Free Essay

Fyt Task 1

In: Computers and Technology

Submitted By cyberpete39
Words 2014
Pages 9
To: Private Investigators LLP
From: xxx
Date: xxx
Re: Cyber Security Analysis
This memorandum has been written to outline the current threats facing the XYZ Private Investigation LLP and possible mitigation steps for them. The Cyber Security Analysis was requested and approved by John Smith and the areas reviewed were the production server, client workstations and the web server. Each of these areas were carefully looked at, in some cases employee follow-ups were made to prior complaints and a derivative of the top five threats were documented.

The first area of concern is the production server used on a daily basis by your organization and contains vital information to your organization, as well as confidential and personal information about your clients. This server would be an attacker’s main target as it is the central location for data that could prove to be fruitful to an attacker. This area of concern was examined and the top five threats identified were virus protection, backdoor vulnerabilities, system updates and/or patching, physical security and logical security.

Production Server
The production server is generally a server that runs many crucial services for the daily operations of the network to include active directory and domain name services to name a few. Therefore by not having antivirus software on this system it can be a potential hazard to not only the services, by the data being stored here. Antivirus software today helps protect systems again malicious attacks by Worms, Viruses, and even Trojan’s. Users have complained about having issues with lag on a network, and even corrupt data, and pop-ups. This can all be caused by malicious code that could be mitigated with the use of antivirus.

The second threat is the possibility for backdoor vulnerabilities on the network. The production server should only run services that are needed by the organization. As well to add on to the threat of a virus this could be a potential add on. Attackers want to be able to gain access, and maintain it. In many cases organizations look at a convenience level of having services such as VPN and FTP available to its users, and it ends up being a gateway for attackers to get in. Therefore it is necessary to ensure that only the necessary services are running, and all others are disabled.

The third threat to the production server is the lack of system patching and software updates. In many cases staying up on software updates, and system patching is a very cumbersome task for system administrators. However, it is recommended that at least the security patches being released for your server’s operating system be performed. In many cases these updates improve performance, while mitigating industry recognized threats. Currently your server is not being updated and is a potential victim to simple threats that solutions have already been established for.

Physical security is a key concern for the placement of organizations servers. Currently the production server is out in the open for anyone to gain access to. Therefore the threat of someone introducing or removing data easily from the server is pretty high. Many organizations today find themselves combating internal threats just as much as external threats. A recommendation is to lock the server in a back room with minimal access. This will aid in mitigating physical threats, however don’t be fooled into believing that it will completely stopping this problem.

The last threat to the production server is logical security. This type of security includes user permissions and file share permissions. The security on your data over a network is only as good as the safeguards that are implemented. Permissions should be established to only allow users to access, or complete tasks at the level they are at. Administrator privileges should be narrowed done to only those individuals that need them. As well to protect data from being compromised file shares should be locked down, and users should only have access to the information they need to complete their job. In addition it as well helps to rotate job positions with administrative privileges to ensure that personnel do not easily have the capability to hide their tracks.

Upon an investigation of employee complaints, and concerns it was noted that workstations in the office do not have proper Antivirus protection, as well as firewall protection. This is essential to block the everyday user from being infected by going to websites, downloading infected files, or even opening maliciously embedded code in e-mails. In addition having firewall protection will allow for the blocking of IP spoofing, simple denial of services attacks, or even simple enumeration. It is recommended that an antivirus and firewall combination host based intrusion system be installed on the clients. It can either be a managed or unmanaged setup that will enable each of the workstations to be protected. Since these are the machines used daily these are the machines with the highest threat of an attacker gaining access into the company’s network.

Since in today’s era everyone communicates by E-mail and since it is a popular form of communications it has become a main stream target. Since your employees use e-mail to contact clients, and other organizations it is important to have Spam filters in place to aid in preventing phishing attempts from known sources. A phishing attempt allows an attacker to gain access about a company and even acquire confidential information. This can be prevented by implementing such things as a SPAM killer, or filter that is based on industry developed signatures and blocking common threats. This may not completely mitigate this issue but this and proper employee training can.

Users access to systems is vital on a daily basis, but the level of access should only be granted based on the users need to know. A user should only have access to the systems they need access to as well as only have the highest level of access as the position they sit in requires. Not all users should have local administrative privileges. This way the company can establish a baseline for each of the systems and maintain it. And if users need software installed it can be approved by the systems administrator. This will ensure that it is known to the company what are on its network, its computers, and if it is being updates to ensure it’s not a vulnerability. Currently any individual can download and install applications and this is vulnerability that can cause severe damage to network.

In reviewing the information retrieved from Mr. Smith and talking to employees in the company it was noted that the users do not have knowledge of the potential threats that they could aid in mitigating on a daily basis. It is recommended that the company developing a policy to what users can and cannot do on the network. This policy can also outline possible threats, and mitigation steps that can be easily implemented by the user. This will save on workstation down time, and small threats from developing into major problems. The workstations are only as secure as the personnel operating them, and the policies implemented.

The last threat that faces the workstations is the systems patches for the Operating Systems, and the software updates for applications currently installed on the workstation. It has been noted that users have installed programs as they see fit. Therefore there is no specific baseline for the systems, and no updates or patches have been applied. This can cause severe problems, or backdoors that attackers can utilize to gain access to the network. Such as using flaws in unpatched operating systems, or applications like Adobe reader which allows for micro joined applications to run when a document is opened. These threats can be easily mitigated if updates and patches were applied, and continually accomplished.

Like many organizations the XYZ Private Investigators LLP has a web presence that causes many potential threats. As well the convenience of access is usually the main disregard to proper safeguards of critical data, and network equipment. The first threat that is evident to the webserver is unsecured services. This was pretty evident for this analysis after the discovery of the webpage being hacked. Many services such as Telnet, FTP and SMTP are left unsecured and an attacker finds these openings and acquires data, defaces websites, and/or utilizes a mail server to send spam email from. Any of these attacks will cause the company to lose credibility, and being blacklisted by internet registrars. To mitigate these threats the services should be secured with username and passwords that are secure, no anonymous access, and concealing services by removing banners. These are a few steps that will aid in securing external access.

This company utilizes one server to act as both an internal access server and an external access server. It is not recommended to do this because it becomes a major target, that with a simple attack it could completely shut down core resources, or cause data loss. There are a few things that have been noticed with this threat. The first is web shares, which are unprotected and allow external access without authentication. Next is the factor that this server is not patched and has web services running on it. Therefore by utilizing faults in the IIS web engine an attacker could cripple this server and cause a denial of service to this company. It is recommended to separate the physical server, and the web server so that the potential threat of internal and external data from both being corrupted is minimized.

Boundary protection is a major need for this company. To have a server that is accessible by an external user needs to have a heightened level of protection. There should be a hardware firewall that has a DMZ setup in it to allow traffic that you want to access from the web, and from the local network. As well it should protect the local network from access from the outside world. This will mitigate an attacker from entering into local network and stealing confidential data that didn’t need to be on the web.

With any web based application it is noted that there is a level of security that must be maintained. It was noted that the webserver was hacked. As well it was explained that many users externally access the webserver through an application. In general most web applications use a backend database of sorts. Whether it by MS SQL or MYSQL for example the coding that links to these database should be evaluated, tested, and error checked. This will allow for the protection of threats such as SQL injection. This threat could potential give an attacker to gain usernames and passwords or even pull out data that should be confidential. Since a web presence is important to your organization it is recommend that you ensure that proper application implementation strategies are developed, and followed.

The last threat that was noted with the webserver and site is to ensure that system patching is done. Since you are running Microsoft IIS and this is a very vulnerable product it is recommended that you ensure patches are current and remain current. In addition to that if you are using third party web applications that you ensure that databases are updates, the application is updates, and any core services such as PHP and/or ASP engines are updated. This will allow for further avenues of mitigation of an attackers attempt to gain access to a web application or server.

The XYZ Private Investigation LLP is like many small companies today that where blind to the possibility of cyber threats ever causing them a problem. Well that couldn’t be more far from the truth. Every day with the need of technology becoming more prevalent so are the threats that arise. Therefore just taking a look at the threats outlined in this memo, and the possible mitigation steps your company will increase its cyber security by two fold, and maintain its vigilance.…...

Similar Documents

Free Essay

Task 1

...Task 2 Financial and Leadership Strengths and Weaknesses of the Utah Symphony The financial strengths of the Utah Symphony will now be addressed. One financial strength of the Symphony is the amount of endowments it receives. There are two groups, I and II, which receive endowments. The Utah symphony is in group II and that group gets an average of $8.8 Million per year (Delong & Ager, 2005, p. 4). Another major strength would be the amount of revenue brought in by performances. The 2000-2001 season saw revenue at over $3 million and the projected amount for the next season is over $4 million. The total amount between contribution, endowments, and revenue is over $12 million for the 2000-2001 season and is projected to be over $13 million for the next (Delong & Ager, 2005, p. 15). The financial weaknesses for the Symphony are almost as much as the strengths however. The major weakness in this organization is the salaries and benefits for the musicians. Because they are under contract, the musicians have a set salary with periodic increases. The expense for this is over $10 million (Delong & Ager, 2005, p. 15). This ends up being a huge expense and leaves very little in the way of profit. Another item that adds to the financial weakness is the fact that ticket prices are projected to only increase by 1% while expenses are expected to increase by at least 2.5% (Delong & Ager, 2005). With expenses increasing by a greater rate than income, this will have a detrimental effect...

Words: 3121 - Pages: 13

Premium Essay

Lit 1 Task 1

...LIT 1 Task 1 PART A Sole Proprietorship Sole Proprietorship is a business owned by one person, as distinguished from a partnership or Corporation. Sole proprietorship is a company, which is not registered with the state as a limited liability company or corporation. Some advantages of a sole proprietorship are that they have flexibility in operations. The sole proprietorship business is undertaken on a small scale. If any change is required in the operations, it is easy and quick to bring the changes. Another advantage in this type is the ease of promptness in decision-making, autonomy. When the decision is to be taken by one person, it is guaranteed to be quick. Thus, the entrepreneur, as a sole proprietor, can arrive at quick decisions concerning the business because he does not have to ask anybody else. There is only one person that makes decisions, therefore, there is no other to criticize, or challenge a decision made. A third advantage is the simplicity of the business. Because of this, it is the most common type of business entity. The only difficulty of this business type is obtaining licenses and permits in the state of operation. If the business will be run under a different name than that of the individual who owns it, a separate special certificate must be filed. Sole Gain is seen as a highly ranked advantage because all revenue goes back to the single investor, the entrepreneur. There are no shareholders to declare dividends. The primary advantage for a...

Words: 1754 - Pages: 8

Premium Essay

Task 1

...The main thing to consider in all of these aspects would be the trends in healthcare. What are other organizations doing? This summary will take a look at the advantages and disadvantages of building, leasing or renting a new facility for the orthopedic line at Trinity Community Hospital. Hospital construction, like most other construction, continues to struggle to recover from the years of economic hardship. Advantages 1. Building- 5,000 sq. feet PT center- $120 per sq. foot- $600,000 The facility would be new and the hospital would have complete control over the design of the expansion. This would give us access the also make modification without approval from any outside parties. With this process the hospital would be able to make energy efficient modifications that might be present in the current facility. These processes would be able to save the hospital on operating cost and set a leading role for healthcare facilities that are going “green”. Building a new facility would help increase in value which would also in turn increase the equity of the hospital. The hospital will also have the ability of leasing any extra space which would build revenue. 2. Leasing- 5000 sq. foot MOB adjacent to hospital-$20 per sq. foot With leasing, the hospital would not have to risk any investment losses that might occur when building or buying a facility. ***One major advantage to this is that there is not as much cash needed up front in order to occupy the space. ......

Words: 773 - Pages: 4

Premium Essay

Task 1

...Business Research Report Title Presented to: Assessment Code: RWT1 Student Name: Student ID: Date: Mentor Name: Table of Contents Executive Summary 3 Introduction 4 Research Findings 4 Finding Number 1 4 Finding Number 2 5 Finding Number 3 5 Recommendations 5 Conclusion 6 References 7 Executive Summary Task instruction: Prepare a business report based on your research findings that includes: 3. Executive summary (suggested length of 1 page) that overviews the purpose of this report. The executive summary should be the last section you write after the remainder of the report is completed. The executive summary is a mini-version of your paper and should not exceed one page. For information about executive summaries, please refer to the study materials. Please note that your executive summary, and your paper, should be written using single spaced text. Introduction Task instruction: Prepare a business report based on your research findings that includes: 4. Introduction (suggested length of 1 page) that will: a. Introduce the subject and purpose of the report; b. Preview the main ideas of the report; c. Establish your relationship to the audience. It is recommended that you use single spaced text as you see here. Regarding item 4c, please keep in mind that your relationship with the audience will come from the scenario you selected from the topic list. In some cases your position is specified. In others you will need to define......

Words: 1226 - Pages: 5

Premium Essay

Task 1

...A. Profit maximization is the act of seeking 1. Total revenue = income generated by business Total cost = fixed costs + marginal costs Accounting profit from this standpoint is total revenue – the total cost = profit. Profit maximization from this standpoint is quite simply increasing your profit to as high a level as possible. 2. Marginal cost is the extra cost incurred per additional unit of product Marginal revenue is the extra revenue generated per additional unit of product A firm looking for profit maximization from the marginal revenue to marginal cost perspective is going to find the intersecting point between marginal revenue and marginal cost. Profit maximization occurs when marginal revenue equals zero but never below. B. Marginal revenue is the extra revenue that is added for every unit of output that is added. For Company A, marginal revenue follows a steady decrease as additional units are added. C. Marginal cost is calculated as additional costs that are incurred for each additional unit of output that is added. For Company A, marginal cost follows a steady increase as additional units are added. D. Company A can reach profit maximization when they produce 8 units of product. It is at this point that marginal cost and marginal revenue intersect and they are able to attain the highest level of profit. E. If marginal revenue is greater than marginal cost then output should be increased until they are equal F. Subsequently, if marginal cost is...

Words: 271 - Pages: 2

Premium Essay

Egt 1 Task 1

...EGT 1 Task 1 A. 1. The profit maximization approach used when total revenue and total cost are compared is the largest positive gap or profit gained between total revenue less total cost. In the table provided the largest profit or profit maximization would be $540. When you produce 8 items profit is at its highest point. To calculate total revenue you take the price times the quantity and to calculate total cost you take the sum of variable and fixed costs. 2. The profit maximization approach used when marginal revenue and marginal cost are compared is to take the marginal revenue less the marginal cost. In this process you look at how each additional unit affects total revenue and total cost. Marginal revenue is equal to the change of total revenue divided by change in quantity and Marginal cost is equal to the change in total cost divided by change in quantity. Once marginal cost exceeds marginal revenue it is not effective to produce the product and there is no longer a profit maximization. The profit maximization approach when using marginal revenue and marginal cost is to make as many products as you can until marginal cost equals marginal revenue. B. 1. Marginal revenue it the change in total revenue divided by the change in quantity. To get total revenue so that you can calculate marginal revenue you need to take the price times quantity less total cost. Marginal revenue becomes elastic and stays constant when there is perfect competition. But marginal revenue usually...

Words: 883 - Pages: 4

Free Essay

Task 1

...JDT2 Task 2 | The Business of Ethics | | | | JDT2 Task 2 The Business of Ethics * Metal whistle contains small traces of lead. * Primary market: Elementary schools. * Large shipment to be shipped to South America by week’s end. * Cost to reproduce and repackage toy collection, $100,000. The Business of Ethics * Metal whistle contains small traces of lead. * Primary market: Elementary schools. * Large shipment to be shipped to South America by week’s end. * Cost to reproduce and repackage toy collection, $100,000. The Business of Ethics Metal Whistles in Elementary School Toy Collection Recently, it has been discovered that the toy collection that is planned to be sent at week’s end to elementary schools in South America, did not pass U.S. satisfactory limits for children ages 7 and younger due to the metal whistle included in the toy collection containing small traces of lead. Listed below are three possible alternatives that have been identified to address the whistle problem. 1. Replace the metal whistle with a plastic whistle. 2. Find an alternative toy, i.e. flash cards, rubber ball, stickers to replace the metal whistle. 3. Remove the metal whistle from the toy collection. The Utilitarian Method was used for selecting the alternatives, as this method evaluates an act in the nomenclatures of consequences or outcomes. It endeavors to accomplish the maximum good for the maximum amount while......

Words: 1623 - Pages: 7

Free Essay

Qlt 1 Task 1

...Mike Henkle QLT1 Task 5 Western Governors University A. Create a story problem using one of the above real-world scenarios as a basis, including realistic numeric values, by doing the following: 1. Describe the real-world problem. I was looking into phone plans and stumbled upon T-Mobile, and I decided that I needed a cell-phone and took a look at the plans. T-mobile had one plan that was 50 dollars a month and is unlimited talk, text and web, T-Mobile also has a plan for 30 dollars a month for 1,500 talk and text minutes. After you go through your allotted 1,500 talk and text time was up, the cost skyrockets up to 10 cents a minute. 10 cents a minute comes out to 6.00 per hour, I thought in my head. I decided that instead of jumping into a decision about phone plans, that I should first go home and do the math. I wanted to figure out which plan was going to be the most cost effective, and which plan would suite my needs the best. 2. Explain all needs (e.g., financial, non-financial, situational) of the hypothetical consumer. The needs include many different factors: • The first and most important factor how much do you use your phone? The breaking point on the problem today is 200 talk or text above the 1500 minute plan and I will be paying less up front but more on the back end which is no good. If I chose the 1500 minute plan, I will not want to be going over the 1500 minutes as then the cost would go up to 10......

Words: 1163 - Pages: 5

Premium Essay

Edp 1 Task 1

...Running Head: Children's Literature Task 1 1 Children;s Literature Task 1 Arthur Carroll Western Governor's University Children's Literature Task 1 2 Children's Literature Task 1 It is well known that the world is filled to the brim with a rich history in athletics, education, science, politics, and the arts. What is not common knowledge is the history and richness of children's literature and how it eventually became what it is today. Just like most things, what we now know as children's literature is nothing like what it was originally, it has transformed into something else entirely. Nonetheless, it has as colorful a history as it does some of it's own books. Before children's literature was ever even written down it was given to children in a less tangible way; orally. Prior to publishers like Scholastic and Golden Books existence, the technology to write books was long and tedious, especially if the author was trying to make many copies. So instead, children's literature was told out loud where many could hear it at once and the time factor for preparation was at a minimum. Once authors had better technology to help simplify the process of physical writing, oral literature transformed into written literature. It wasn't always computers or even typewriters though, written used to literally mean written. Like the transformation from mouth to pen, pen evolved to......

Words: 882 - Pages: 4

Premium Essay

Task 1 a

...Risk Management: Task 1A Dave Christian Western Governors University Author Note Research conducted by Dave Christian, College of Business, Western Governors University. Dave Christian is now founder at Helpology. This paper is referenced as an American Psychological Association (APA) research paper template available for free, worldwide use at Helpology ( categorized under: Helpology Lifelist/Respect/Writing/FREE Helpology APA. Correspondence concerning this paper should be addressed to Dave Christian, Founder, Helpology, 2340 E. University Dr., Lot 85, Tempe, AZ 85281; Phone: (480) 331-9631; Email:; Web site: Risk Management: Task 1A One of the world's wealthiest investors of all time, Warren Buffett (n.d.), said, "Risk comes from not knowing what you're doing." Furthermore, "Denial is a common tactic that substitutes deliberate ignorance for thoughtful planning," said risk management author Charles Tremper (n.d.). As a newly hired consultant, we have been tasked with the duties of creating and presenting a risk management/business contingency plan for our first client. The legal department and the IT department have both expressed concerns regarding the ethical use and protection of sensitive data, customer records, and other information systems content. In the interest of creating confidence and job satisfaction in this new position, our new employer has decided to let us select our first......

Words: 3363 - Pages: 14

Premium Essay

Rtt 1 Task 1

...RTT 1 Task 1 Marci Berry Western Governors University RTT 1 Task 1 Many factors come into play when determining what contributes to quality care of patients in a healthcare setting. The use of nursing sensitive indicators assists healthcare workers in providing the highest quality of care possible to their patients. When these indicators are used, and followed by those providing care, higher standards are met, allowing for patients to receive a much higher quality of care while being involved in the healthcare system. A. Nursing Sensitive Indicators By learning and understanding nursing sensitive indicators, a nurse is given the opportunity to identify factors that may affect the quality of care being delivered to a patient. In the scenario given, Mr J., a 72-year-old rabbi with dementia, has fractured a hip following a fall in his home. He has been given pain medications, which have made him sleepy, but he is still able to communicate effectively. Mr J’s daughter has come to visit, and found him lying in his bed, on his back, restrained. The first nursing sensitive indicator that could be implemented by the nursing staff is regarding the use of restraints. The use of restraints in this case is most likely unnecessary. Although the patient has previously been diagnosed with dementia, he is able to recognize his daughter upon her arrival, and notify her of his need to use the restroom. Regarding the use of restraints, patient restraint should be considered......

Words: 1104 - Pages: 5

Premium Essay

Task 1 over 75k people (Walmart, 2014). Walmart and Sam’s club have been able to produce large warehouse type stores in 4203 locations in the US alone and 6107 outside the US in countries like: Brazil, Argentina, Canada, Chile, China, India, Japan and Mexico. (Walmart 10-K) They have truly become a worldwide company. But what about those people who aren’t near a Walmart…there is an online store that a person can access. Most of Walmart’s products are available on their online store and they offer free shipping on orders over $50 (Alaska and Hawaii excluded). One of the things that are often overlooked when discussing Place, is how that place will be ran. Walmart and Sam’s Club employs over 2.1 Million people throughout their company and 1% of the total workforce in the US (Business Insider, 2014) Price Here is the number one topic that people immediately think about when they go shopping…what is it going to cost me? When a business sells a product they have to think, “What is the product worth to their customers?” Walmart has successfully come up with a great marketing strategy that would have put all the other businesses out of work if they didn’t do the same, they even implemented in into their Sam’s club stores. In 2004, Walmart introduced “Price match guarantee”. Walmart and Sam’s would match any advertised price from their competitors. This completely changed the way that they had to price their products. Instead of having a research team research each......

Words: 3131 - Pages: 13

Premium Essay

Task 1

...sources, such as focus groups with older adults and/or youth, epidemiological data from the health department or department of vital statistics, investigations of community resources from stakeholders or faith-based organizations, and/or surveys. You do not have to answer every question listed in the assessment tools. Each of these tools can be found either in the web links section or as an attachment to this task.  •   Population Economic Status Assessment•   Neighborhood/Community Safety Inventory•   Cultural Assessment Tool•   Disaster Assessment and Planning Guide•   Windshield Survey•   Population Health Scavenger Hunt Note: The name of each of the six tools should be identified in the needs assessment summary, along with a brief summary of how each of the six tools was used in the needs assessment. 1.  Interpret the collected data using concepts of epidemiology and health determinants (e.g., birth rate, death rate, rates of disease, morbidity). C.  Formulate an appropriate community diagnosis for the selected community by doing the following (suggested length of 4–6 pages):1.  Identify the top three problems for the selected community based on the Healthy People 2020 goals.a.  Discuss the problems in relation to the Healthy People 2020 goals.2.  Select one of the problems identified in part C1 that you would like to investigate further, and do the following:a.  Discuss community resources (e.g., Public Health Department, American Red Cross, American Heart) that are......

Words: 648 - Pages: 3

Free Essay

Task 1

...1. Bill Bailey could use Maslow’s theory of motivation in order to show support of the merger by appealing to people’s most pressing needs within the Utah Opera Organization. (Krietner, 2010) People ultimately react in a way that serves their own needs and aspirations. Bill Bailey would need to tap into those needs in order to make sure the merger goes as smoothly as possible. The first need that would have to be satisfied would be the physiological which would include hunger and sleep. In this setting Bill Bailey would need to make sure that these people had sufficient wages to live on and would continue to be working in acceptable conditions. Once this need has been met an individual would then be concerned with their safety and security. The staff of the Utah Opera Organization would need to know that their jobs were safe and would not be lost in the merger. If there is a constant threat of job loss the staff is under a lot of stress to try and maintain their position in the company. The next concern would be an individual’s sense of belonging. They would want to know that they will still belong to the group and were accepted in the group. If the merger were to take place I believe it would be important to let the staff know about the merger and all what would be taking place as the merger progressed. After the staff has a feeling of belonging they will be motivated by a desire for esteem. They would need to feel and be recognized that they have some value. ......

Words: 1396 - Pages: 6

Free Essay

Task 1

...Utah Opera & Symphony Merger JFT2 Organizational Management ~ Task 1 Western Governors University January 22, 2012 THEORY OF MOTIVATION In order to support the merger, Bill Bailey needs to address his subordinates with the merger in a supportive way. The Utah Opera Organization and the Utah Symphony are both dealing with surmountable obstacles in regards to the survival of the arts. It would be beneficial in the long run, for the future of the arts to stand as one mighty organization rather than two separate entities. There has always been strength in numbers. Bill Bailey can support the merger using McClellard’s Need Theory. The merger will give the Opera a chance to overcome their current issues with finances and production. The need for achievement which indicates a desire to accomplish something difficult is a prime example of why the merger should be supported. (Kreitner, 2008). The Opera is under pending stress and without the merger the Opera may not survive in the long run. With the merger the Opera will have a better chance of success and achievement. The merger will also increase the affiliations the Opera currently has. Social relationships are fundamental for the success of the merge. These relationships will help ensure the future success of the merge. The merger also brings the opportunity to teach and encourage each member from the other company. The merge will bring new goals to help achieve optimal success. ......

Words: 1340 - Pages: 6

Amazon Germany Buy Movies onDVD & Blu-ray | Policier | Донал Лог