Free Essay

Cis 502 Critical Infrastructure Protection

In:

Submitted By arnitaetsitty
Words 1288
Pages 6
CIS 502 Critical Infrastructure Protection

Click Link Below To Buy:

http://hwaid.com/shop/cis-502-critical-infrastructure-protection/

Due Week 6 and worth 50 points

Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment.

Write a three to five (3-5) page paper in which you:

1. Examine the Department of Homeland Security’s :
a. mission

b. operations

c. responsibilities
2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets.

3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure.

4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure.

5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion.

6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are: • Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved.
• Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.
• Compare and contrast business continuity and disaster recovery planning.
• Use technology and information resources to research issues in security management.
• Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Critical Infrastructure Plan
Gretchen Greene
Dr. Syed Raza
February 15, 2016 Interpret the Department of Homeland Security’s mission, operations and responsibilities The Department of Homeland Security has five missions. First, they protect the American people from terrorist threats as their number one priority. Their counterterrorism goals are to prevent terrorist attacks, prevent the use of chemical, biological, radiological, and nuclear materials from within the US, and reduce the vulnerability of resources and major events to terrorist attacks. Second, they secure the nation’s borders to prevent illegal activity. Third, the Department of Homeland Security enforces our immigration laws. Fourth, they lead the government in securing cyberspace and reducing cyber threats. Fifth, Homeland Security responds with plans, grants, and training to new security and law enforcement officers. They also respond with information in the event of a terrorist attack or natural disaster.
Detail the Critical Infrastructure Protection (CIP) The Critical Infrastructure Protection (CIP) initiatives are to work to improve interoperability across communities in the event of human or natural disaster. The CIP is used to plan, detect, respond to, prevent, and recover from any natural and human disaster. CIP works with the federal government, state government, local government, commercial and private sectors to resolve the threat. Information regarding incidents can be shared in the CIKR system Automated Critical Asset Management System (ACAMS). This system creates an inventory of assets along with shares the information across state and local sectors.
NIPP VS NIST There are significant differences between the Critical Infrastructure Protection plans from NIST and NIPP. NIPP’s CIP is much more detailed regarding how threats are handled and how assets are protected. It defines how to assess risks and the consequences when risks occur. It also defines what agencies and sectors are involved. NIST’s CIP main concern was about addressing authentication and the framework. NIST was concerned with password requirements for individuals and the authentication of automated devices. It was more focused on the infrastructure training and management. It did not define a plan of action if a risk occurred or the agencies involved. It ensured the personnel for the cybersecurity workforce for data analysis and privacy standards.
Vulnerabilities IS professionals who protect the U.S.’s critical infrastructure The Department of Homeland Security has not consistently collected information on the vulnerabilities to have an accurate measure of where there are risks and hazards. The guidelines for tracking vulnerabilities are written in the NIPP CIP, but it has not been followed consistently. There is not a standard across the tools used for collecting data from all of the different agencies. IS professionals should be prepared for the need to organize the data that has been collected into some form that can be integrated together.
Suggest three (3) methods to improve the protection of the U.S.’s critical infrastructure The Department of Homeland Security needs to design one system for tracking vulnerabilities for all agencies to use in the public and private sector. It is extremely important to consistently collect data on vulnerabilities to know when an attack is happening. It also shares the information with all departments and agencies. This would integrate all the information into one location that can be used to track when an attack is happening. Homeland Security needs to create a department to handle the assessment information and sharing that information with other agencies. One does not exist right now and they rely on their field agents to get the information to the agencies. Many times Homeland Security is requested to be at meetings to share information from the assessments and because they have no way of sharing the information they are not there. The other participants then have no idea whether the information has been shared with Homeland Security or not.
The Department of Homeland Security needs to create a department to maintain the sixteen infrastructure sectors are following the NIPP CIP. Only three of the sixteen sectors have made any progress towards the goals set in the CIP. The other thirteen sectors have yet to begin to set metrics for the goals set in the CIP. Many have to rely on private sectors to provide the information to them regarding cyber risks and vulnerabilities. Having a specific department to only work on following up with these sectors will help motivate these sectors to work with the private sectors to obtain the needed information.
Conclusion
The Department of Homeland Security had a good plan in place that was also updated in 2013 after Hurricane Sandy showed many flaws in the original plan. With some new departments and some organization to data collected on a regular basis, vulnerabilities can be identified more quickly to stop attacks. Cyber risks and natural disasters are always going to be present but now is the time to get the plan in working order before it is needed in a disaster. References
Critical Infrastructure Protection: DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts [Reissued on September 17, 2014]. (2014, September 17). Retrieved February 14, 2016, from http://www.gao.gov/products/GAO-14-507

Homeland Security. (2015, July 16). Retrieved February 14, 2016, from http://www.dhs.gov/our-mission

National Infrastruction Protection Plan. (2009). Retrieved February 14, 2016, from https://blackboard.strayer.edu/bbcswebdav/institution/CIS/502/1144/Week6/NIPP_Plan.pdf

NIST Roadmap for Improving Critical Infrastructure Cybersecurity. (2014, February 12). Retrieved February 14, 2016, from https://blackboard.strayer.edu/bbcswebdav/institution/CIS/502/1144/Week6/roadmap-021214.pdf

Wilshusen, G. C. (2015, November 19). CRITICAL INFRASTRUCTURE PROTECTION Sector-Specific Agencies Need to Better Measure Cybersecurity Progress. Retrieved February 14, 2016, from http://www.gao.gov/assets/680/673779.pdf

Similar Documents

Free Essay

Assignment 2: Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Benard Braxton, Jr. Dr. Bouaffo Kouame CIS 502 – Theories of Security Management May 17, 2015 The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015). These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department of Homeland Security. These objectives and goals says what it means to prevent, to protect, to respond, and to recover. They also shows how build in security, to ensure resilience, and to facilitate customs and exchange (DHS, 2015). There are thousands of people from across the all over the country who are responsible for executing these missions. These are the people who interact with the public, are responsible for security and public safety, operate our country’s critical services and infrastructures, develop technology, perform research, watch, prepare for, and respond to emerging disasters and threats (DHS, 2015). The five homeland security core missions are to prevent terrorism and enhancing security; secure and manage our borders; enforce and administer our immigration laws; safeguard...

Words: 1124 - Pages: 5

Free Essay

Web Application Security

...Web Server Application Attacks Brooks Gunn Professor Nyeanchi CIS 502 July 10, 2013 Web Server Application Attacks Many organizations have begun to use web applications instead of client/server or distributed applications. These applications has provided organizations with better network performance, lower cost of ownership, thinner clients, and a way for any user to access the application. We applications significantly reduce the number of software programs that must be installed and maintained in end user workstations (Gregory 2010). Web applications are becoming a primary target for cyber criminals and hackers. They have become major targets because of the enormous amounts of data being shared through these applications and they are so often used to manage valuable information. Some criminals simply just want vandalize and cause harm to operations. There are several different types of web application attacks. Directory traversal, buffer overflows, and SQL injections are three of the more common attacks. One of the most common attacks on web based applications is directory traversal. This attack’s main purpose is the have an application access a computer file that is not intended to be accessible. It is a form of HTTP exploit in which the hacker will use the software on a Web server to access data in a directory other than the server’s root directory. The hacker could possibly execute commands...

Words: 1620 - Pages: 7

Premium Essay

Cloud

...STRAYER UNIVERSITY Mobile Devices Security Week 7 Case Study Professor Gideon Nwatu CIS 502 – Theories of Security Management May 26, 2013 Mobile Devices Security 1. Describe the emerging cyber-security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Emerging cyber-security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report focused on mobile devices. The surge of mobile devices in all facets of human endeavors and its lack of adequate security highlighted the report. According to the report, emerging cyber-security issues that make mobile devices vulnerable are; * In order to improve usability for mobile devices, their applications depend on the browser, which presents exceptional challenges to security. Perfectly legitimate-looking images can hide a malicious link that, when touched, could give an attacker the capacity to spy or steal data. * Attacks target the use of SMS, e-mail and the mobile Web browser by mobile devices to launch an attack and steal data. * Increasingly, mobile devices are being used as storage devices just as USB flash drives and have therefore become the ideal medium to spread malware to protected systems. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Due to the fact that mobile devices are increasingly being used in the...

Words: 1994 - Pages: 8

Premium Essay

Adidas

...OUR GROUP  02 GRO UP M A N A GE ME N T R E P OR T 02.1 02.2 02.3 02.4 02.5 02.6 02.7 02.8 02.9 02.10 adidas Group Worldwide 66 Major Sporting Events 2014 67 Group Strategy 68 Global Sales Strategy 72 Global Brands Strategy 77 Other Businesses Strategy 86 Global Operations 94 Research and Development 99 Employees105 Sustainability111 G R O U P M A N A G E M E N T R E P O R T: This report contains the Group Management Report of the adidas Group, comprising adidas AG and its consolidated subsidiaries, and the Management Report of adidas AG. 1 Group Management Report – Our Group adidas Group Worldwide / 02.1  / adidas Group Worldwide Percentage of Group sales 26  23  Western Europe North America 8 3 1 4 2 13  6 12  Greater China 7 10 European Emerging Markets 5 9 20 13 66 11  15  Latin America Other Asian Markets 1 adidas North America,  Portland/Oregon, USA 6 adidas International Trading,  Amsterdam, Netherlands 2 TaylorMade-adidas Golf Headquarters,  Carlsbad/California, USA 7 adidas Group Headquarters,  Herzogenaurach, Germany 3 Reebok-CCM Hockey Headquarters,  Montreal/Quebec, Canada 8 adidas Group Russia, Moscow, Russia 9 4 Reebok International Headquarters,  The Rockport Company Headquarters, Canton/Massachusetts, USA adidas Global Sourcing,  Hong Kong, China ...

Words: 71297 - Pages: 286

Premium Essay

Lauder Global Insights

... students from the Joseph H. Lauder Institute of Management & International Studies examine current trends and recent developments shaping today’s global marketplace. The articles cover a wide variety of topics ranging from technology, innovation and brand building to infrastructure, entrepreneurship and social impact. A section on consumer markets looks at the popularity of e-cigarettes in France and elsewhere, efforts by Japanese firms to expand their businesses into Asia, new trends in French gastronomy, changes in Japan’s traditional food-consumption habits, and how a sector of the Chinese population is spreading, and spending, its newfound wealth. The report offers an analysis linking market-driven strategies with social impact in Peru and Colombia, as well as an article describing South Carolina’s embrace of innovative research. Other articles look at the Russian government’s attempt to reboot the city of Skolkovo as an innovation hub, the mixed success of innovation efforts in China, and the growing threat of cybercrime to businesses across the world. The challenges of infrastructure and planning are addressed in analyses of transportation in areas of Latin America, deficiencies in Brazil’s infrastructure, and real estate’s impact on Peru’s emerging middle class. Business and politics underpin a number of economic forces, as noted in articles on corruption and protest in India, social unrest in Brazil, the potential of the gemstone tanzanite to help develop Tanzania’s economy...

Words: 56733 - Pages: 227

Premium Essay

Logistics Report

...the analyzed sector may differ from those projected herein. Deloitte does not warrant that actual results will be the same as the projected results. Neither Deloitte nor any individuals signing or associated with this report shall be required by reason of this report to give further consultation, to provide testimony or appear in court or other legal proceedings, unless specific arrangements thereof have been made. All opinions and estimates included in this report constitute our judgment as of this date and are subject to change without notice and may become outdated. 2 Glossary of Terms Acronym Definition 3G 3PL 4PL 5PL ADSL AEO AGR ATR AZR BALO BMI BOT BOTAŞ BRIC BSEC C&F CAGR CAPEX CB CE CEO CIF CIS Third Generation Third Party Logistics Forth...

Words: 24080 - Pages: 97

Premium Essay

World Report

...U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2011 NON-EQUITY MODES OF INTERNATIONAL PRODUCTION AND DEVELOPMENT U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2011 NON-EQUITY MODES OF INTERNATIONAL PRODUCTION AND DEVELOPMENT New York and Geneva, 2011 ii World Investment Report 2011: Non-Equity Modes of International Production and Development NOTE The Division on Investment and Enterprise of UNCTAD is a global centre of excellence, dealing with issues related to investment and enterprise development in the United Nations System. It builds on three and a half decades of experience and international expertise in research and policy analysis, intergovernmental consensus-building, and provides technical assistance to developing countries. The terms country/economy as used in this Report also refer, as appropriate, to territories or areas; the designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. In addition, the designations of country groups are intended solely for statistical or analytical convenience and do not necessarily express a judgment about the stage...

Words: 156270 - Pages: 626

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Pretty Good Privacy

...Chapter – 1 Introduction Virtually all businesses, most government agencies and many individuals now have web sites. The number of individuals and companies with internet access is expanding rapidly and all of these have graphical user browser. As a result businesses are enthusiastic about setting up facilities on the web for electronic commerce. But in real web and internet are vulnerable to compromises with various sorts. As business wake up to this reality, the demand for secure web services grows. There are two types of threats to the web services : 1.1 Passive attacks : It is eavesdropping on network traffic between browser and server and gaining access to information on a web site that is supposed to be restricted. 1.2 Active attack : It includes impersonating another user, altering messages in transit between client and server and altering information on a web site. In all distributed environment electronic mail is the most heavily used network based application. It is the only application that is widely used across all architecture and vendor platforms. Users expect to be able to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using...

Words: 27771 - Pages: 112

Premium Essay

Sanitation in Ghana

...REPUBLIC OF GHANA THE BUDGET STATEMENT AND ECONOMIC POLICY of the GOVERNMENT OF GHANA for the 2015 FINANCIAL YEAR presented to PARLIAMENT on WEDNESDAY, 19TH NOVEMBER 2014 by SETH E. TERKPER Minister for Finance on the Authority of HIS EXCELLENCY PRESIDENT JOHN DRAMANI MAHAMA Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ THE 2015 BUDGET STATEMENT AND ECONOMIC POLICY ~ ii ~ Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ For copies of the Statement, please contact the Public Relations Office of the Ministry: Ministry of Finance Public Relations Office New Building, Ground Floor, Room 001/003 P. O. Box MB 40 Accra – Ghana The 2015 Budget Statement and Economic Policy of the Government of Ghana is also available on the internet at: www.mofep.gov.gh ~ iii ~ Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ ACRONYMS AND ABBREVIATIONS ABFA ACLP ADR AFCON AfDB AIDS AML AMSECs APR ATMA AVIC BACs BDS BIEPC BoG BOP bopd bps BR BRICS BSPs BVDs Annual Budget Funding Amount Ascertainment and Codification of Customary Law Project Alternative Dispute Resolution African Cup of Nations African Development Bank Acquired Immune Deficiency Syndrome Anti-Money laundering Agricultural Mechanization Services Enterprise Centres Annual Progress Report Accra-Tema Metropolitan Area Accra Visitor Information Centre Business Advisory Centres...

Words: 63016 - Pages: 253

Premium Essay

World Investment Report 2013

...U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2013 GLOBAL VALUE CHAINS: INVESTMENT AND TRADE FOR DEVELOPMENT New York and Geneva, 2013 ii World Investment Report 2013: Global Value Chains: Investment and Trade for Development NOTE The Division on Investment and Enterprise of UNCTAD is a global centre of excellence, dealing with issues related to investment and enterprise development in the United Nations System. It builds on four decades of experience and international expertise in research and policy analysis, intergovernmental consensusbuilding, and provides technical assistance to over 150 countries. The terms country/economy as used in this Report also refer, as appropriate, to territories or areas; the designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. In addition, the designations of country groups are intended solely for statistical or analytical convenience and do not necessarily express a judgment about the stage of development reached by a particular country or area in the development process. The major country groupings used in this Report follow the classification of the United Nations Statistical Office. These are:...

Words: 156671 - Pages: 627

Premium Essay

World Investment Report

...U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2013 GLOBAL VALUE CHAINS: INVESTMENT AND TRADE FOR DEVELOPMENT New York and Geneva, 2013 ii World Investment Report 2013: Global Value Chains: Investment and Trade for Development NOTE The Division on Investment and Enterprise of UNCTAD is a global centre of excellence, dealing with issues related to investment and enterprise development in the United Nations System. It builds on four decades of experience and international expertise in research and policy analysis, intergovernmental consensusbuilding, and provides technical assistance to over 150 countries. The terms country/economy as used in this Report also refer, as appropriate, to territories or areas; the designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. In addition, the designations of country groups are intended solely for statistical or analytical convenience and do not necessarily express a judgment about the stage of development reached by a particular country or area in the development process. The major country groupings used in this Report follow the classification of the United Nations Statistical Office. These are:...

Words: 156671 - Pages: 627

Free Essay

Analyse de La Trajectoire Historique de La Monnaie Electronique

...Article « Analyse de la trajectoire historique de la monnaie électronique » Marc Lacoursière Les Cahiers de droit, vol. 48, n° 3, 2007, p. 373-448. Pour citer cet article, utiliser l'information suivante : URI: http://id.erudit.org/iderudit/043936ar DOI: 10.7202/043936ar Note : les règles d'écriture des références bibliographiques peuvent varier selon les différents domaines du savoir. Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y compris la reproduction) est assujettie à sa politique d'utilisation que vous pouvez consulter à l'URI http://www.erudit.org/apropos/utilisation.html Érudit est un consortium interuniversitaire sans but lucratif composé de l'Université de Montréal, l'Université Laval et l'Université du Québec à Montréal. Il a pour mission la promotion et la valorisation de la recherche. Érudit offre des services d'édition numérique de documents scientifiques depuis 1998. Pour communiquer avec les responsables d'Érudit : erudit@umontreal.ca Document téléchargé le 30 janvier 2014 01:23 analyse de la trajectoire historique de la monnaie électronique Marc « l a C o u rsiè re Le développement de l’argent et des mécanismes de paiement est d’abord apparu par la création du troc, lequel a engendré la monnaie métallique, qui a donné naissance à la monnaie papier pour être graduellement remplacée par la monnaie électronique. À chacune de ces étapes, le degré d’acceptation de la monnaie est tributaire...

Words: 39741 - Pages: 159

Free Essay

2004 Un Article Multiculturalism

...HUMAN DEVELOPMENT REPORT 2004 Cultural Liberty in Today’s Diverse World Accommodating people’s growing demands for their inclusion in society, for respect of their ethnicity, religion, and language, takes more than democracy and equitable growth. Also needed are multicultural policies that recognize differences, champion diversity and promote cultural freedoms, so that all people can choose to speak their language, practice their religion, and participate in shaping their culture— so that all people can choose to be who they are. 65 108 166 55 34 82 3 14 91 51 40 138 29 62 6 99 161 134 114 66 128 72 33 56 175 173 130 141 4 105 169 167 43 94 73 136 144 168 45 163 48 52 30 32 Albania Algeria Angola Antigua and Barbuda Argentina Armenia Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bhutan Bolivia Bosnia and Herzegovina Botswana Brazil Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Central African Republic Chad Chile China Colombia Comoros Congo Congo, Dem. Rep. of the Costa Rica Côte d'Ivoire Croatia Cuba Cyprus Czech Republic 17 154 95 98 100 120 103 109 156 36 170 81 13 16 122 155 97 19 131 24 93 121 160 172 104 153 115 23 38 7 127 111 101 10 22 21 79 9 90 78 148 28 44 110 135 50 80 Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Fiji Finland France Gabon Gambia Georgia Germany Ghana Greece Grenada Guatemala Guinea...

Words: 113315 - Pages: 454

Premium Essay

Infosys Ar

...Annual Report 2014-15 Infosys Annual Report 2014-15 Narayana Murthy A tribute to our founders Nandan M. Nilekani S. Gopalakrishnan K. Dinesh The year 2014 was a milestone in our Company's history, when we bid farewell to three of our founders who held executive positions in the Company during the year – Narayana Murthy, S. Gopalakrishnan and S. D. Shibulal. Narayana Murthy stepped down as the Chairman of the Board on October 10, 2014. His vision, leadership and guidance have been an inspiration to Infosys, the Indian IT industry and an entire generation of technology entrepreneurs. He propelled the Company into accomplishing many firsts and in setting industry benchmarks on several fronts. He espoused the highest level of corporate governance standards that have defined Infosys over the years and made us a globally respected corporation. Between June 2013 and October 2014, he guided the Company through a period of stabilization and leadership transition. S. Gopalakrishnan stepped down as Vice Chairman of the Board on October 10, 2014. Kris, as he is popularly known, served the Company in several capacities over the last 33 years. As the Chief Executive Officer between 2007 and 2011, he steered the Company at a time when the world was faced with economic crises. Ranked as a global thought leader, Kris has led the technological evolution of the Company. S. D. Shibulal stepped down as the Company's Chief Executive Officer on July...

Words: 136409 - Pages: 546