question from professor module 1.1

Question from professor

 

“. WITH THE NURSING TUTORS TODAY AND GET AN AMAZING DISCOUNT”

 

“Are you looking for this answer? We can Help click Order Now”


help with a 250 word discussion no plagiarized work

A) Write a 250 words discussion on the below question with proper citations in MS word. Indicate at least one source or reference.

QUESTION:

How can one distinguish between an organizational weakness and a threat to the organization?

B) In a separate word document, please write responses to the below two posts in your own words.

1) Differentiating between organizational weaknesses and threats to the organization (written by Rajeshwari Karadi)

A threat refers to an unfavorable condition that has the potential of impacting the organization negatively. It can be external forces or barriers that could hurt the operations and strategic goals of the organization. An example of a threat could be an entry of a new competitor in the market who could have better performance or products that the current organization (Robson, 2015). This can affect the sales and revenue for the current organization.

An organizational weakness refers to internal faults or limitations that hinder the achievement of the organizational goals, revenue generation, or successful competition, and they emanate from the way the organization is being run. Weaknesses focus on the organizations’ vulnerability, and they are negative factors that shift the strengths of the organization. This happens when the organization focuses on its inefficiencies and gaps in technology, finances, or skills that would impact on its success. For instance, the lack of enough resources to sponsor research and development makes it impossible for the organization to upgrade its products and services to compete with those of the competitors (Robson, 2015). Unsuitable location is one of the significant weaknesses which harms the cost of operations for the organization.

One of the cures to reduce organizational weaknesses is a complete overhaul or restructuring the business or increasing investment by the company. For instance, the organization should increase its funding for research and development to match the ever-changing technology, or to relocate to where its consumers are located. To identify the organizational weaknesses, the organization must, first of all, identify the areas that require attention or improvements and analyze the available opportunities for development. The management must find out how their organizations receive and respond to feedback from their customers, and how it compares with their competitors,

Threats mostly originate from the change in the target audience, government regulations, political situation, and marketing or economic trends. The organization should carry out some marketing research to identify the economic trends and their impact, so it has to recognize the financial threats that may face the organization. Some of the marketing trends that may pose a threat to the organization include a new pattern and an increase in competition, which could affect the business (Helms & Nixon, 2010). Besides, changes in the target audience and government regulations can also pose a threat to the organization.

2) Written by Vamshidhar Adla

Each organization is handling the analysis on strength, weakness and opportunity, threat. Here our discussion is about weaknesses and threats and how the organization manages and what are the main differences between them. For the development and situations it helps in all the strategic plan and decision making. These are really useful for the original business and industry. They are both equal and grateful when the work continues. Everywhere in development, personal growth has weaknesses and threats, but especially in companies, various comparison techniques are used that determine situations using various methodologies. Here the level of the different operations. Every organization is doing perspective analysis when we have to use it. To explore the possibilities and all the effects occur for problems to solutions. They make decisions about all the initiative and all the opportunities when achieving the success that determines as the turning point. Strength and weaknesses reveal according to priorities that you can (Pirson, M., & Malhotra, D. (2011)) .

Mainly adjustment occurs in program refinement planning and any new threat closes the path once it exists. As common factors internally, weakness is part of it and externally, opportunity and threats are also part. You have to remember where the positive force, the impact created as all potential problems recognize by possible direction. For any type of organization, there are both positive and negative aspects. The negatives are the threats of weakness and all restrictions and small challenges are not favoured. This explains the overall picture of the organization’s environment. In addition, we have a detailed management plan. Here opportunity weakness strategies can be overcome with the advantage of opportunities. The threats mentioned are also the same, but the difference we can find in the use of strengths to avoid threats. These minimize weakness and avoid threats (Westrum, R. (2017)).

 

Submit Your Assignment and get professional help from our qualified experts!


help with a 250 word discussion no plagiarized work was first posted on July 23, 2020 at 7:18 am.
©2019 "Submit Your Assignment". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@nursingessayswriters.com

 

“Are you looking for this answer? We can Help click Order Now”


hls 2301 unit ii 1

must be 700 words, 12 point times new Roman, double spaced, apa format, title and reference page required(they don’t count to the 700 word requirement)

 

Submit Your Assignment and get professional help from our qualified experts!


hls 2301 unit ii 1 was first posted on July 23, 2020 at 7:40 am.
©2019 "Submit Your Assignment". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@nursingessayswriters.com

 

“Are you looking for this answer? We can Help click Order Now”


responds to the discussion post below in 200 words

Cyber terrorism is a persistent and global threat that PBI-FS must prepare for the inevitability of being targeted by a domestic or foreign cyber adversary. Since the world is connected through digital technology, you can no longer rely on local area or regional threat intelligence when planning security and countermeasure strategy against cyber-criminal activity and/or cyber terrorism. Moreover, PBI-FS is operating on foreign soil with past ties to criminal activities which puts them at even greater risk. There are several agencies, forums, and Cyber Threat Intelligence (CTI) communities such as Financial Services Information Sharing and Analysis Centers (FS-ISACs), Information Sharing and Analysis Organizations (ISAOs), and the Cybersecurity and Infrastructure Agency (CISA) for current Intel on cyber terrorism and emerging cyber threats. In addition, PBI should invest in becoming a member of one more of these organizations to stay ahead of all of the threats and additional risk factors that are common to the financial industry. Per CISA (2014), “Large-scale power outages, recent natural disasters, and an increase in the number and sophistication of cyberattacks demonstrate the wide range of potential risks facing the sector”. By collecting and analyzing the data from multiple sources, PBI-FS can strategically plan its cyber defense countermeasures against the threat of cyber terrorism.

With that being said, cyber terrorism is defined the act or “means to damage information, computer systems and data that result in harm against non-combatant targets which can be motivated or inspired by a religious, cultural, social, economic and political agenda” (Littlefield, 2017). It is closely related to “hactivism” but can be purely financially motivated with other factors aforementioned as added justification as in the case of North Korea and ISIS based hackers. More specifically, a recent Cyber Alert (AA20-106A) by CISA provides guidance on a real ongoing threat to the global financial sector by North Korea. PBI-FS is a prime candidate to exploit as it has the qualities or characteristics (US power/considered Infidels) that make it a justifiable target by the aforementioned cyber terrorist organizations.

The Democratic People’s Republic of Korea (DPRK) or North Korea poses several threats to US based interests abroad. Some of the threats that DPRK (cyber terrorism) poses to PBI-FS as reported in CTI briefs and forums is through the use of Malware, Denial of Service, Ransomware and other tactics to disrupt operations or steal data and funds. Moreover, “The DPRK’s malicious cyber activities threaten the United States and the broader international community and, in particular, pose a significant threat to the integrity and stability of the international financial system” (CISA, 2014). As the former IBS business was involved in money laundering involving cryptocurrencies it is important to note that DPRK is infamous for the use of “cryptojacking”, “cyber-enabled financial theft” and a “digital currency exchange hack” that stole over $250 million dollars (CISA, 2014) per the CISA Alert (AA20-106A).

PBI-FS must be aware of the tactics that the DPRK and other cyber terrorist use such as extortion campaigns, and Ransomware (WannaCry 2.0) as well as the other methods mentioned above. At a minimum, PBI-FS should invest heavily into a Security Information and Event Management (SIEM) solution and upgraded Firewall/IDS applications. Moreover, the PBI leadership should respond to the threat landscape by augmenting their security posture by standing up an Incident Response Team of Security operation Center (SOC) that deals with identifying, isolating, mitigation and recovering from cyber-attacks (Secureworks, 2017). These are only recommendations but based on reliable Intel, every effort should be made to stay ahead of the threat agents that are evolving daily.

In closing, PBI-FS must be vigilant in shoring up its defenses against the inevitable threats that it will face during its five year trial period as its own entity. The M&A team should fulfill its responsibilities and perform its due diligence in surveying the threat landscape in an effort to develop the best Cybersecurity Strategy to defend it Business/Project Goals & Objectives. Getting plugged in with the cyber intelligence sharing communities and other CTI organizations is a great way to harden their security posture and get prepared for the fight. Finally, operating on foreign soil also presents its challenges, but if the proper steps and best practices are applied, then PBI-FS will be ready to meet them.

CISA. (2014). Financial services sector. Retrieved from https://www.cisa.gov/financial-services-sector

Littlefield. (2017). Cyber Terrorism: understanding and preventing acts of terror within our cyber space. Retrieved from UMGC reference material CSIA 485.

Secureworks. (2017). Cyber threat basics, types of threats, intelligence & best practices. Retrieved from https://www.secureworks.com/blog/cyber-threat-basi…

 

Submit Your Assignment and get professional help from our qualified experts!


responds to the discussion post below in 200 words was first posted on July 23, 2020 at 7:23 am.
©2019 "Submit Your Assignment". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@nursingessayswriters.com

 

“Are you looking for this answer? We can Help click Order Now”