Premium Essay

Management Plan for Cyber Software, Inc.

In:

Submitted By cntaganira
Words 1924
Pages 8
-------------------------------------------------
Management Plan for Cyber Software, Inc.
-------------------------------------------------
Case Study #1: Planning and Organizing
-------------------------------------------------
Christian Ntaganira
-------------------------------------------------
BMGT 364: Management and Organization Theory
-------------------------------------------------
Summer 2015
-------------------------------------------------
Instructor: Deborah Shearer
-------------------------------------------------
University of Maryland University College
-------------------------------------------------

Introduction
Cyber Software, Inc. is a medium cyber software company which makes and provides cyber protection products to small and medium size customers such as retailers and local municipal entities. Cyber Software, Inc. has been performing well in providing its products and services to its clients. The main objective of the company is to safeguard information of its customers from hackers and cyber bullies (Schermerhorn, 2008). Joseph Jackson, the CEO of Cyber Software Inc. has managed to control the problem of hacking clients’ information. However, one of Cyber Software’s customers has been hacked and credit card information was stolen. Cyber Software, Inc. was able to intervene, immediately, and was able to limit the damages. This incident showed Cyber Software, Inc. to always stay on its toes in this evolving and ever changing industry. It realized that it has to stay on the cutting edge of the cyber-software industry and be able to prevent cyber-crimes before they happen. Cyber Software, Inc. has to continue to do all in its power so that its customer’s information systems are protected. This will allow its customers to keep the trust and faith in its products. With this new challenge, Cyber Software CEO, Joseph Jackson has

Similar Documents

Premium Essay

Cyber Securites

...Title Name Course Professor Introduction: Cyber Software Inc. is an organization that can perform extremely well in the marketing field because it believes in satisfying its customers. The company has numerous customers including business people, state and municipal governments. The main objective of the company is to safeguard information of its customers from hackers and cyber bullies (Schermerhorn, 2008). Joseph Jackson, the CEO of Cyber Software Inc. has managed to control the problem of hacking clients’ information but still has a challenge in developing an organizational structure that will put every worker in his place and define their duties. The function of this management plan is to create an organizational structure that will be used by Cyber Software Inc. The plan focuses on defining the mission and vision of the company and describing how each division will be operating within the company. Mission and Vision Statements: The mission of the company is to enable individuals and enterprises protect their information inclusively throughout the entire world to discover their full potential. This statement shows the commitment of the company to the customers. Cyber Software Inc delivers on that commitment by doing its best to create technology that ensures customers’ demands are fully met (Robbins & Coulter, 2009). It does not discriminate against the age, ethnicity or even country because Cyber Software aspires to expand its business beyond borders. The significance...

Words: 1559 - Pages: 7

Free Essay

Cyber Software Inc.

...- - - - - I. Introduction Cyber Software Inc.’s CEO, Joseph Jackson, is worried about the expansion and future of the company. Previously one of their clients, Baltimore City Government, was hacked giving the hacker(s) access to over hundreds of client’s credit cards. Even with Cyber Software Inc.’s quick action, two hundred and seventy five individuals were still affected. Worried about the wellbeing of the company, Mr. Jackson is looking to revise their current vision and mission, as well as restructure their new program development and customer service divisions. II. Mission and Vision Statement Prior to being able to establish a new structure for the company, vision and mission statements are needed to establish a foundation for direction. “It is important to get employees on board with the decision making process. This can be articulated through the mission and vision statement…” (Hawthorne, n.d.). New Mission Statement: Providing the most innovative and up to date around the clock cyber security, and satisfactorily customer service to our clients New Vision Statement: Pioneering cyber security services and protection by adapting to daily cyber environmental changes and technology With the revised vision and mission statement, Cyber Security Inc. has a new foundation set to assist in a proper path when planning. There are three main planning functions that must be considered when setting a direction for the organization, strategic, tactical, and operational...

Words: 1470 - Pages: 6

Free Essay

Cisco

...University of Houston Case Study of Cisco Systems, Inc. Nirav Sheth INTB 3354: Introduction of Global Business Professor Alana Aleman April 8, 2015 1. Introduction Leonard Bosack and Sandy Lerner, the married couple who met at Stanford University, founded Cisco in 1984 in San Francisco, California. During Cisco’s founding years at Stanford University, Leonard Bosack, Sandy Lerner, and a few others helped connect hundreds of computers throughout Stanford University on a wired network. They understood that they could take this technology and help other university and business, which helped Cisco grow into the $150 billion networking conglomerate it is today. Cisco multiprotocol router, Cisco’s first major product, was one of a kind package of a group of routers, switches, internetworking and other telecommunication devices that helps a group of computers multitask on a closed network. From here, Cisco’s management created a market where they could sell routers, switches, servers, data centers, and other telecommunication devices and software to help connect the world through electronic devices. Like many other technology companies, there were able to help bring this technology to the rest of the world because their hardware and software did not vary too much throughout different markets. They were able to become truly global and sell their products all over the world to enable billions of people enable them to connect into the digital world. (Boudreau) 2. Problems ...

Words: 1674 - Pages: 7

Free Essay

Network Proposal

...PROPOSAL FOR ABC NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Name: Institutional Affiliation: Course: Date: Table of Contents SECTION I: CONSULTANT …………………………..............................................2-5 SECTION II: OUR UNDERSTANDING OF ABC REQUIREMENTS…………….5 SECTION III: OUR PROPOSAL……………………………………………………..6-16 SECTION IV: PROJECT RESOURCE……………………………………………..….17-18 Reference………………………………………………………………………………… I.0. Introduction BLM COMMUNICATIONS Your Ref… Our Ref: ABC/14/9 26 September 2014 Information Technology/ Systems Engineer ABC, Department of ICT Address: Dear Sir/Madam, RE: PROPOSAL FOR NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Proposal on enterprise-wide solution for networking topology, network devices, IP infrastructure, and network security innovative safety procedures and measures for implementation to provide safer environments for networking and electronic document management software. We look forward for your favorable consideration. Sincerely, Name, LEAD CONSULTANT 1. Business Questionnaire |Company Registration No. 490998 | |PIN Number P051564540Q ...

Words: 2114 - Pages: 9

Premium Essay

Cybercrimes & Supply Chains

...UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE | The Impact of Cybercrimes on Organization Supply Chains | ASCM 630 Research Paper | TurnItIn Originality Score: 27% | April Dorsey | 4/1/2012 | The paper must follow APA format, be written on an approved topic related to the course, and include discussion of how the topic relates to Acquisition and Supply Chain Management. The paper must list and discuss a minimum of 10 scholarly references (other than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. | ABSTRACT This paper will discuss the impact of cyber crimes on organization supply chain functions, and steps taken to improve supply chain security. Cyber crimes include, but are not limited to, piracy, implanting viruses, netspionage, and credit card fraud. During these times, it is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at bigger risk is procurement. Majority of companies use other businesses outside their own, like manufacturers and distributors, as part of their purchasing...

Words: 5220 - Pages: 21

Premium Essay

Cyber Sysems

...DeVry University Alhambra, California Cyber Security Systems By Alvin Canlas (D01621385) Hernando De Leon (D40160634) Arees Dikranian (D01501086) Edward Huron (D01298546) Sandry Kho (D40246297) Chirag Patel (D40152599) Maria Ramirez (D01636860) Jaime Solorzano (D40201380) Submitted in Partial Fulfillment of the Course Requirements for MGMT 404 Project Management Dr. John Lindem October 15, 2014 Executive Summary Information Technology continues to change at a rapid pace. These changes greatly affect the world we live in. Corporate giants such as Target, Home Depot, and Apple have been recent targets of cyber-attacks. To protect customer date we have to constantly adapt to the different style of attacks and adjust to their business technology policies. At Cyber Security Systems (CSS) it is our mission to maintain the continuity of these vital services and preserve the public’s trust in our information systems. In addition, it requires new levels of communication and cooperation among the public and private sector, corporate agencies and departments. Furthermore, it involves protecting our critical infrastructures from intrusion or attack as well as using the infrastructure as a tool with which law-enforcement agencies can gather, analyze and disseminate information. This business plan will provide a vision, purpose, mission and goals for technology at Cyber Security Systems. In addition, it also includes the current organization of Information...

Words: 4839 - Pages: 20

Premium Essay

Risks Associated with Outsourcing

...regret probabilities into a predicted value for that outcome. Risk is defined as a function of three variables: 1. The probability that there is a threat. 2. The probability that there are vulnerabilities. 3. The potential impact. What is risk management? Risk management is the means of balancing the costs and benefits of any business decision. The risk management process involves identifying, analyzing, and taking steps to eliminate or reduce the loss faced by an organization or individual. Risk management utilizes many tools and techniques, including but not limited to insurance, to manage a wide variety of risks. All businesses encounter risks, some of which are predictable and controllable, and others which are unpredictable and uncontrollable. Risk Management is particularly vital for any business. Common types of losses—such as theft, fire, flood, legal liability, injury, or disability—can destroy in a few minutes what may have taken the company years to build. Such losses and liabilities can affect the day to day operations, reduce profits, and cause financial hardship. These hardships can be severe enough to cripple or bankrupt a company. Through proper Risk Management a company has a better chance of not only identifying risks but also has a better chance of recovery if the risk is not avoided altogether. When we see the people around us start to get sick, we analyze this and take preventative measures to avoid getting sick ourselves, i...

Words: 4505 - Pages: 19

Free Essay

Csec 610 Final Exam

...University of Maryland University College Final Exam Question 1 a) If I were to engineer a product that could be used to spy on users, the first thing I would install would be a rootkit. A rootkit is a clandestine kind of software that is designed to conceal that fact that an operating system has been compromised. They ultimately allow viruses and malware to hide from usual methods of detection, and permits continued privileged access to a computer. Rootkits allow for full control over a system, which means that existing software can be modified including detection software. Rootkit detection is difficult because a rootkit is activated before the operating system boots up and is able to subvert the software intended to find it (Vacca, 2013, pp. 53-54). The next step would then be to install spyware and use the rootkit to disguise it as necessary files that anti-spyware software will overlook. Once a user purchases this product and it is connected, off-site agents will be able to start collecting files and data and have the ability to access and control the infected devices. b) As a technology procurer for an organization, it is very important to do your research on your vendors. The legitimacy of the vendor needs to be verified and their workforce, production lines and supply chains need to be checked to ensure they have appropriate security measures and monitoring in place to safeguard against malicious activity. A security vulnerabilities assessment needs to be...

Words: 5301 - Pages: 22

Premium Essay

Sec571 Course Project

...Michalek SEC571 Principles of Information Security and Privacy Keller Graduate School of Management Submitted: April 21, 2013 Table of Contents Company Overview ……………………………………………1 Company Assets ………………………………………………..1 Vulnerabilities ………………………………………………….2 Hardware Vulnerability………………………………….......2 Policy Vulnerability …………………………..……………..3 Recommended Solutions…………………………………….... 5 Hardware Solutions ……………………...………………..…5 Policy Solutions ……………………………...……………...10 Budget ………………………………………………………….12 Summary ………………………………………………………13 References……………………………………………………...14 Company Overview Aircraft Solutions (AS) company located in Southern California design and fabricates component products and provide services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. AS uses Business Process Management (BPM) to handle end-to-end processes. BPM system is designed to connect customers, vendors, and suppliers. Security Weakness In the communication between AS’s headquarter and its two departments make the AS’s headquarter assets are targeted, I will discuss here about the vulnerabilities in software and the policy. Company’s Assets The assets for AS are the Business Process Management, BPM, system and the servers used to store customer data such as project information, computer...

Words: 4091 - Pages: 17

Premium Essay

Country Risk Analysis

...types include political, legal, and regulatory risk, exchange and repatriation of funds risk, competitive risk, taxation and double taxation risk, market risk, distribution and supply chain risk, physical and environmental risk, social and cultural risk, and cyber-risk or technological risk. Political, Legal, and Regulatory Risks Politically, China faces some stability issues. China has a Communist government. In many cases, this regime has led to stability that has helped the country reach the more recent levels of economic improvement, despite some notable discontent among its people (Cai & Li, 2009). However, since reaching a more prosperous economy China has been at odds with itself. Balancing its communistic central government with capitalistic economic centers has been unsuccessful. Additionally, the development of the nation has led to a large disparity between the classes with some rural regions looking as they did decades ago whereas urban centers rival New York and Tokyo in excess (AMBest Co Inc., 2011). This generates a lack of trust in smaller regional centers and towns that threatens to create instability in China (Ke & Zhang, 2003). Political, Legal, and Regulatory Risks Management Companies that have plans of investing, operating or partnering with Chinese company must understand the political process of a Communist government and seek legal and regulatory advice from company, which currently operate in this region. Avoiding legal problems is the best option...

Words: 2144 - Pages: 9

Premium Essay

Porters 5 Force Analysis of Apple Inc

...Apple Inc. specialises in development, design and marketing of computers, portable-digital music players and other didgital devices including iPad’s and mobile devices (IPhone). Apple Inc. are also involved in selling multiple supporting software, digital content, third party applications, networking software and services. Apple Inc. predominantly operate from their U.S headquarters in Cupertino, California and involves 72,800 employees (Forbes, 2013). Revenue for APPL in 2013 has risen from $155.97bn in 2012 to $170.87bn in 2013 (Market watch, 2013) which is a 9.6% increase. The objective of the Porter’s 5 forces model is to identify and elucidate the current levels of competition existing with a market, by examining what the 5 forces involve. ‘The model therefore provides a detailed and nuanced picture of the industry and to make an in-depth analysis with an idea of what factors one can try to influence in order to create optimal conditions for one’s business and the industry” (P.K. Faarup, P113, 2010). Threat of new entrants High levels of competition currently being practiced in the PC and mobile industry make it difficult for potential competitors to enter the market. Unlike many companies Apple inc. has secured brand loyalty from customers by focusing on product innovation and, research and development. Another way apple has secured its brand loyalty is by creating an emotional connection with consumers by embracing the internet and social media to voice what the...

Words: 1770 - Pages: 8

Premium Essay

Cmgt

...Boardman Management Group Securing External Elements Name CMGT/430 Date Instructor Name Boardman Management Group Securing External Elements The topic of managing networks and data security is a huge concern of organizations around the world. As a risk management consultation for the Boardman Management Group/Baderman Island Resort, it is necessary to help the organizations owner, and IT department understand the importance of the provisioning of data and access on their company website. The Boardman Group has updated their web interface. With the help of the consultants the group is currently preparing to assess the risks, vulnerabilities, and threats related to the upgrade as well as secure the enterprise from external threats. Because the upgrade to the web interface senior management, and the others are updating the policies and procedures to align with the mission of the organizations commitment to maintain confidentiality, integrity, and availability within the organizational structure. Modifications to the policies are often necessary whenever technology changes for the organization. As technology changes or advances organizations must realize that most often the policies, practices, and guidelines will change as well (Whitman, n.d.). The Baderman Island Resort is a growing establishment, which offers its customers a wealth of services. Many of the resorts services are offered through the company website. Customers...

Words: 1203 - Pages: 5

Premium Essay

What Business and Social Problems Does Data Center Power Consumption Cause?

.... What business and social problems does data center power consumption cause? Data center power consumption economically affects businesses and environmentally affects society. Operating costs for data centers is very expensive. In the article, "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments," the total operating costs, concerning electricity, of all data centers within the U.S. alone exceeded 7 billion dollars in 2010 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). The article then explains that data centers consumed 61 billion kilowatt-hours in 2006;the Environmental Protection Agency provided this statistic to the US Congress in a report from 2007 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). With this amount of energy being consumed by data centers, it is a cause for concern; consequently, data centers have an impact on the cost of business and negatively impact the environment via carbon footprint. As the carbon footprint grows, there is a need to realign the way businesses looks at managing their data centers. Several companies including Cisco, Dell, Google, HP, IBM, and Intel have announced efforts to reduce the environmental footprint of their product offerings (Chang et al., 2012). Large technology companies are starting to understand that being environmentally friendly is good for the wallet and good public relations. Understanding how to manage and build better data centers...

Words: 4296 - Pages: 18

Premium Essay

Supply Chain Security About Target

...UNIVERSITY OF LA VERNE La Verne, California Target Supply Chain Management Security A Paper Submitted in Partial Fulfillment Of the Requirements for BUS577: Supply Chain Security Team Member: Xiaomeng Xu Lusi Peng Xinyao Lu Jieyi Cai Hailin Yan College of Business and Public Management Department of Master of Business Administration 2016/5/20 Introduction Target Corporation is an upscale discount retailer that provides high-quality, on-trend merchandise at attractive prices in clean, spacious and guest-friendly stores. Target opened the first store in 1962 in the Minneapolis suburb of Roseville, Minnesota, and now is the second largest retailer in the United States right after Wal-Mart. In fiscal 2015, the company’s revenue grew by $1.3 billion, reflecting a 1.3% increase in comparable sales and the contribution from new stores. Today, Target remains committed to providing a one-stop shopping experience for customers by delivering differentiated merchandise and outstanding value with its Expect More, Pay Less brand promise. Target constantly fulfils the needs and fuels the potential of the customers by delivering outstanding value, continuous innovation and an exceptional guest experience. As of 2015, Target operates 1,793 locations and 38 distribution centers with 341,000 team members throughout the United States and worldwide. The retail format include the discount...

Words: 4286 - Pages: 18

Free Essay

Air Traffic Control System

...INTRODUCTION Information security is an essential topic to any airports because it causes a huge loss and impact on the society. There are many control systems in an airport, and the report only focus on air traffic control system (ATC). The risks, mitigations strategies, risk management plan is analysis the technology problem and solution to the computer system of ATC. In this report, the hazard, financial and operational risks that cause by information technology vulnerability is assess in the first session. The second session discusses the risk management techniques for the risks that identify in first session. Lastly, the risk mitigation plan is discussed the critical business function and plans to deal with computer outage, power outage when the issues happen. RISK ASSESSMENT Activity, Asset, Data information, risk The Air Traffic Control (ATC) is responsible for several activities in the airport. It involves separation assurance, landing services operating, navigation and ground control. Separation assurance is one of the main ATC components. It maintains the separation of aircraft from each other to avoid collision (Dwyer & Landry, 2013). The separation assurance tracks the position of each aircraft, and air traffic controller collects the information and provides it to the pilot. Both of automated tasks and manual tasks are involved in this function. The flights information such as identification, location and situation is recorded and used in the system...

Words: 6286 - Pages: 26