Jumpstart Your Paper

Browse our Free Essay examples and check out our Writing tools to get your assignments done.

Organizational Problem Analysis

INSTRUCTIONS:

Please read all instruction and apply the details that asked and requested. you will prepare to respond to your boss's request for an analysis of a problem in your organization. Cyber Operations You work as a support contractor for a government agency as a cyber defense incident responder. As part of a large support team, you help to identify, analyze, and mitigate threats to the systems and networks of this government agency. Your company is up for a contract renewal this year. During a log analysis review of the intrusion detection logs, you noticed a trend where requests from an unknown IP address were attempting to access several databases across the network. In each case, access was denied for the first two weeks of the monitoring period, but over the last week, the user was successful in accessing the system and apparently downloaded several hundred thousand HR records that included personally-identifying information (PII) from thousands of agency personnel and subcontractors. You immediately notified your boss, Joe Dallas, who is also a support contractor working for the same company as you. You provide him with the documentation and ask for the next steps. Your boss seems upset with you for not reporting this incident sooner. You mention to him, you were off on vacation for the last two week and the logs weren’t monitored during that time. As Joe looked closer at the incident, it was determined that somehow root access was made available to the unauthorized user, making the situation much more concerning as the user may still have access to all of the systems throughout the network. Joe said he would review the situation with upper management and take appropriate action. About a week later, you asked what the next steps would be and how you could help resolve the matter. Joe said, "Don’t worry about it. It's been taken care of." As you review the logs, however, the problem still seems to be present with unauthorized access and data leakage of sensitive documents. In the meantime, you received an email from the government customer asking you for a report on the status of the system security. From the message, it does not appear the customer has any idea that a security breach has occurred. What should you do? Please provide a rationale for your answer. Notes 1 >>> Once that you have some understanding of the issues involved in the scenario, gather and analyze information. The Problem Analysis resources will further aid your analysis and development of the third section of your paper. 2 >>Once you have completed your analysis of the incident, the next step is to analyze alternative viewpoints, conclusions, and solutions. To do this you will need to apply Ethical Decision-Making and Reasoning. Also highly recommended, Randolph Pherson's "The Five Habits of the Master Thinker," a paper written for intelligence analysts, but applicable to all analytical thinking and reasoning. 3 >>>You considered alternative viewpoints in the last step. Now you’re ready to develop your personal conclusions and suggest remedies so that your boss is well-equipped to brief her leadership about the situation. Remember, you may need to consult outside references but this is not a research paper. It is more investigative in nature about the facts of the case. Please cite outside sources carefully. Now, outline your argument and draft Section 5: Conclusions and Recommendations, the final sections. Your boss is expecting to receive a concise, focused paper to prepare her for further meetings. Stay to the main points, although you may have more facts to answer any questions. You will submit your paper in the final step.
Related Topics: