StudentShare solutions
Triangle menu

Responding to Memo - Essay Example

Nobody downloaded yet
The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000.
Attacks which exploit security holes in hardware and software systems are quite common. Apart from the above described incident, the company was subjected to a second attack as a direct outcome of a security hole in its Cisco IOS router. This, the most popular corporate router, had a serious security flaw which the company only identified after the release of the router and even then did not inform users about (Zetter, 2006). Consequently, our company, just like countless others was attacked through this security hole.
In the second place, our identity renders us the target of attacks. It is unlikely that any hacker would deliberately target your daughter's computer and infect it with a Trojan Horse but where we are concerned, the issue is quite different. As a profit-making organization, we represent potentially financially lucrative information (Rhodes-Ousley, Bragg, and Strassberg, 2003). We are targeted by professional hackers who seek out security flaws in our system for the explicit purpose of infecting us, either in order to access our data or to bring our networks to a halt (Rhodes-Ousley, Bragg, and Strassberg, 2003).
The fact of the matter is that our department has protected our networks as much as is possible. The fact that we send out malware alerts or often engage in the cleaning up of the system is quite simply because we cannot afford any viruses on our networks. Malware could undermine the integrity of our data and, therefore, we often resort to the exercise of extreme precaution. Indeed, it is quite probable that your daughter's computer has some malware on it but that she is not able to identify it. We, on the other hand, identify and remove all malware.
Lastly, Windows OS is ore vulnerable to malware than is Macintosh OS. This is because of security holes in the latter which are not present in the former and because hackers target Windows much more than they do Macintosh (Rhodes-Ousley, Bragg, and Strassberg, 2003). Migrating to Macintosh, however, is not an option both because it would be too costly and because it does not have the software range that we need.



To: Salamanika Giorgiopolis, Corporate Counsel
From: CISO
Date: 05/18/2007
Re: Peer to Peer and Piracy

Irrespective of the popularity of Peer to Peer Networks and regardless of the fact that everyone is doing it,' company employees are explicitly prohibited from running P2P programs on company computers or from using the company's network connection to download files through these programs. Apart from the aforementioned being explicitly forbidden under company policies and regulations, it comprises an immoral and illegal violation of copyright laws which the company is not going to abide by.
Copyright laws are very precise, leaving little room for manoeuvring or interpretation. As Paradise (1999) clarifies, this body of legislature, determines the fortification of ...Show more
Cite this document
  • APA
  • MLA
(“Responding to Memo Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from
(Responding to Memo Essay Example | Topics and Well Written Essays - 2000 Words)
“Responding to Memo Essay Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times


I'd like to begin by clarifying that there are two reasons for our susceptibility to malicious software. The first is the presence of holes and security vulnerabilities in both our operating system and our hardware. The second is the very nature of our identity as a profit-making company…
Responding to Memo
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Responding to Memo"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Videocy findings memo
The repeated critical reading of your article exposed both its areas of strength and weakness. It is advisable that this article be rewritten with the objective of
4 pages (1000 words) Essay
2. People think that if a regulation exists creating few problems, it should be maintained. A revision should actually take place and it should be analyzed. When nitrates were kept in meat, less people died. If that regulation did not get an analysis, problems
1 pages (250 words) Essay
The manual covers all the steps that are required to be taken to use this audio device. The technical guide writer has ensured that al the important information is provided through the manual and the information provided is most frequently asked by
1 pages (250 words) Essay
Presently, the business division incurs a considerable cost on trash emptying service, which is performed by janitorial staffs who on weekly basis usually pick the trash from the
2 pages (500 words) Essay
The author states that the major aim of contract manufacturing is to save costs, but goes ahead to illustrate that this is only achieved when certain principles of maintaining good
1 pages (250 words) Essay
The memo incorporates the general scope of human resource management and the company’s operations in making its products, productivity applications. The
3 pages (750 words) Essay
3. Of course, the clarity and the readability of this memo could be improved a lot. First, the introduction would be made more detailed to give a brief summary of the entire research. Besides, all the findings
1 pages (250 words) Essay
Being under influence at work negatively impacts effectiveness and productivity of the organization. Random drug screening is a good solution aimed at controlling the way each employee follows ethical guidelines of the company. Screening appointment
1 pages (250 words) Essay
Memo 6 M
Clinton analyzes the roll call voting that is done by the 106th congress to determine the relationship between the constituents and their representatives. The outcome of this research confirms that legislators do not stand for their constituents. This is because the multi-party
1 pages (250 words) Essay
As such, she understands every aspect of the project. All she needs to know in this context is the effects the detour is likely to have on the local communities. She, therefore, demands an exhaustive analysis of the local Indonesian
1 pages (250 words) Essay
Comments (0)
Click to create a comment
Let us find you another Essay on topic Responding to Memo for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us