Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

**Question Explaination: 'MGA is a small business in the transition to a medium sized business through the acquisition and merger of a smaller company South

**Question Explaination:

"'MGA is a small business in the transition to a medium sized business through the acquisition and merger of a smaller company South Georgia Gadgets (SGG). Recently the Chief Executive officer (CEO) along with some key administrative staff members travels to the SGG company headquarters to start merger and transition activities.

While onsite the CEO wanted to check email, and retrieve updated documents and presentation material sent to him during his travel. He noticed and attempted to use the SGG wireless network but, unfortunately could not connect and assumed the since these were two different networks he could not connect nor access the internet. A SGG staff member in the meeting volunteered to contact the MGA home office to get the presentation. The staff member promptly returned with a flash drive with the material and the presentation began.

During a break, the CEO noticed that he was able to now connect to the internet and tried to check email. He received several emails with attachments and began opening them to find the latest copies. As he did using the laptop he received several security acknowledgment and warnings and being in a hurry to get back to the meeting he clicked OK to clear the screen and restarted the presentation.

Shortly after resuming the meeting the CEOs screen began to blink and then locked with this message: "YOUR PERSONAL FILES ARE ENCRYPTED" (Basically, CEO's computer is hacked)

The meeting focus changed to the topic on the screen and CEO asked for the Information Technology (IT) help immediately. SGG was not a very big company and did not have on site computer or IT support.

SGG had a simple network with small business class router, two switches, an off the shelf access point and a windows small business server which ran a domain and exchange mail server. They relied on an on-call support services with limited number of service hours which had been exhausted some months ago. They did not renew the service contract awaiting the acquisition talks and transitions. The only help was a computer/network knowledgeable production line employee who was recently fired after several heated arguments with coworkers over the merger talks. They did the best they could to keep the systems on but, the have made no changes or updates except recently connecting an older file server back in to the network to retrieve archived files."

*** ANSWER FOLLOWING ***:

1. Personnel training recommendation: Provide corporate training with three (3) possible courses of action (COA) to train the staff. Consider various methods, include data on costs for deliver the training, timelines and various statics of the effectiveness of the training. After presenting the three COAs write a paragraph a recommendation based on your findings

2. Administrative Controls: Research and recommend three (3) administrative control procedures that address issues presented in the scenario. Write a control statement and then a paragraph describing what the policy/procedure addresses and

3. Technical controls: Research and recommend at least two (2) system to implement technical controls that address issues presented in the scenario. Describe why they are needed and how they solve the issue.

Use tables and graphics/charts/matrix that support your recommendations

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Principles Programming And Performance

Authors: Patrick O'Neil

1st Edition

1558603921, 978-1558603929

More Books

Students also viewed these Databases questions

Question

Consider this article:...

Answered: 1 week ago

Question

How do Data Types perform data validation?

Answered: 1 week ago

Question

How does Referential Integrity work?

Answered: 1 week ago