrorism.
Cybersecurity plays a vital role in the growth of the digital
economy (Chooi S, Ahmad M, 2017). This paper can conclude
that cyber warfare is coming and the impact can be prevented or
minimized by following the security measures.
References
Hansen, S. S., Larsen, T. M. T., Stevanovic, M., & Pedersen, J.
M. (2016, February). An approach for detection and family
classification of malware based on behavioral analysis. In 2016
International Conference on Computing, Networking, and
Communications (ICNC) (pp. 1-5). IEEE.
J. Holt, Thomas & Bossler, Adam & Seigfried-Spellar, Kathryn.
(2015). Cybercrime and DigitalForensics: An Introduction.
O'Dowd, A. (2017). Major global cyber-attack hits NHS and
delays treatment. BMJ: British Medical Journal (Online), 357.
Olmstead, K., & Smith, A. (2017). Americans and
cybersecurity. Pew Research Center, 26.
Singh, S., & Singh, N. (2016, December). Blockchain: Future of
financial and cybersecurity. In 2016 2nd International
Conference on Contemporary Computing and Informatics (IC3I)
(pp. 463-467). IEEE.DOI:10.1109/ic3i.2016.7918009.
Sood, Aditya K., Rohit Bansal, and Richard J. Enbody. (2012).
"Cybercrime: Dissecting the state of the underground
enterprise." IEEE internet computing 17.1 (2012): 60-68.
Thornton-Trump, Ian. (2018). "Malicious attacks and actors: an
examination of the modern cybercriminal." EDPACS 57.1 17-
23.
Von Solms, B., & Upton, D. (2016). Cybersecurity capacity
governance. The Business & Management Review, 7(4), 34.
White, J. (2016). Cyber Threats and Cyber Security: National
Security Issues, Policy, and Strategies. Global Security Studies,
7(4).
Nandakumar, N., & Lakshmi, I. (2017). Emerging and
Upcoming Threats in Cyber Security in 21 Century.
International Journal of Computer Science and Mobile
Computing, 6 (2), 107–118.
Hewes, C. A. (2016). Threat and challenges of cyber-crime and
the response. Quarterly journal. S.A.M.Advanced Management
Journal, 81(2), 4-10,2.
Harrop W, Matteson A. (2015) Cyber resilience: a review of
critical national infrastructure and cybersecurity protection
measures applied in the UK and USA. DOI
10.1057/9781137455550
Chooi, T., & Ahmad M. (2017) National cybersecurity strategies
for digital economy. DOI 10.1109/ICRIIS.2017.8002519
Hefty Hardware Case 2
Abstract
This paper discusses the partnership and the shortcomings of the
IT and business in the
Hefty Hardware. This paper also covers a proposed plan to
improve collaboration to effectively
deliver Saavy Store Program.
Hefty Hardware Case 3
Hefty Hardware Case Study Assignment
Effective communication is key to the success of any company,
and ineffective
communication can hinder the partnership between IT and
business. Without proper
collaboration, a company is at a high risk of failing.
Partnership and Shortcomings between IT and Business
One of the key issues faced by Hefty is communication issue
between IT and Business.
The failure to create a strategic plan to drive the business and
IT strategy lead to misalignment, a
lack of understanding and ineffective collaboration between the
two primary functions.
There exists a lack of awareness of the role of business in
contributing to the overall
business strategy. As per Cheryl, VP of Retail Marketing, she is
unable to draw the correlation
between IT and business operations in delivering new
technologies in a timely manner.
Due to this lack of collaboration and ineffective
communication, business failed to
communicate the desired business needs and requirements to IT.
As pointed out by Glen, the
COO and Paul, Marketing IT relationship manager, IT was
expected to deliver on tasks beyond
the scope of their technical roles without proper understanding
of the requirements.
Proposed Plan for effective collaboration between IT and
Business
To overcome the shortcomings, team collaboration can be
encouraged through a retail
site visit of both the business and IT to understand the
requirements of the Saavy Store Program
better.
The role of an account manager can be leverage to bridge the
gap between business and
IT and ensure common understanding and effective
communication. The VP, COO and CIO
Hefty Hardware Case 4
should assign appropriate resources, motivate and lead their
team to deliver on the mission and
vision of the program.
Hefty Hardware Case 5
References
McKeen, J. and Smith, H. (2015). IT Strategy. Pearson
Education UK.
Mini Case Innovation at International Foods2
2 Smith, H. A., and J. D. McKeen. “Innovation at International
Foods.” #1-L09-1-002, Queen’s
School of Business, December 2009. Reproduced by permission
of Queen’s University, School
of Business, Kingston, Ontario.
Josh Novak gazed up at the gleaming glass-and-chrome
skyscraper as he stepped out
of the cab. “Wow!” he thought to himself. “I’ve hit the big time
now.” The International
Foods Group (IFG) Tower was a Chicago landmark as well as
part of the company’s
logo, which appeared on the packages of almost every type of
food one could
imagine—breakfast cereals, soft drinks, frozen pizza, cheese,
and snack foods, to name
just a few. Walking into the tower’s marble lobby, Josh could
see displays of the
company’s packaging from its earliest days, when its dairy
products were delivered by
horse and wagon, right up to the modern global entity it had
become.
After signing in with security, Josh was whisked away to the
37th floor by an
efficient attendant who walked him down a long hall of cubicles
to a corner office
overlooking Lake Michigan. On the way, Josh passed display
photos of the company’s
founder, old Jonas Wilton looking patriarchal, and several of
the family scions, who had
grown the company into a major national brand before the IPO
in the 1980s had made
IFG a public company. Josh, having “Googled” the company’s
history last night in
response to this summons, knew that IFG was now the largest
purveyor of food
products the world had ever known. While many decried the
globalization of the food
business, IFG kept right on growing, gobbling up dozens of
companies each year—
some because IFG wanted to stomp on its competition and
others because it wanted
their good ideas.
Josh’s own small company, Glow-Foods, a relative newcomer in
the business, was
fortunately one of the latter, but Josh was a little puzzled about
this command
performance. After all, he himself wasn’t anyone important. The
owners of the company
all received multiple millions and were sticking around—as per
contract—during the
transition. The next level, including Josh’s boss, had mostly
jumped ship as soon as the
“merger” was announced. “This isn’t my thing,” drawled Nate
Greenly over beer one
night at the local pub. “Corporate America isn’t going to let us
stay as we are, no matter
what they say. Get out while you can,” he advised. But Josh,
with a freshly minted MBA
in his pocket, thought differently. And so here he was, walking
into the CIO’s office
hundreds of miles away from the cramped loft in Toronto where
Glow-Foods was
headquartered.
As the office door swung open, two people dressed in “power
suits” turned to meet him.
“Uh oh, I’m not in Kansas anymore,” thought Josh as he
mentally reviewed his outfit of
neatly pressed khakis and golf shirt, which was a big step up
from his usual attire of
jeans and a T-shirt. A tall man with silver hair stepped forward
with his hand held out.
“You must be Josh,” he boomed. “Welcome. I’m John Ahern,
and this is my associate,
Tonya James, manager of IT marketing. Thanks for coming
today. Please, have a seat.”
Josh complied, slinging his backpack over the corner of the
leather chair while taking in
the rich furnishings of the office and the panoramic view. After
a bit of chitchat about the
https://jigsaw.vitalsource.com/books/9780133777628/epub/OPS/
xhtml/fileP7000494406000000000000000001C81.xhtml#P70004
94406000000000000000001DE8
https://jigsaw.vitalsource.com/books/9780133777628/epub/OPS/
xhtml/fileP7000494406000000000000000001C81.xhtml#r__P70
00494406000000000000000001DE8
weather and the prospects of their respective baseball teams,
John pulled out a black
leather folder.
“Well, we won’t keep you in suspense anymore, Josh. As you
know, when we took over
Glow-Foods we decided to completely align our processes,
including IT. It doesn’t make
any economic sense to run separate data centers and
applications, so we already have
a team in place to transfer all your hardware and software to our
centralized corporate
systems over the next month. We’ll be replacing your Macs with
PCs, and everyone will
get training on our ERP system. We’re going to keep a small
team to deal with the
specifically Canadian issues, but other than that we see no need
for an IT function in
Toronto any more.” Josh nodded glumly, thinking about his
friends who would be losing
their jobs and all the fun they’d had during those all-nighters
brainstorming new ways to
help Glow-Foods products go “viral.” Nate was right, he
thought glumly. They don’t really
get us at all.
“That said,” John continued. “We are very impressed with the
work you and your team
have done in using social networking, mashups, and multimedia
to support your
marketing strategy. Your ability to reach the under-thirty
demographic with technology is
impressive.” He turned to Tonya, who added. “Here at IFG, we
have traditionally
marketed our products to women with children. We have a
functional Web site—a place
where customers can find out about our products and where to
buy them. More
recently, we’ve added their nutritional content, some recipes,
and a place where
customers can contact us directly with questions, but it’s really
unidirectional and pretty
dry.”
Josh nodded in agreement with this assessment. The difference
in the two companies’
approaches was night and day. Although not everything they
had tried at Glow-Foods
had worked, enough of it had succeeded that demand for the
company’s products had
skyrocketed. Young adults and teens had responded en masse to
the opportunity to
post pictures of themselves drinking their Green Tea Shakes in
unusual places on the
Glow-Foods Web site and to send a coupon for their favorite
Glow-Foods product to a
friend. Serialized company mini-dramas popped up on YouTube
and viewers were
asked to go online to help shape what happened to the
characters—all of them using
Glow-Foods products extensively. Contests, mass collaboration
in package design, and
a huge network of young part-time sales reps linked through
Facebook all contributed to
making the brand hip and exciting—and drove sales through the
roof.
John adjusted his French cuffs. “We want to tap into the youth
and young adult market
with IT, and we think you’re the one who can help us do this.
We’re going to give you a
team and whatever resources you need right here in Chicago.
With our global reach
and much larger budgets, you could do great things for our
company.” John went on to
outline a job offer to Josh that sent tingles down his spine. “I
really have hit the big
time,” he thought as he signed the documents making him a
team manager at IFG at a
salary that was almost double what he was earning now. “I can’t
wait to get started.”
Six weeks later he was being walked down the same hall by
Tonya, now his immediate
boss, and into her office, a smaller version of his with a window
looking onto another
high-rise. “What’s next?” he asked. “I’ve booked a meeting
room for you to meet your
new team at ten-thirty,” Tonya explained. “But before that, I
want to go over a few things
with you first. As the manager of IT Marketing, I am personally
thrilled that we’re going
to be experimenting with new technologies and, as your coach
and mentor at IFG, I’m
going to make it my job to see that you have the resources and
support that you need.
However, you may find that not everyone else at this company
will be as encouraging.
We’re going to have some serious obstacles to overcome, both
within IT and with the
larger company. It will be my responsibility to help you deal
with them over the next few
months as you put your ideas together. But you need to know
that IFG may have
different expectations of you than Glow-Foods. And you may
find you will get a better
reception to your ideas if you look a bit more professional.”
Josh winced and nodded.
He’d already ramped up the wardrobe for his first day with a
sports jacket, but clearly he
needed to do more. “Finally, I’d like you to come up here every
Friday afternoon at four
o’clock to go over your progress and your plans. My schedule is
usually fully booked,
but if you have any questions you can always send me an e-
mail. I’m pretty good at
getting back to people within twenty-four hours. Now let’s go
meet your new team. I
think you’ll be happy with them.”
An hour later Josh and his new team were busy taking notes as
Tonya outlined their
mandate. “You have a dual role here,” she explained. “First, I
want you to work with Ben
here to develop some exciting new ideas for online marketing.
We’re looking for
whatever creative ideas you have.” Ben Nokony was the team’s
marketing liaison. Any
ideas would be vetted through him, and all proposals to the
individual product teams
would be arranged by him. “Second, I need you to keep your
eyes open and your ears
to the ground for any innovative technologies you think might
work here at IFG. These
are our future, and you’re our vanguard.” Josh glanced around
at his team, an eclectic
group. They seemed eager and enthusiastic, and he knew they
were talented, having
had a say in choosing them. With the exception of Ben, all were
new to IFG,
experienced in using a variety of new media, and under thirty
years old. They were
going to do great things together, he could see.
The next couple of weeks were taken up with orientation. Ben
introduced each of the
major product divisions to the team, and everybody had come
back from each meeting
full of new possibilities. Tonya had also arranged for the team
to meet with the chief
technology officer, Rick Visser, who was in charge of
architecture, privacy and security,
risk management, and the technology roadmap. Rick had been
pleasant but cool.
“Please remember that we have a process for incorporating new
technology into our
architecture,” he explained as he handed over a thick manual of
procedures. “In a
company our size we can’t operate without formal processes.
Anything else would be
chaos.” The team had returned from that meeting full of gloom
that their ideas would all
be shot down before they were even tried. Finally, they had met
with the IT finance
officer. “I’m your liaison with corporate finance,” Sheema
Singh stated. “You need to
work with me to develop your business cases. Nothing gets
funded unless it has a
business case and is approved through our office.”
Finally, having dragged some chairs into Josh’s eighteenth-floor
and marginally larger
cubicle and desk, the team got down to work. “This is
ridiculous,” fumed Mandy Sawh,
shuffling her papers on her lap. “I can’t believe you need to
book a conference room two
weeks in advance around here. Who knows when you need to
get together?” “Okay,
team, let’s settle down and take a look at what you’ve got,” said
Josh. One by one, they
outlined their preliminary ideas—some workable and some
not—and together they
identified three strong possibilities for their first initiatives and
two new technologies they
wanted to explore. “Great work, team,” said Josh. “We’re on
our way.”
The problems began to surface slowly. First, it was a polite
email from Rick Visser
reminding them that access to instant messaging and Facebook
required prior approval
from his group. “They want to know why we need it,” groused
Veejay Mitra. “They don’t
seem to understand that this is how people work these days.”
Then Ben got a bit snippy
about talking directly to the product teams. “You’re supposed to
go through me,” he told
Josh’s team. “I’m the contact person, and I am supposed to be
present at all meetings.”
“But these weren’t ‘meetings,’” Candis Chung objected. “We
just wanted to bounce
some ideas around with them.” Next, it was a request from
Sheema to outline their
proposed work, with costs and benefits, for the next fiscal
year—beginning six months
from now. “Can’t we just make up a bunch of numbers?” asked
Tom Webster. “We don’t
know how this stuff is going to play out. It could be great and
we’ll need lots of
resources to scale up, or it could bomb and we won’t need
anything.” Everywhere the
team went, they seemed to run into issues with the larger
corporate environment. Tonya
was helpful when Josh complained about it at their Friday
afternoon meetings,
smoothing things over with Rick, helping Josh to navigate
corporate procedures, and
even dropping by to tell the team they were doing a great job.
Nevertheless, Josh could sense his own and everyone else’s
frustration as they
prepared for their first big project review presentation. “They
want us to be innovative,
but they keep putting us in a straight-jacket with their
‘procedures’ and their ‘proper way
to go about things,’” he sighed to himself. Thank goodness, the
presentation was
coming together nicely. Although it was only to the more junior
executives and, of
course, John and Rick, he had high hopes for the vision his team
was developing to get
IFG out and interacting with its customers.
“And in conclusion, we believe that we can use technology to
help IFG reach its
customers in three new ways,” Josh summarized after all of his
team members had
presented their ideas. “First, we want the company to connect
directly with customers
about new product development ideas through an interactive
Web site with real-time
response from internal staff. Second, we want to reach out to
different communities and
gain insights into their needs and interests, which in turn will
guide our future marketing
plans. And third, we want to implement these and other ideas on
the ‘cloud,’ which will
enable us to scale up or down rapidly as we need to while
linking with company
databases. Any questions?”
There was a moment of stunned silence, and then the barrage
began. “What’s the
business value of these initiatives?” asked Sheema. “I can’t take
them upstairs to our
finance committee meeting without a clear commitment on what
the benefits are going
to be.” Ben looked nonplussed. “We don’t really know,” he
said. “We’ve never really
done this before, but we like the ideas.” “I’m concerned that we
don’t bite off more than
we can chew,” said John thoughtfully. “What if these customers
don’t like the company
or its products and say bad things about us? Do we have any
procedures for handling
these types of situations?” “There’s definitely a serious risk to
our reputation here,” said
Rick, “but I’m more concerned about this ‘cloud’ thing. We
haven’t even got cloud in our
architecture yet, and this plan could make company intellectual
property available to
everyone in cyberspace!” Sheema spoke again. “I hate to
mention this, but didn’t we do
something like this community project about ten years ago? We
called it knowledge
management, and it flopped. No one knew what to do with it or
how to handle
the information it generated.” On and on they went, picking
holes in every part of every
idea as the team slumped lower in their seats.
Finally, Tonya stood up. “I’d like to thank you all for raising
some legitimate and
important concerns,” she said. “And I’d like to thank Josh and
his team for some fine
work and some excellent ideas. Marketing was looking for
creativity, and we have
delivered on that part of our mandate. But now we have a more
important job. And that
is innovation. Innovation is about more than good ideas; it’s
about delivering the best
ones to the marketplace. We’re in a new world of technology,
and IT can’t be the ones
to be saying ‘no’ all the time to the business. Yes, we need to
protect ourselves, and we
don’t want to throw money at every half-baked idea, but we’ve
got to find a way to be
open to new ideas at the same time. We know there’s value in
these new ideas—we
saw it work at Glow-Foods. That’s why Josh is here. He has a
proven track record. We
just have to find a way to identify it without taking too much
risk.”
The room sat in stunned silence as Tonya looked from one to
the other. At last, John
cleared his throat. “You’re right, Tonya. We want creativity and
innovation, and we need
a better way to get it than we have now. I think what we need is
a process for creativity
and innovation that will help us overcome some of the
roadblocks we put in place.” As
Josh mentally rolled his eyes at the thought of yet another
process, Tonya replied. “I
think you’re partially right, John. Processes do have their place,
but we also need some
space to play with new ideas before we cast them in concrete.
What I’d like to do over
the next two weeks is speak with Josh and his team and each of
you and then develop
a plan as to how we can, as an IT department, better support
innovation at IFG.”
Discussion Questions
1. In discussion with Josh, Tonya foreshadows “some serious
obstacles to overcome.”
Describe these obstacles in detail.
2. How can Josh win support for his team’s three-point plan to
use technology to help IFG
reach its customers?

Contenu connexe

Similaire à Running headEMERGING THREATS AND COUNTERMEASURES .docx

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 

Similaire à Running headEMERGING THREATS AND COUNTERMEASURES .docx (14)

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 

Plus de rtodd599

SAGE was founded in 1965 by Sa.docx
SAGE was founded in 1965 by Sa.docxSAGE was founded in 1965 by Sa.docx
SAGE was founded in 1965 by Sa.docxrtodd599
 
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docx
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docxSafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docx
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docxrtodd599
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxrtodd599
 
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docx
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docxSajan Thapa1) Allegory suggests that enlightenment or educatio.docx
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docxrtodd599
 
Safety and Health Providing a safe and secure environment for emplo.docx
Safety and Health Providing a safe and secure environment for emplo.docxSafety and Health Providing a safe and secure environment for emplo.docx
Safety and Health Providing a safe and secure environment for emplo.docxrtodd599
 
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docx
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docxSAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docx
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docxrtodd599
 
Safeby Rachael FabelurinSubmission dat e 07 - Jan- 201.docx
Safeby Rachael FabelurinSubmission dat e  07 - Jan- 201.docxSafeby Rachael FabelurinSubmission dat e  07 - Jan- 201.docx
Safeby Rachael FabelurinSubmission dat e 07 - Jan- 201.docxrtodd599
 
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docxSAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docxrtodd599
 
Safe Work Environment  Please respond to the followingRecommen.docx
Safe Work Environment  Please respond to the followingRecommen.docxSafe Work Environment  Please respond to the followingRecommen.docx
Safe Work Environment  Please respond to the followingRecommen.docxrtodd599
 
Sadder and Less Accurate False Memory for NegativeMaterial .docx
Sadder and Less Accurate False Memory for NegativeMaterial .docxSadder and Less Accurate False Memory for NegativeMaterial .docx
Sadder and Less Accurate False Memory for NegativeMaterial .docxrtodd599
 
Safe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxSafe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxrtodd599
 
Safe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxSafe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxrtodd599
 
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docx
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docxS216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docx
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docxrtodd599
 
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docxSAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docxrtodd599
 
S18SOCI111SocialNetworksHomework4DUE66198.docx
S18SOCI111SocialNetworksHomework4DUE66198.docxS18SOCI111SocialNetworksHomework4DUE66198.docx
S18SOCI111SocialNetworksHomework4DUE66198.docxrtodd599
 
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docxSAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docxrtodd599
 
Sadly today police are not often viewed in the best light. Not a.docx
Sadly today police are not often viewed in the best light. Not a.docxSadly today police are not often viewed in the best light. Not a.docx
Sadly today police are not often viewed in the best light. Not a.docxrtodd599
 
S w 909E24 ENGRO CHEMICALS PAKISTAN LIMITED — .docx
S w  909E24    ENGRO CHEMICALS PAKISTAN LIMITED — .docxS w  909E24    ENGRO CHEMICALS PAKISTAN LIMITED — .docx
S w 909E24 ENGRO CHEMICALS PAKISTAN LIMITED — .docxrtodd599
 
SA #1 What is Ekman Divergence Wherewhat are three location.docx
SA #1 What is Ekman Divergence Wherewhat are three location.docxSA #1 What is Ekman Divergence Wherewhat are three location.docx
SA #1 What is Ekman Divergence Wherewhat are three location.docxrtodd599
 
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docx
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docxS&J Plumbing, Inc.s 2010 income statement shows a net profit before.docx
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docxrtodd599
 

Plus de rtodd599 (20)

SAGE was founded in 1965 by Sa.docx
SAGE was founded in 1965 by Sa.docxSAGE was founded in 1965 by Sa.docx
SAGE was founded in 1965 by Sa.docx
 
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docx
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docxSafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docx
SafeAssignCheckTest - CSU SafeAssign Plagiarism Check ToolSafeAs.docx
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
 
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docx
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docxSajan Thapa1) Allegory suggests that enlightenment or educatio.docx
Sajan Thapa1) Allegory suggests that enlightenment or educatio.docx
 
Safety and Health Providing a safe and secure environment for emplo.docx
Safety and Health Providing a safe and secure environment for emplo.docxSafety and Health Providing a safe and secure environment for emplo.docx
Safety and Health Providing a safe and secure environment for emplo.docx
 
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docx
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docxSAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docx
SAGE OpenJuly-September 2013 1 –10© The Author(s) 2013D.docx
 
Safeby Rachael FabelurinSubmission dat e 07 - Jan- 201.docx
Safeby Rachael FabelurinSubmission dat e  07 - Jan- 201.docxSafeby Rachael FabelurinSubmission dat e  07 - Jan- 201.docx
Safeby Rachael FabelurinSubmission dat e 07 - Jan- 201.docx
 
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docxSAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
 
Safe Work Environment  Please respond to the followingRecommen.docx
Safe Work Environment  Please respond to the followingRecommen.docxSafe Work Environment  Please respond to the followingRecommen.docx
Safe Work Environment  Please respond to the followingRecommen.docx
 
Sadder and Less Accurate False Memory for NegativeMaterial .docx
Sadder and Less Accurate False Memory for NegativeMaterial .docxSadder and Less Accurate False Memory for NegativeMaterial .docx
Sadder and Less Accurate False Memory for NegativeMaterial .docx
 
Safe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxSafe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docx
 
Safe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docxSafe Work Environment  Please respond to the followingRecomme.docx
Safe Work Environment  Please respond to the followingRecomme.docx
 
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docx
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docxS216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docx
S216 MAN506 ORGANISATIONAL BEHAVIOUR httpsonline.cdu.edu..docx
 
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docxSAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SCIENCESUNIVERSI.docx
 
S18SOCI111SocialNetworksHomework4DUE66198.docx
S18SOCI111SocialNetworksHomework4DUE66198.docxS18SOCI111SocialNetworksHomework4DUE66198.docx
S18SOCI111SocialNetworksHomework4DUE66198.docx
 
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docxSAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docx
SAAD COLLEGE OF NURSING AND ALLIED HEALTH SC.docx
 
Sadly today police are not often viewed in the best light. Not a.docx
Sadly today police are not often viewed in the best light. Not a.docxSadly today police are not often viewed in the best light. Not a.docx
Sadly today police are not often viewed in the best light. Not a.docx
 
S w 909E24 ENGRO CHEMICALS PAKISTAN LIMITED — .docx
S w  909E24    ENGRO CHEMICALS PAKISTAN LIMITED — .docxS w  909E24    ENGRO CHEMICALS PAKISTAN LIMITED — .docx
S w 909E24 ENGRO CHEMICALS PAKISTAN LIMITED — .docx
 
SA #1 What is Ekman Divergence Wherewhat are three location.docx
SA #1 What is Ekman Divergence Wherewhat are three location.docxSA #1 What is Ekman Divergence Wherewhat are three location.docx
SA #1 What is Ekman Divergence Wherewhat are three location.docx
 
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docx
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docxS&J Plumbing, Inc.s 2010 income statement shows a net profit before.docx
S&J Plumbing, Inc.s 2010 income statement shows a net profit before.docx
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Running headEMERGING THREATS AND COUNTERMEASURES .docx

  • 1. Running head: EMERGING THREATS AND COUNTERMEASURES 1 LITERATURE REVIEW Emerging threats and countermeasures in the U.S. critical infrastructure Table of content Background information 3 Research questions 3 Methodological approach 3 Data analysis and findings 3 Challenges in confronting threats 6 Conclusion and discussion 8 References…………………………………………………………… ……………………………9 Background information In recent times, the province of security architecture has profoundly transposed by the escalation of threats targeting critical national infrastructure. The rise in such threats is directly related to the rapid integration of the infrastructures with emergent information technologies (IT). That said, it is easy to conclude that the destructive threats to the infrastructures are from cybercrime. Cybercrime manifests in several dimensions from worms, viruses to malware. It would be easy if such threats confronted quickly. However, the state of affairs is that it is not an easy endeavor at all, and hence
  • 2. protecting national infrastructure is even more challenging than it has ever been.Research questions This essay answers the questions of the literature related to the emergent threats in the protection of critical national infrastructure. More also, it answers the question of the challenges involved in securing the infrastructures.Methodological approach The study of data collection is conducted using a qualitative approach. Qualitative research is the scientific study of observations that seeks to describe, explore, explain, and diagnose phenomena by gathering non-numerical data.Data analysis and findings It has not been easy protecting national infrastructure in the last two decades thanks to an increase in cybercrime. Public information systems are lucrative targets for hackers and other ill-motivated criminals. The state affairs have led to a conclusion that in a time in the current generation, the world is increasingly veering toward cyber warfare. The cost of cybersecurity threats is estimated to be over billions of dollars and still learning. Even with new measures, it appears the rate at which cybercriminals are expanding their technological dominion in the deep web is exceedingly strange. Cybersecurity attacks take different dimensions. Perhaps one of the most devastating has been related to user inefficiency when handling systems. Most cybercriminal activities have shown an impeccable ability to surpass both the human and system shields that protect systems. In the dawn of the early 2000s, for example, the world was in a panic following an attack unleashed by two Philippine students. The attack, known as love bug exposed the value system behind the human-based security system. It is one of the weakness and which is solely flexible to easy manipulation. Following the love bug attack, the national intelligence system had to be switched off for several hours. The cutting-edge world has seen a multiplication in the development of web associations and data innovation gadgets which applied in business set-up, both private and open division
  • 3. enterprises, for proficiency in tasks the board. The creators note that these fresher inventive advances have prompted a massive ascent in instances of digital assault occurrences which, to a more prominent degree, have unsatisfactory results to the business and money industry. Spread of malware into data and correspondence innovation frameworks and systems for malevolent goals has been a scandalous standard. The national security facts from remote-based strikes and its PC organize the U.S. Government protects systems. The National Cybersecurity and Protection framework program named Einstein initially dependent on the examination innovation sent more than ten years earlier, and the system's guaranteeing $218 million overhauls should make it ready to do dynamically ambush expectation. There have been several attacks lately targeting information systems across the world. These attacks included denial of service attacks, which takes over a system. The second type of cybersecurity attack is a man in the middle attack. The third attack is phishing. Phishing exploits the human bridge between systems and security. It makes no difference how secure a system is. It is always non-immune to attack. The fourth cyber-based challenge is the eavesdropping attack. Finally, critical national infrastructure systems are also vulnerable to smurf attacks. The standard form of attacks involves the hacker saturating a system with traffic to the extent that such systems fail to perform essential functions. The attack medium ranges from viruses to worms and malware. Worms are a potential source of concern as they can easily permeate through a network system. The leading type of malware is computer viruses, spyware, adware, rootkit, Trojan horse, ransomware, worm, key logger, and botnet (Hansen et al., 2016). Computer viruses are infectious software that quickly self-replicates intending to destroy confidential and valuable data or cause irreparable damage (Holt et al., 2015). The scholar utilized a qualitative method in analyzing the risks. Cyber-attacks are growing at a rapid rate nowadays. Most of the threats focus on Government
  • 4. Systems, businesses, and commerce. One of the recent attacks on Barclays bank was made using a remote-controlled Keyboard, Video, and Mouse (KVM). Threats are physical as well. Currently, the world faces a political and violent conflict situation in their endeavor to protect critical infrastructure. There is an escalation in terrorist activity, mainly emanating from the developing nations in the Middle East and parts of Africa such as Somalia, Northern Nigeria, and some areas in North Africa such as Libya. Terrorism activities are as much related to religious radicalization as they exhibit an element of resources and resource conflict. They have a resources element because they motivated by the unabated flow of dark money, which is used to control and pacify an already disappointed bulging youth population in the countries (Olmstead, & Smith, 2017). Furthermore, the conflicts are related to resource conflict because most of the time, it is the authoritative allocation of resources that is to blame for radicalization. Terrorism activities are diversified, and in recent times the world is increasingly conscious of biothreats among others.Challenges in confronting threats Confronting cybersecurity threats have proven to be one of the most challenging dispensations in recent times (Sood, Rohit, & Richard, 2012). First, there has been a revolution in hacking technologies. Hidden in the dark and deep web, and operated by malicious experts in advanced data centers, hacking technologies have progressed even quicker than the preventive capacities. Sood, Rohit, & Richard (2012) also argues that it is also straightforward to acquire the technologies on the dark web. They are all sorts of sites in such places which deal with startup packages for anybody wishing to live their lives as a hacker. Individuals are seeking crime display a remarkable ability to adapt to changing technologies, environments, and lifestyles. The ability of hackers to infiltrate new protection systems and hack has shown impeccable revolution lately. Singh, & Singh (2016) argue that the main reason behind the
  • 5. revolution in cyber-attacks because cybercrime has become more lucrative with the introduction of digital currencies. These currencies are the mainstream medium of exchange between hackers and victims of breaches. The currency can also not be tracked down by law enforcement agencies, and they leave very little forensic evidence behind (Singh, & Singh, 2016). The advancement in the technologies is directly related to increased monetization of cybercrime. The last decade has seen the growth of digital currencies. The currencies are indeed a catalyst for concealing cybercrime as financial payments easily flow from victims to criminals without a trace. Digital currency lacks identification details which complicate the ability of law enforcement agencies to track and respond to crime. They were designed to mirror traditional currencies, in hard notes, where it would never be easy to monitor where a dollar note goes after it leaves the federal bank. Forensic experts have also been a little bit incapacitated in the fight against cybercrime. One of the main reasons is the complication of cybercrime (O'Dowd, 2017). The agencies are incapable of confronting cybercrime as quickly as possible and arresting the culprits. The fundamental deterrence to any form of crime is the probability of arrest. Even with arrest, the agency has an inadequate forensic capacity to gather and handle evidence. The challenge in protecting against crimes with a global magnitude is multifaceted. Cybercrime, for example, faces a challenge as a result of overlapping jurisdiction. For terrorism activities, challenges are originating from resources and resource conflict. More also, cybercrime is not the province of local politics and control but supersedes boundaries, to the reach of often rogue states that also sponsor such activities (Thornton-Trump 2012). The scholar also argues that where, however, there exists the will to prosecute criminals in different states, the problem of jurisdiction and sovereignty works hand in hand to frustrate the quest of law enforcement agencies. The problem is that not all nations in the globe have an elaborate legal system that defines
  • 6. hacking as a crime (White, 2016). The weakness of such a state of affair is evident in the love bug case where the two Philippines would not prosecute because the Philippines lacked in statutes that addressed cybercrime directly. The ultimate hurdle facing law enforcement agencies is its inability to keep up with the innovation speed. It emanates from the fact that there lack specially dedicated labs in several states for dealing, detecting, and ultimately handling threat modeling. Threat modeling deals with speculations aspects and relies on the premise of preventing and identifying threats before it occurs. One of the greatest hindrances to overcoming cybercrime threats is the human elements. User-based links to threats is undoubtedly a point of concern because, as it is evident, most threats are related to phishing attempts. Threat agents permeate through a weakness in systems, and on most occasions, the weakness caused by human beings who operate the systems. (Von & Upton, 2016). User-based threats result from inadequate education. Users who operate and run critical infrastructure systems need thorough training on system security. The training is currently insufficient or probably inadequate, though it is not surprising because phishing attempts and attacks focus on human emotional weaknesses.Conclusion and discussion Critical national infrastructure currently faces a myriad of threats, whether physical or cyber-based. The most devastating of the crime is cyber, which manifests in several dimensions. The world surely is increasingly and inflexibly veering toward cyber warfare. USA has recognized cyberspace as a fifth domain in the security agenda after land, sea, air, and space (Harrop.W & Matteson.A, 2015). Critical infrastructure has also been a victim of domestic and international sabotage and terrorism. Cybersecurity plays a vital role in the growth of the digital economy (Chooi S, Ahmad M, 2017). This paper can conclude that cyber warfare is coming and the impact can be prevented or minimized by following the security measures. References Hansen, S. S., Larsen, T. M. T., Stevanovic, M., & Pedersen, J.
  • 7. M. (2016, February). An approach for detection and family classification of malware based on behavioral analysis. In 2016 International Conference on Computing, Networking, and Communications (ICNC) (pp. 1-5). IEEE. J. Holt, Thomas & Bossler, Adam & Seigfried-Spellar, Kathryn. (2015). Cybercrime and DigitalForensics: An Introduction. O'Dowd, A. (2017). Major global cyber-attack hits NHS and delays treatment. BMJ: British Medical Journal (Online), 357. Olmstead, K., & Smith, A. (2017). Americans and cybersecurity. Pew Research Center, 26. Singh, S., & Singh, N. (2016, December). Blockchain: Future of financial and cybersecurity. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 463-467). IEEE.DOI:10.1109/ic3i.2016.7918009. Sood, Aditya K., Rohit Bansal, and Richard J. Enbody. (2012). "Cybercrime: Dissecting the state of the underground enterprise." IEEE internet computing 17.1 (2012): 60-68. Thornton-Trump, Ian. (2018). "Malicious attacks and actors: an examination of the modern cybercriminal." EDPACS 57.1 17- 23. Von Solms, B., & Upton, D. (2016). Cybersecurity capacity governance. The Business & Management Review, 7(4), 34. White, J. (2016). Cyber Threats and Cyber Security: National Security Issues, Policy, and Strategies. Global Security Studies, 7(4). Nandakumar, N., & Lakshmi, I. (2017). Emerging and Upcoming Threats in Cyber Security in 21 Century. International Journal of Computer Science and Mobile Computing, 6 (2), 107–118. Hewes, C. A. (2016). Threat and challenges of cyber-crime and the response. Quarterly journal. S.A.M.Advanced Management Journal, 81(2), 4-10,2. Harrop W, Matteson A. (2015) Cyber resilience: a review of critical national infrastructure and cybersecurity protection measures applied in the UK and USA. DOI 10.1057/9781137455550
  • 8. Chooi, T., & Ahmad M. (2017) National cybersecurity strategies for digital economy. DOI 10.1109/ICRIIS.2017.8002519 Hefty Hardware Case 2 Abstract This paper discusses the partnership and the shortcomings of the IT and business in the Hefty Hardware. This paper also covers a proposed plan to improve collaboration to effectively deliver Saavy Store Program. Hefty Hardware Case 3 Hefty Hardware Case Study Assignment Effective communication is key to the success of any company, and ineffective communication can hinder the partnership between IT and business. Without proper collaboration, a company is at a high risk of failing. Partnership and Shortcomings between IT and Business One of the key issues faced by Hefty is communication issue
  • 9. between IT and Business. The failure to create a strategic plan to drive the business and IT strategy lead to misalignment, a lack of understanding and ineffective collaboration between the two primary functions. There exists a lack of awareness of the role of business in contributing to the overall business strategy. As per Cheryl, VP of Retail Marketing, she is unable to draw the correlation between IT and business operations in delivering new technologies in a timely manner. Due to this lack of collaboration and ineffective communication, business failed to communicate the desired business needs and requirements to IT. As pointed out by Glen, the COO and Paul, Marketing IT relationship manager, IT was expected to deliver on tasks beyond the scope of their technical roles without proper understanding of the requirements. Proposed Plan for effective collaboration between IT and Business To overcome the shortcomings, team collaboration can be encouraged through a retail
  • 10. site visit of both the business and IT to understand the requirements of the Saavy Store Program better. The role of an account manager can be leverage to bridge the gap between business and IT and ensure common understanding and effective communication. The VP, COO and CIO Hefty Hardware Case 4 should assign appropriate resources, motivate and lead their team to deliver on the mission and vision of the program.
  • 11. Hefty Hardware Case 5 References McKeen, J. and Smith, H. (2015). IT Strategy. Pearson Education UK. Mini Case Innovation at International Foods2 2 Smith, H. A., and J. D. McKeen. “Innovation at International Foods.” #1-L09-1-002, Queen’s School of Business, December 2009. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario. Josh Novak gazed up at the gleaming glass-and-chrome skyscraper as he stepped out of the cab. “Wow!” he thought to himself. “I’ve hit the big time now.” The International Foods Group (IFG) Tower was a Chicago landmark as well as part of the company’s logo, which appeared on the packages of almost every type of food one could
  • 12. imagine—breakfast cereals, soft drinks, frozen pizza, cheese, and snack foods, to name just a few. Walking into the tower’s marble lobby, Josh could see displays of the company’s packaging from its earliest days, when its dairy products were delivered by horse and wagon, right up to the modern global entity it had become. After signing in with security, Josh was whisked away to the 37th floor by an efficient attendant who walked him down a long hall of cubicles to a corner office overlooking Lake Michigan. On the way, Josh passed display photos of the company’s founder, old Jonas Wilton looking patriarchal, and several of the family scions, who had grown the company into a major national brand before the IPO in the 1980s had made IFG a public company. Josh, having “Googled” the company’s history last night in response to this summons, knew that IFG was now the largest purveyor of food products the world had ever known. While many decried the globalization of the food business, IFG kept right on growing, gobbling up dozens of companies each year— some because IFG wanted to stomp on its competition and others because it wanted their good ideas. Josh’s own small company, Glow-Foods, a relative newcomer in the business, was fortunately one of the latter, but Josh was a little puzzled about this command performance. After all, he himself wasn’t anyone important. The
  • 13. owners of the company all received multiple millions and were sticking around—as per contract—during the transition. The next level, including Josh’s boss, had mostly jumped ship as soon as the “merger” was announced. “This isn’t my thing,” drawled Nate Greenly over beer one night at the local pub. “Corporate America isn’t going to let us stay as we are, no matter what they say. Get out while you can,” he advised. But Josh, with a freshly minted MBA in his pocket, thought differently. And so here he was, walking into the CIO’s office hundreds of miles away from the cramped loft in Toronto where Glow-Foods was headquartered. As the office door swung open, two people dressed in “power suits” turned to meet him. “Uh oh, I’m not in Kansas anymore,” thought Josh as he mentally reviewed his outfit of neatly pressed khakis and golf shirt, which was a big step up from his usual attire of jeans and a T-shirt. A tall man with silver hair stepped forward with his hand held out. “You must be Josh,” he boomed. “Welcome. I’m John Ahern, and this is my associate, Tonya James, manager of IT marketing. Thanks for coming today. Please, have a seat.” Josh complied, slinging his backpack over the corner of the leather chair while taking in the rich furnishings of the office and the panoramic view. After a bit of chitchat about the https://jigsaw.vitalsource.com/books/9780133777628/epub/OPS/ xhtml/fileP7000494406000000000000000001C81.xhtml#P70004
  • 14. 94406000000000000000001DE8 https://jigsaw.vitalsource.com/books/9780133777628/epub/OPS/ xhtml/fileP7000494406000000000000000001C81.xhtml#r__P70 00494406000000000000000001DE8 weather and the prospects of their respective baseball teams, John pulled out a black leather folder. “Well, we won’t keep you in suspense anymore, Josh. As you know, when we took over Glow-Foods we decided to completely align our processes, including IT. It doesn’t make any economic sense to run separate data centers and applications, so we already have a team in place to transfer all your hardware and software to our centralized corporate systems over the next month. We’ll be replacing your Macs with PCs, and everyone will get training on our ERP system. We’re going to keep a small team to deal with the specifically Canadian issues, but other than that we see no need for an IT function in Toronto any more.” Josh nodded glumly, thinking about his friends who would be losing their jobs and all the fun they’d had during those all-nighters brainstorming new ways to help Glow-Foods products go “viral.” Nate was right, he thought glumly. They don’t really get us at all. “That said,” John continued. “We are very impressed with the work you and your team have done in using social networking, mashups, and multimedia to support your
  • 15. marketing strategy. Your ability to reach the under-thirty demographic with technology is impressive.” He turned to Tonya, who added. “Here at IFG, we have traditionally marketed our products to women with children. We have a functional Web site—a place where customers can find out about our products and where to buy them. More recently, we’ve added their nutritional content, some recipes, and a place where customers can contact us directly with questions, but it’s really unidirectional and pretty dry.” Josh nodded in agreement with this assessment. The difference in the two companies’ approaches was night and day. Although not everything they had tried at Glow-Foods had worked, enough of it had succeeded that demand for the company’s products had skyrocketed. Young adults and teens had responded en masse to the opportunity to post pictures of themselves drinking their Green Tea Shakes in unusual places on the Glow-Foods Web site and to send a coupon for their favorite Glow-Foods product to a friend. Serialized company mini-dramas popped up on YouTube and viewers were asked to go online to help shape what happened to the characters—all of them using Glow-Foods products extensively. Contests, mass collaboration in package design, and a huge network of young part-time sales reps linked through Facebook all contributed to making the brand hip and exciting—and drove sales through the roof.
  • 16. John adjusted his French cuffs. “We want to tap into the youth and young adult market with IT, and we think you’re the one who can help us do this. We’re going to give you a team and whatever resources you need right here in Chicago. With our global reach and much larger budgets, you could do great things for our company.” John went on to outline a job offer to Josh that sent tingles down his spine. “I really have hit the big time,” he thought as he signed the documents making him a team manager at IFG at a salary that was almost double what he was earning now. “I can’t wait to get started.” Six weeks later he was being walked down the same hall by Tonya, now his immediate boss, and into her office, a smaller version of his with a window looking onto another high-rise. “What’s next?” he asked. “I’ve booked a meeting room for you to meet your new team at ten-thirty,” Tonya explained. “But before that, I want to go over a few things with you first. As the manager of IT Marketing, I am personally thrilled that we’re going to be experimenting with new technologies and, as your coach and mentor at IFG, I’m going to make it my job to see that you have the resources and support that you need. However, you may find that not everyone else at this company will be as encouraging. We’re going to have some serious obstacles to overcome, both within IT and with the
  • 17. larger company. It will be my responsibility to help you deal with them over the next few months as you put your ideas together. But you need to know that IFG may have different expectations of you than Glow-Foods. And you may find you will get a better reception to your ideas if you look a bit more professional.” Josh winced and nodded. He’d already ramped up the wardrobe for his first day with a sports jacket, but clearly he needed to do more. “Finally, I’d like you to come up here every Friday afternoon at four o’clock to go over your progress and your plans. My schedule is usually fully booked, but if you have any questions you can always send me an e- mail. I’m pretty good at getting back to people within twenty-four hours. Now let’s go meet your new team. I think you’ll be happy with them.” An hour later Josh and his new team were busy taking notes as Tonya outlined their mandate. “You have a dual role here,” she explained. “First, I want you to work with Ben here to develop some exciting new ideas for online marketing. We’re looking for whatever creative ideas you have.” Ben Nokony was the team’s marketing liaison. Any ideas would be vetted through him, and all proposals to the individual product teams would be arranged by him. “Second, I need you to keep your eyes open and your ears to the ground for any innovative technologies you think might work here at IFG. These are our future, and you’re our vanguard.” Josh glanced around at his team, an eclectic
  • 18. group. They seemed eager and enthusiastic, and he knew they were talented, having had a say in choosing them. With the exception of Ben, all were new to IFG, experienced in using a variety of new media, and under thirty years old. They were going to do great things together, he could see. The next couple of weeks were taken up with orientation. Ben introduced each of the major product divisions to the team, and everybody had come back from each meeting full of new possibilities. Tonya had also arranged for the team to meet with the chief technology officer, Rick Visser, who was in charge of architecture, privacy and security, risk management, and the technology roadmap. Rick had been pleasant but cool. “Please remember that we have a process for incorporating new technology into our architecture,” he explained as he handed over a thick manual of procedures. “In a company our size we can’t operate without formal processes. Anything else would be chaos.” The team had returned from that meeting full of gloom that their ideas would all be shot down before they were even tried. Finally, they had met with the IT finance officer. “I’m your liaison with corporate finance,” Sheema Singh stated. “You need to work with me to develop your business cases. Nothing gets funded unless it has a business case and is approved through our office.”
  • 19. Finally, having dragged some chairs into Josh’s eighteenth-floor and marginally larger cubicle and desk, the team got down to work. “This is ridiculous,” fumed Mandy Sawh, shuffling her papers on her lap. “I can’t believe you need to book a conference room two weeks in advance around here. Who knows when you need to get together?” “Okay, team, let’s settle down and take a look at what you’ve got,” said Josh. One by one, they outlined their preliminary ideas—some workable and some not—and together they identified three strong possibilities for their first initiatives and two new technologies they wanted to explore. “Great work, team,” said Josh. “We’re on our way.” The problems began to surface slowly. First, it was a polite email from Rick Visser reminding them that access to instant messaging and Facebook required prior approval from his group. “They want to know why we need it,” groused Veejay Mitra. “They don’t seem to understand that this is how people work these days.” Then Ben got a bit snippy about talking directly to the product teams. “You’re supposed to go through me,” he told Josh’s team. “I’m the contact person, and I am supposed to be present at all meetings.” “But these weren’t ‘meetings,’” Candis Chung objected. “We just wanted to bounce some ideas around with them.” Next, it was a request from Sheema to outline their proposed work, with costs and benefits, for the next fiscal year—beginning six months from now. “Can’t we just make up a bunch of numbers?” asked
  • 20. Tom Webster. “We don’t know how this stuff is going to play out. It could be great and we’ll need lots of resources to scale up, or it could bomb and we won’t need anything.” Everywhere the team went, they seemed to run into issues with the larger corporate environment. Tonya was helpful when Josh complained about it at their Friday afternoon meetings, smoothing things over with Rick, helping Josh to navigate corporate procedures, and even dropping by to tell the team they were doing a great job. Nevertheless, Josh could sense his own and everyone else’s frustration as they prepared for their first big project review presentation. “They want us to be innovative, but they keep putting us in a straight-jacket with their ‘procedures’ and their ‘proper way to go about things,’” he sighed to himself. Thank goodness, the presentation was coming together nicely. Although it was only to the more junior executives and, of course, John and Rick, he had high hopes for the vision his team was developing to get IFG out and interacting with its customers. “And in conclusion, we believe that we can use technology to help IFG reach its customers in three new ways,” Josh summarized after all of his team members had presented their ideas. “First, we want the company to connect directly with customers about new product development ideas through an interactive Web site with real-time response from internal staff. Second, we want to reach out to
  • 21. different communities and gain insights into their needs and interests, which in turn will guide our future marketing plans. And third, we want to implement these and other ideas on the ‘cloud,’ which will enable us to scale up or down rapidly as we need to while linking with company databases. Any questions?” There was a moment of stunned silence, and then the barrage began. “What’s the business value of these initiatives?” asked Sheema. “I can’t take them upstairs to our finance committee meeting without a clear commitment on what the benefits are going to be.” Ben looked nonplussed. “We don’t really know,” he said. “We’ve never really done this before, but we like the ideas.” “I’m concerned that we don’t bite off more than we can chew,” said John thoughtfully. “What if these customers don’t like the company or its products and say bad things about us? Do we have any procedures for handling these types of situations?” “There’s definitely a serious risk to our reputation here,” said Rick, “but I’m more concerned about this ‘cloud’ thing. We haven’t even got cloud in our architecture yet, and this plan could make company intellectual property available to everyone in cyberspace!” Sheema spoke again. “I hate to mention this, but didn’t we do something like this community project about ten years ago? We called it knowledge management, and it flopped. No one knew what to do with it or
  • 22. how to handle the information it generated.” On and on they went, picking holes in every part of every idea as the team slumped lower in their seats. Finally, Tonya stood up. “I’d like to thank you all for raising some legitimate and important concerns,” she said. “And I’d like to thank Josh and his team for some fine work and some excellent ideas. Marketing was looking for creativity, and we have delivered on that part of our mandate. But now we have a more important job. And that is innovation. Innovation is about more than good ideas; it’s about delivering the best ones to the marketplace. We’re in a new world of technology, and IT can’t be the ones to be saying ‘no’ all the time to the business. Yes, we need to protect ourselves, and we don’t want to throw money at every half-baked idea, but we’ve got to find a way to be open to new ideas at the same time. We know there’s value in these new ideas—we saw it work at Glow-Foods. That’s why Josh is here. He has a proven track record. We just have to find a way to identify it without taking too much risk.” The room sat in stunned silence as Tonya looked from one to the other. At last, John cleared his throat. “You’re right, Tonya. We want creativity and innovation, and we need a better way to get it than we have now. I think what we need is a process for creativity and innovation that will help us overcome some of the roadblocks we put in place.” As
  • 23. Josh mentally rolled his eyes at the thought of yet another process, Tonya replied. “I think you’re partially right, John. Processes do have their place, but we also need some space to play with new ideas before we cast them in concrete. What I’d like to do over the next two weeks is speak with Josh and his team and each of you and then develop a plan as to how we can, as an IT department, better support innovation at IFG.” Discussion Questions 1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.” Describe these obstacles in detail. 2. How can Josh win support for his team’s three-point plan to use technology to help IFG reach its customers?