Preview

Briargrove Computer System Failure Fix Plan

Better Essays
Open Document
Open Document
1283 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Briargrove Computer System Failure Fix Plan
Briargrove Computer System Failure Fix Plan
Anthony Redhead

Grantham University Project Management Integration Framework (BA 647)

Introduction
As a multinational organization, Briargrove has an extensive computer system network. However, due to too many locations globally, Briargrove only thought of data back-ups and lab test network without implementing administrator accesses or an information Technology (IT) policy and procedure. Because they failed to implement Information Systems (IT) administrative controls, many of the management personnel downloaded unknown software and has caused a complete system failure, affecting negatively the entire organization’s network. Following their
…show more content…
Discussed earlier, it was mentioned to give “administrator access” to some of the employees. “Administrator access” is defined as a level of access above that of a normal user. This definition is intentionally vague to allow the flexibility to accommodate varying systems and authentication mechanisms. Local Administrators, Domain Administrators and Enterprise Administrators groups would all be considered to have Administrator Access. In an application environment, users with ‘super-user’ or system administrator roles and responsibilities would be considered to have Administrator Access. In theory, this guidance applies to any user account in that utilization of access rights is reserved solely for the intended business purpose that would be granted solely by Briargrove’s Administration.
IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their
…show more content…
C., Zmud, R. W., Jacobs, G. C. (1994). “The influence of IT management
Practice on IT Use in Large Organizations.” MIS Quarterly. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=8&sid=9ee19d25-76f7-4b70-87bd-7bf868116023%40sessionmgr198&hid=115.
Jiang, J. J., Chang, J. Y. T., Chen, H., Wang, E. T., and Klein, G. (2014). “Achieving IT
Program Goals with Integrative Conflict Management.” Journal of Management Information Systems. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/ pdfviewer?vid=6 &sid=9ee19d25-76f7-4b70-87bd-7bf868116023%40 sessionmgr198&hid=115. Winniford, M., Conger, S., Erickson-Harris, L. (2012). “Confusion in the Ranks: IT
Service Management Practice and Terminology.” Information Systems Management. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/
pdfviewer?vid=10&sid=9ee19d25-76f7-4b70-87bd7bf868116023%40sessionmgr

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    the ethical and legal implications of breaching company policy on the use of electronic data…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of what? 9…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    information security intrusion to the entire organization, and not just that particular computer, for the…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Acct Internal Control

    • 716 Words
    • 3 Pages

    The first internal control should be implemented within the human resources department which is the human resources control to define the policies and procedures for hiring practice of LBJ Company. The human resource department will have the expertise to establish policies that speak directly to the proper acquisition, promotion, benefits, and termination of all future and current employees. A full background check will be conducted on each individual who are seriously vetted for a position within LBJ. This process will eliminate the embarrassment experience by the president recently. In addition to the background checks being put in place for all employees, the principle of establishing responsibility control is needed to ensure that every employee has accountability to themselves and LBJ. This will be done by introducing a computer usage agreement signed and placed in each employee file. Having this legal and binding agreement with the employees and LBJ, will state the policy of use of all computer systems within the company and the recourse if said agreement is violated and mandate that each user have a username and password to be changed every 45 days. With the usage of common access cards or username and password combination will readily identify anyone who is engaging in illegal activities on the company’s asset by…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Information technology has made great strides in improving the efficiency and effectiveness of how information is organized, stored, processed, and shared in today’s organizations. With the vast amount of information available at the touch of a button, there are several human aspects that should be considered when implementing and maintaining an information management system. It can be a very difficult task for information managers to find the right combination of technology, access to information, and security to match the needs and information culture of the entire organization. Information managers must begin by thinking about how people use information, not how people use machines (Davenport 1994). It shouldn’t be assumed that once the right technology is in place, suitable information sharing will follow. Human nature can have a great deal of influence, good and bad, on how effective an IT system can be. With the enormous amount of information being exchanged, it is not possible to account for all of the unforeseen consequences of the expansion of information in use by today’s companies. Using computers to help individuals perform their jobs and tasks is one of the most important actions taken when implementing technology effectively. However, sometimes the result of this intervention is not successful at all and may even generate difficulties related to people participation in this process (De Souza Dias 1998). This paper will discuss a few of the human variables involved in the information technology equation. The first section of this paper will deal with senior management’s lack of understanding of the implementation process. The discussion will also include the characteristics of the IT professional. In the final section, training the end user will be discussed.…

    • 1655 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    • The company’s internet policy only allows use for business-related activity. However, Hennings vetoed the provision that management can review and access anything the employees created, stored, sent, or received via company equipment. The company, though, reserved the right to take disciplinary action, that includes possible termination, and to press criminal charges if an employee was found to have violated the policy.…

    • 1417 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Rio Grande Supply Company

    • 488 Words
    • 2 Pages

    Jasper Hennings, as the president of Rio Grande Supply Co., knew that a company’s top executives are responsible for determining an organization’s corporate culture. He took such personal pride in the culture of his Texas-based wholesale plumbing supply company. His management sets good examples by living by integrity, honesty, and respect for each individual employee. They were using internet for their personal purpose. The policy allowed for internet access is only for business related activities. But the management has the right to access to any one e-mail, and he has also installed new software to short cut the system. But things became serious, a female employee got fired by Henry Darger for having accessed another worker’s e-mail. But she found that Darger was logging to pornographic sites when he shuts his office door. The president was in problem because he didn’t want to loss Henry Dargen and wanted to treat him differently.…

    • 488 Words
    • 2 Pages
    Good Essays