I need only 2 out of the 4 discussion questions answered in a minimum 200 words each with at least one source cited properly, APA style.  Please place the corresponding sources under each answer.
week_6.docx

Unformatted Attachment Preview

Energy Sector and Cybersecurity
Please read Energy Cybersecurity Issue.docx. As you can see this article was published in early
2012 and it deals with issues associated with the Energy Sector. The article claims that since
2009 the Energy Sector has not improved its Cybersecurity Programs with money that was given
to it by the Federal Government.
Do some research on your own and try and find related articles or issues concerning security
concerns regarding the Energy Sector. Based on your research what are some of the continuing
concerns and what is the impact if a cyber attack is launched against the Energy Sector. Do you
think that type of attack would have a significant impact or is our infrastructure robust enough to
withstand an attack? What recommendations would you make if you were a Cyber Analyst
giving your opinion to Congress?
Remember to cite your sources!
Conflict Management Techniques
Conflict management techniques come in handy when you are working in organizations. Most
people do not have a good skill set in this area. Read the article, Conflict Management
Techniques, available
here, http://www.personalityexplorer.com/home/FREEResources/ConflictManagementTechniqu
es.aspx. You might recognize a technique you already use. Select one technique and provide an
example of how you think it may be used during a merger, or formation of a team. Provide
details.
Managing a Remote Workforce
Most work forces are moving to more remote access. How do you manage people
remotely? How do you make sure that they are included in the team. Our example has only two
countries involved, what if there are many? How do you provide them access into the network
securely? Especially if they are coming in from other countries that are known for infiltrating
networks??
Legacy Systems
There are a lot of security reasons for decommissioning legacy systems at all times, not just at a
merger. Discuss two security issues and then provide the business reason for decommissioning
that we could present to the business line. In a for-profit company, you have to save the security
card for when it is really important. You need to address risk. You can’t afford to mitigate all
risk, sometimes you have to accept it or transfer it. How will this scenario affect your customer
base? How will you be able to continue business? Be creative with your answers.

Purchase answer to see full
attachment