...CASE APPLICATION: Managing the Virus Hunters Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don't have to imagine. That's the reality of their daily work life. At the company's Response Lab in Santa Monica, California, described as the "dirtiest of all our networks at Syamntec", software analysts collect viruses and other suspicious code and try to rigure out how they work so security updates can be provided to the company's customers. By the door to the lab, there's even a hazardous materials box marked "Danger" where they put all the disks, tapes, and hard drives with the nasty viruses that need to be carefully and completely disposed of. Symantec's situation may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects ther elaities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec's virus-hunting team since 1999. Back then, he said, "There were less than two dozen people, and... nothing really happened. We'd see maybe five new viruses a day, and they would spread in a matter of months, not minutes." Now...
Words: 787 - Pages: 4
...1. Keeping in professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? Answer: Vincent Weafer’s following techniques encouraged innovation and professionalism among the virus hunters: * Work was divided into smaller parts and specialization * The work never stopped, to maintain efficiency The work never stopped, to maintain efficiency Example: When Santa Monica’s team finished, Tokyo took over, this handed over to Japanese to Dublin and back to Santa Monica. 2. What management roles would Vincent be playing as he (a) Had weekly security briefing conference calls with coworkers around the globe. (b) Assessed the feasibility of adding a new network security consulting service, or (c) Kept employees focused on the company’s commitments to customers? Answer: (a) Based on the study by Henry Mintzberg managers have different but highly inter-related roles. According to this we can analyze that Vincent has approached towards Interpersonal role as he worked as a figurehead, leader, liaison and also informational role as he act as a monitor and a disseminator. (b) In this context Vincent has proved that he has approached towards that he has approached towards Decisional role as he worked as a role as he worked as a disturbance...
Words: 714 - Pages: 3
...CASE STUDY #1: MANAGING THE VIRUS HUNTERS I. Time Context The period in this case study is from 1999 to 2003. Vincent Weafer has been the leader of Symantec Corporation's virus hunting team since 1999. The Launch of Blaster-B worm took place in 2003. II. Viewpoint This case study is about the computer virus hunters at Symantec Corporation. It focuses on the nature of their job and the managerial challenges faced by Vincent Weafer. III. Relevant Facts A. Symantec Corporation. Symantec is a global software company. Its mission is to provide complete online security to its customers and safety to the cyber world. Symantec deals with the production of antivirus software, which provides protection against harmful contents for computers. Symantec is a long-term survivor since 1982. B. Vincent Weafer Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past 10 years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability response, real-time alerting, content solutions, research, and analysis. Weafer...
Words: 285 - Pages: 2
...MANAGEMENT ASSIGNMENT 1 CASE STUDY: MANAGING THE VIRUS HUNTERS CLASS ROLL NO.: 33 Questions of Case Study: 1. Keeping in professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? Answer: Vincent Weafer’s following techniques encouraged innovation and professionalism among the virus hunters: * Work was divided into smaller parts and specialization * The work never stopped, to maintain efficiency The work never stopped, to maintain efficiency Example: When Santa Monica’s team finished, Tokyo took over, this handed over to Japanese to Dublin and back to Santa Monica. 2. What management roles would Vincent be playing as he (a) Had weekly security briefing conference calls with coworkers around the globe. (b) Assessed the feasibility of adding a new network security consulting service, or (c) Kept employees focused on the company’s commitments to customers? Answer: (a) Based on the study by Henry Mintzberg managers have different but highly inter-related roles. According to this we can analyze that Vincent has approached towards Interpersonal role as he worked as a figurehead, leader, liaison and also informational role as he act as a monitor and a disseminator. (b) In this context Vincent has proved that he has approached towards that he has...
Words: 295 - Pages: 2
...were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. “That’s the reality of their daily work life. At the company’s response lab in Santa Monica, California, described as the “dirtiest of all our networks at Symantec. “ Software analysts collect viruses and other suspicious cod and try to figure out how they work so the company can provide security updates to its customers. There’s even a hazardous materials box by the door to the lab, marked DANGER, where they put all the discs, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situations may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec’s virus hunting team since 1999. Back then, he said “there were less than two dozen people, and . . . nothing really happened. We’d see may be five new viruses a day, and they would spread in a matter of months, not minutes. “Now, Symantec’s virus hunter around the words deals with some 20,000 virus samples each month, not all of which are unique, stand-alone viruses....
Words: 1368 - Pages: 6
...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...
Words: 354 - Pages: 2
...Week 2 Homework – GM520. 1. State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you or the business in which you are working? If so, how? Submit a copy of the proposed regulation along with your responses to these five questions. The proposed regulation can be submitted as either a separate Word document (.doc) or Adobe file (.pdf). This means you will submit two attachments to the Week 2 Dropbox: (1) a Word doc with the questions and your answers and (2) a copy of the proposed regulation you used for this assignment. (10 points) The regulation that is of concern to me is one that is controlled by U.S. Fish and wildlife service. “A 1940 reorganization plan (54 Stat. 1232) in the Department of the Interior consolidated the Bureau of Fisheries and the Bureau of Biological Survey into one agency to be known as the Fish and Wildlife Service. The Bureau of Sport Fisheries and Wildlife was created as a part of the U.S. Fish and Wildlife Service in the Department of the Interior on November 6, 1956, by the Fish and Wildlife Act of 1956 (70 Stat. 1119). That act was amended on July 1, 1974, by Public Law 93-271 (88 Stat. 92) to, among other purposes, abolish the position of Commissioner of Fish and Wildlife and designate the Bureau as the U.S. Fish and WildlifeService” (www.fws.gov/help/about_us.html).The U.S. fish and wild life service is the principle federal...
Words: 1683 - Pages: 7
...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...
Words: 6103 - Pages: 25
...Securing Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperative due to an estimated revenue of $100,0000,000 flowing in by virtue of online credit card transactions specific to banking and loan application based services. This security policy will go on to outline the specific regulations and legislation that are in agreement with the statutory compliance criteria. Below is a recommended view of the characteristics and components of the recommended security based policy. Taking up the stake of the performance, cost, and security of maintaining the Linux, and open source infrastructure will be within the premise of the defined roles and responsibilities. Annual cost savings are estimated to amount to $4,000,000 (approx) by virtue of implementation of this solution. The ‘C’-‘I’-‘A’ triad will be a crucial requirement fo the First World Savings Bank and translates to Confidentiality, Integrity and Availability respectively. Confidentiality aspect with reference to First World Savings Bank – Confidentiality refers to the principle that states...
Words: 3404 - Pages: 14
...Fedoroff Agric & Food Secur (2015) 4:11 DOI 10.1186/s40066-015-0031-7 Open Access REVIEW Food in a future of 10 billion Nina V Fedoroff* Abstract Over the past two centuries, the human population has grown sevenfold and the experts anticipate the addition of 2–3 billion more during the twenty-first century. In the present overview, I take a historical glance at how humans supported such extraordinary population growth first through the invention of agriculture and more recently through the rapid deployment of scientific and technological advances in agriculture. I then identify future challenges posed by continued population growth and climate warming on a finite planet. I end by discussing both how we can meet such challenges and what stands in the way. Keywords: Population growth, Agriculture, Domestication, Genetic modification, Technology Background Today we have enough food to meet the world’s needs. Indeed, we have an extraordinary global food system that brings food from all over the planet to consumers who can afford to buy it. The food price spike of 2008 and the resurgence of high food prices in recent years have had little impact on the affluent citizens of the developed world who spend a small fraction of their income on food. By contrast, food prices have a profound impact on the world’s poorest people. Many of them spend half or more of their income on food. During the food price crisis of 2008, there were food riots in more than...
Words: 8979 - Pages: 36
...Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Book 12 Sweep Cate Tiernan Eclipse Table of Contents Title Page Copyright Page Dedication Chapter 1 – Morgan Chapter 2 - Alisa Chapter 3 - Morgan Chapter 4 - Alisa Chapter 5 - Morgan Chapter 6 - Alisa Chapter 7 - Morgan Chapter 8 - Alisa Chapter 9 – Morgan Chapter 10 - Alisa Chapter 11 Morgan Chapter 12 - Alisa Chapter 13 – Morgan Chapter 14 - Alisa Chapter 15 – Morgan Page 1 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Book 12 Sweep Page 2 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Cate Tiernan ECLIPSE To Stephanie Lane, with gratitude Page 3 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html 1 Morgan > < “Oh, please. Will you two stop already? This is disgusting,” I teased. On Ethan Sharp’s front step Bree Warren and Robbie Gurevitch tried to disentangle themselves from their lip-to-lip suction lock. Robbie gave a little cough. “Hey, Morgan.” He stood off to one side, trying to act casual—hard to do when you’re flushed and breathing hard. It was still a tiny bit of a novelty to see Robbie and Bree, my best friends from childhood, in a romantic relationship. I loved it. “Perfect timing, Sister Mary Morgan,” said Bree, pushing a hand through her minky dark hair. But she grinned at me, and I smiled back. Robbie rang Ethan’s doorbell. Ethan opened the door...
Words: 49781 - Pages: 200
...Unleashing the Ideavirus 1 www.ideavirus.com Unleashing the Ideavirus By Seth Godin Foreword by Malcolm Gladwell ©2000 by Do You Zoom, Inc. You have permission to post this, email this, print this and pass it along for free to anyone you like, as long as you make no changes or edits to its contents or digital format. In fact, I’d love it if you’d make lots and lots of copies. The right to bind this and sell it as a book, however, is strictly reserved. While we’re at it, I’d like to keep the movie rights too. Unless you can get Paul Newman to play me. Ideavirus™ is a trademark of Do You Zoom, Inc. So is ideavirus.com™. Designed by Red Maxwell You can find this entire manifesto, along with slides and notes and other good stuff, at www.ideavirus.com. This version of the manifesto is current until August 17, 2000. After that date, please go to www.ideavirus.com and get an updated version. You can buy this in book form on September 1, 2000. This book is dedicated to Alan Webber and Jerry Colonna. Of course. Unleashing the Ideavirus 2 www.ideavirus.com STEAL THIS IDEA! Here’s what you can do to spread the word about Unleashing the Ideavirus: 1. Send this file to a friend (it’s sort of big, so ask first). 2. Send them a link to www.ideavirus.com so they can download it themselves. 3. Visit www.fastcompany.com/ideavirus to read the Fast Company article. 4. Buy a copy of the hardcover book at www.amazon.com/exec/obidos/ASIN/0970309902/permissionmarket. 5...
Words: 52238 - Pages: 209
... Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...
Words: 4114 - Pages: 17
...Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...
Words: 4296 - Pages: 18
...general in nature, and is intended for practical use. It is not intended to be a comprehensive scientific or clinical reference. Under the laws administered by FDA, a food is adulterated if it contains (1) a poisonous or otherwise harmful substance that is not an inherent natural constituent of the food itself, in an amount that poses a reasonable possibility of injury to health, or (2) a substance that is an inherent natural constituent of the food itself; is not the result of environmental, agricultural, industrial, or other contamination; and is present in an amount that ordinarily renders the food injurious to health. The first includes, for example, a toxin produced by a fungus that has contaminated a food, or a pathogenic bacterium or virus, if the amount present in the food may be injurious to health. An example of the second is the tetrodotoxin that occurs naturally in some organs of some types of pufferfish and that ordinarily will make the fish injurious to health. In either case, foods adulterated with these agents are prohibited from being introduced, or offered for introduction, into interstate commerce. Our scientific understanding of pathogenic microorganisms and their toxins is continually advancing....
Words: 91823 - Pages: 368