Preview

Case Study - Living Large

Satisfactory Essays
Open Document
Open Document
337 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study - Living Large
Principles of Management I – A
-------------------------------------------------
Case 1

Summary of Case 1:

Managing the Virus Hunters

The employees of Syntamec Corporation are never able to enjoy a finished product, because their work never stops. Their job is to constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computer. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that need to be disposed of.
Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread put through months compared to how it is now. Nowadays there are about 20,000 viruses monthly, so more talented employees around the world work for Symantec, coming from Iceland, Hungary, USA, etc. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they found someone who does, they would hire him or her no matter in what country they’re from.
A virus named the Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees that were more talented so that they can fix this sort of problem. Now, each employee has their own job according to their specialization; some people responds to new security threats, some write research papers, some develop tools that will be used to fight viruses, and some find out about the virus.
The work in Symantec never stops. Since Symantec’s lab is located in Santa Monica, Dublin, and Tokyo, once the shift in Santa Monica is over, the work continues in Tokyo and after that in Dublin and then back in Santa Monica for 24 hours non-stop. Vincent Weafer goal is to have a predictable and well-defined process for dealing with the virus threats that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Robert Jones Unit 8 Discussion: John Motorcycle Parts 8/5/2014 IS3110 Mr. Jackson Risk Assessment Plan Performed for John Motorcycle Parts Co. Risks: 1. Identify risks and problems with security plan 2. 5 things to go wrong without Biz Continuity Plan Disaster Recovery Plan. 3. List five risks to be addressed I. Identification of risks and problems:…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Malicious software is written with the intent to damage or infect the system of Richman Investment. Malicious code or software is a threat to any internet-connected device or computer. The main goal of the attack is to affect one of the three information security properties which are Confidentiality,…

    • 932 Words
    • 4 Pages
    Better Essays
  • Better Essays

    best practices must be documented. Education of Users and IT staff helps to reduce the…

    • 885 Words
    • 4 Pages
    Better Essays
  • Good Essays

    unit 21 p2

    • 575 Words
    • 2 Pages

    Vitamins are divided into two groups: water soluble vitamins and fat soluble vitamins. Water soluble vitamins are vitamins B and C; these need regular replacement in the body. Whereas, fat soluble vitamins get stored in the liver and fat tissues and are used more slowly, these vitamins are A, D, E and K.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    At the start of December the teacher asked me to design a display which embodied the spirit of the Nativity Story. The display was to be situated on the board above the pegs where the children hang their coats. It was to be put here so that it can be instantly noticed by parents/carers, the children and all visitors to the classroom.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Since 1912 Lockheed-Martin was a concept derived from Glenn Martin with the design of his first airplane in collaboration with the founder of Alco Hydro-Aeroplane Company Malcolm Lockheed (Our History, 2017). The merger between Martin and Lockheed formed the well-known aerospace company Lockheed-Aircraft Company which is currently Lockheed-Martin. However, Lockheed-Martin evolved into a contractor for the U.S. defense in technology and security. Thus, making them extremely vulnerable to outside cyber-attacks and novice 'hackers.' Unfortunately, by 2011 a cyber-attack and Lockheed targeted the company reported no damage to the security.…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    - Free antivirus software (for example Avast) are a big threat for traditional IT security companies.…

    • 872 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    According to the Time.com article "Anne-Marie Slaughter: The National Security Issues No One is Talking About", Slaughter and Weingarten state that, "Cybersecurity is the intersection of technology and national security, the place where we define the policies, systems and practices that keep us and our information secure both on and offline" (Slaughter and Weingarten). This quote means that cybersecurity makes sure that users stay safe whether they are online or not. The jobs that cybersecurity have are web developer, database administrator, programmer, and many more. The purpose of these jobs is not just creating software, but also helping businesses solve problems.…

    • 822 Words
    • 4 Pages
    Good Essays

Related Topics