Preview

Management Information Systems

Better Essays
Open Document
Open Document
1828 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Management Information Systems
MGMT305 - Unit 5 Individual Project Week 5- Case Studies Chasity Fenn American Intercontinental University
October , 2011

ABSTRACT This paper will discuss the questions asked about the four different case studies we are to read this week. The case studies are When antivirus software cripples your computers, How secure is the cloud, Are electronic medical records a cure for heath care, and JetBlue and WestJet: A tale of two IS projects (Laudon & Laudon, 2012, pgs 304, 321, 522 & 556).

WEEK 5 CASE STUDIES
WHEN ANTIVIRUS SOFTWARE CRIPPLES YOUR COMPUTERS There are a few reasons why McAfee’s antivirus software created so many problems for their users. First, when test simulations were done, management did not run these tests for Windows XP, with service pack 3, users using the McAfee VirusScan version 8.7 (Laudon & Laudon, 2012, p. 304). Most McAfee users of VirusScan were using Windows XP service pack 3 and the VirusScan version 8.7, these were the individuals most affected by this faulty update download. The update for VirusScan was intended to deal with the new virus ‘W32/wecorl.a’. However, it was not known that this virus could make itself appear as the name svchost.exe, which is a Windows file that is critical to PC’s performance (Laudon & Laudon, 2012, p. 304). It was also the slipup of the company to not detect this problem sooner. There was such a high demand for faster antivirus updates that lead to this slipup. The impact on the company, because of this software malfunction, was very damaging to the company. Their reputation with their customers was damaged, but it is not stated how bad it was or if McAfee lost customers or revenue. The impact on their customers, however, was very bad. Customer’s computers would not boot up properly and they were not able to access files or networks. Once there was a resolution to fix the problem, each computer had to be accessed one by one. Another big problem McAfee encountered was



References: Laudon, K. C., & Laudon, J. P. (2012). Management information systems: managing the digital firm (12th Ed). Upper Saddle River, NJ: Pearson Prentice Hall

You May Also Find These Documents Helpful

  • Best Essays

    Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital firm (12th ed.).…

    • 3836 Words
    • 16 Pages
    Best Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    1. On average, private sector IT projects underestimated budget and delivery time of systems by ________ percent.…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Surprisingly there were a large amount of threats in house that took advantage of software issue’s and exploited them. More than likely sold the info to outside source to further continue hacking and establishing a backdoor it the database.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The idea of having independent anti-virus software installation on all workstations and servers, however, a host based detection system on corporate office servers. The hardware at the corporate level server lack of a firewall protection creates vulnerabilities to:…

    • 1104 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Good Essays

    What was the business impact of this software problem, both for McAfee and for its customer?…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Closing Case 7.2

    • 275 Words
    • 2 Pages

    a. I think McAfee handled the situation very well but more could have been done to resolve the problem. It was a smart move for her to add postings about the updated disaster on the web and under the frequently asked questions section. Two days is a quick recovery time and big businesses were able to get back on track quickly. As for the smaller businesses, it took several days it was still not too bad, but we as group think that McAfee could have made a formal announcement, which could have reached smaller businesses a lot quicker. Rather than just uploading the solution notifications should have been made. Another solution we think could have been done is rather than just writing the solution a file could have been uploaded on their website that would make it easier to fix the problem.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risks of Macros

    • 300 Words
    • 2 Pages

    A security service ran by Carnegie Mellon in 1999 alerted Microsoft Office of a major security oversight. It was found from a macros virus people were using in Microsoft. “Since the 1999 incident Microsoft has made provisions to lower the risk of anymore problems. So needless to say it is important that the user be educated in the precautions that Microsoft has taken in keeping the user computer safe. Educating the user will not only let the user know why these security measures are needed. Like in Microsoft 2007 and newer the extension in the file name is added security for the user and the Microsoft program to identify trusted macro enabled file ("Excel Macro Security", 2012). Also the user will know not to enabled or disable certain security settings” (rns2undone)…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Laudon, K. C., & Laudon, J. P. (2010). Management information systems: Managing the digital firm. Upper Saddle River, NJ: Pearson Prentice Hall.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    While reviewing the recent threats on the McAfee website, the Trojan picked was RDN/Generic Dropper!uw!27358B83E748. This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc. The indication of having this infection would mean your machine would have the files, registry, and network communication referenced in the characteristics section of the Trojan’s profile page at mcafee.com. Use the following steps for removing the Trojan from the system: 1) Disable Windows System Restore. 2) Update your McAfee Anti-Virus product to the latest version (when possible), and ensure the latest DAT and Engine and any applicable EXTRA.DATs are installed. 3) Run a full system scan. (On-Demand Scan) 4) Reboot, as soon as it is convenient, to ensure all malicious components are removed.…

    • 463 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her.…

    • 971 Words
    • 4 Pages
    Good Essays