In this report, the tower was outsourced IT and faced some vulnerabilities of their own. It is essential to manage the factor in the risk related to partnering with the third parties where the companies must coordinate their cyber security strategy (Lehto, 2013). CDS blocked the gaming and cage in the organization. But the tower was not employed this security strategy. The management of Towers identified the leakage of information from one server to another server anonymously. Then the top management was decided to generate security reports in Microsoft word. Once the report had been submitted to the director, then the reports had been printed and deleted by the IT technicians. The IT technicians have deleted all the security investigation reports except the management. If the report had been deleted by the IT technicians, then no one could access the copies of reports from Monday to Friday. So the accessing of security and privileges reports in a timely manner.
The IT department rendered more problems to the dispatchers and the security the tower have faced several issues like the one who was known about the package of problems have left the company and others went on maternity leave without training anyone else. Instead of informing two months for the back to the work, but two years rolled up. At last, the software required an upgrade, Key Trak was upgraded. Then they planned to sell the tower for $18,000 of new hardware in order to work with the new program. This was accepted in the capital budget.
References
Cameron, E. & Green, M. (2004). Making sense of change management. London: Kogan Page.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare And Terrorism, 3(3), 1-18. http://dx.doi.org/10.4018/ijcwt.2013070101
Rak, A. (2002). Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection. Information Security Technical Report, 7(2), 50-56. http://dx.doi.org/10.1016/s1363-4127 (02)02006-x
Rasheed, M. & Latif, D. (2011). Does Technology-Enabled Service Quality affect Organizational Competencies?. Jpag, 1(2). http://dx.doi.org/10.5296/jpag.v1i2.791