leone ct#4 presentation

7
INFO 644 CRITICAL THINKING #4 Vincent Leone File must be downloaded to hear audio!

Upload: vincentleone

Post on 16-Jul-2015

82 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Leone ct#4 presentation

INFO 644 CRITICAL THINKING

#4

Vincent LeoneFile must be downloaded to hear audio!

Page 2: Leone ct#4 presentation

CRITICAL THINKING #4

Security Management at the Tower

This week’s Critical Thinking exercise asks students to identify key cyber security competencies that Tower lacked and could have played in ensuring that it’s security competencies were adequately harnessed.

Page 3: Leone ct#4 presentation

CRITICAL THINKING #4

Background:

• Tower – Major hotel and casino• Security Department software was not Y2K compliant.• Viruses had been detected on the network• Current software procedures allowed unauthorized access to security reports. • IT department removed A: drives from security computers limiting hardware availability to security officers.

Page 4: Leone ct#4 presentation

CRITICAL THINKING #4

IT Department Solution: • Purchased new security software • Did not purchase a training program• Did not consult with the security department

Results:• Software program created several problems for users and was almost ineffective.• 2 years later the program was still full of problems.• IT Department is purchasing new hardware.

Page 5: Leone ct#4 presentation

CRITICAL THINKING #4

IS Security Planning Process should include:

• A well conceived corporate plan with a security vision.• A plan to maintain the quality of organization operations.• A security strategy that is integrated into the corporate planning process. • A concurrent security evaluation procedure.

Page 6: Leone ct#4 presentation

CRITICAL THINKING #4

Tower Solution: What should have happened:

• CEO should have been informed of the Security Department IT problem from the start.• Security and IT Directors should have worked together more effectively to reach a successful solution.• Security IT functions should have been run off its own server. • Access to security files should had controlled access.• Both IT & Security Directors should have conducted more research before buying poor security software. • More effective IT security procedures should have been adopted to ensure the confidentiality of security reports.

Page 7: Leone ct#4 presentation

CRITICAL THINKING #4

FINAL QUESTION

Could effective leadership have prevented this security related IT

problem at the Tower?