Saturday, February 15, 2020

Conflicting Situation at Work Term Paper Example | Topics and Well Written Essays - 1250 words

Conflicting Situation at Work - Term Paper Example The need is to understand where it has crept up from and what related measures could be taken to avoid it in the first place (Boles, 2011). One such conflicting situation came about when recently one of the employees had a rift with his boss. This problem caused the entire department to lose focus for quite a while. Indeed this was getting into something big until the top management realized the gravity of the situation and intervened to bring to an end the entire issue. The amicable solution was found through understanding and logic which prevailed in entirety. The need was to discern where the two employees were doing just too much pushing and pulling, which was unthinkable on the part of the other employees and the management in essence. There was an air of suspicion which existed within the realms of these two employees who were not even on the same level. The conflicting situation came about when the boss ordered his subordinate to comply with his orders time and again. The subo rdinate did not agree with what the boss had to suggest and carried on with his own undertakings and tasks in the office. The result was very serious as it turned out to be. The two of them got into an argument and started to abuse one another for doing nothing all day long. The boss was surprised that the subordinate had the guts in him to get up to him and speak out loud and that too in front of just about everyone in the office. The actions that the management took under such settings were of dire consequence as it had to intercept within this quagmire which had developed with the passage of time. The senior bosses called these two employees who were essentially boss and subordinate, and thus worked in the same department. They were asked to give their side of the story and thus tell who of the two was wrong amongst them. It was obvious that both of them hurled claims on the other party to be labeled as the guilty one. This ended up in stalemate and both were ordered to leave the office within the shortest time since they were sentenced to two weeks suspensions. The problem was made bigger than it was in the beginning. The subordinate was very abusive and used to hurl slang language and jokes on the boss and the boss had found this out through other employees. The boss was also adamant that since he was senior to the subordinate, his say should have been more important. My perception was that this situation was not handled properly right from the onset. It meant that the employees were not being managed adequately well by the management domains. The need of the hour was such that the employees should have been apprised of the consequences before they indulged into one such rift. Their attitudes would have been better had they known what was in store for them and how they had to handle things in a proper manner. Sadly, this did not come about as such and there were problems for both of them as well as the employees who worked with them or around them in one or the other capacity. I believe that the boss would have let the human resource management department handle things on their own since this would have been the better thing to do in such a scenario. It would have served the cause of the two and taken into consideration the abuse factor which was raised by the subordinate that was simply unwanted and uncalled for (Harrison, 2006).  

Sunday, February 2, 2020

How you would attempt to keep a business from suffering a similar Essay

How you would attempt to keep a business from suffering a similar attack - Essay Example Key words Packet attack; juveniles; distributed denial of service (DDoS) What was Learned There is a lot that I have learned from the attack on grc.com. First of all, this attack was carried out by a 13 year old! He mentioned that together with his friends, he decided to attack the website following a â€Å"disparaging† remark that was made by the website in its newsgroup. Let me go back to my point. The logic here is not whether the attack was carried out by a group or an individual, but that a 13 year old was at the mastermind of the attack and even bragged about it. What I learned from this is that â€Å"internet terrorism† is no longer a preserve of college students or people aged 16 and above (as previously thought). Maybe the 13 year old kid and his friends are very good at computers, but that is also beside the point. The fact that they took time to learn how to design and launch packet attacks is very worrying indeed and must be looked into. Overall, what I lear ned from this is that there is a new breed of hackers in town. These new breed is aggressive, smart and, surprisingly, unapologetic. This calls for a revision of cyber terrorism combat strategies and techniques. What is also clear from the attack is that law enforcement agencies and authorities are not only ill-prepared but also poorly augmented to deal with the new class of hackers. For instance, the author reveals that when he approached the FBI after establishing that the individual who masterminded the attack was a 13 year old, he was met with the following responses: a) Until the damages done amounted to $5,000, no crime had been committed. That is the law. b) Even if the damages done amounted to $5,000 and a crime was deemed to have been committed, their staffs were not only swamped but also overloaded with cases concerning firms that had incurred huge monetary losses caused by internet/cyber crime. c) Considering that the chief suspect was just 13 years old, there was not muc h that could be done to him, even if the amount of evidence confirmed that the attacks were planned and orchestrated by him. The most that could happen was a chat between some agents and his parents at his place of residence. In essence, his youth gave him an impenetrable armor. This was a major discouragement of the costs likely to be incurred from any kind of investigation. These points prove my earlier assertion that law enforcement authorities and agencies (in this case the FBI) are not only ill-equipped but also poorly augmented to fight cybercrime that is perpetrated by juveniles. How I would Attempt to keep a Business from Suffering a similar Attack I would institute a number of effective measures to combat attacks similar to the one that was directed at grc.com. These measures include the following: Developing effective commands that will counter the possibility of suffering a similar attack. This will work by helping businesses verify that their systems are not infected by any of the existing IRC Zombie/Bots. Since all the IRC Zombie/Bots usually trigger and maintain static links to remote IRC chat servers anytime the host computer is connected to the internet (Yang & Wanlei 22). An active link/connection can be detected using the following command; netstat –an | find â€Å":6667†. Detection will pave way for termination. Encouraging businesses and firms to perform regular tests and checks that allow them to detect and consequently terminate harmful connections. Since IRC