Saturday, February 29, 2020
Strategic Management Essay Example | Topics and Well Written Essays - 2750 words - 3
Strategic Management - Essay Example Specially mentioning, strategic management assists modern business organisations to take effective decisions and conduct activities for attaining success, resulting in attaining superior competitive position and sustaining in the long run (Wells, 2003). In this essay, the views of two different authors of strategic management will be elaborately discussed in order to gain a proper understanding of strategy. The essay intends to explore and compare the views of Mintzbergââ¬â¢s ten schools of thoughts along with Whittingtonââ¬â¢s four strategic lenses. A proper analysis will be conducted in order to gain insights about the different levels of strategy. According to the views of Michael Porter, strategy is a decision, which includes a conscious approach of performing activities in a different manner from that of the competitors in order to accomplish a viable long-term competitive advantage. Porter states that it is important for the organisations to focus not only on the operational perspectives but also on the strategic activities that tends to be effective in performing effectively in the business markets (Sage Publication, n.d.). Moreover, as per the views of Strickland and Thompson (2003), strategy is described as a managerial process, which is used to form strategic visions, objectives and approaches that are considered to be appropriate in order to accomplish long-term success. It is reflected that a strategy is said to be ineffective without the implementation of proper strategic management. It is often observed that there are various strategies that reflect as quite useful for developing overall business performance, but d oes not succeed in the long-run due to the lack of strategic management initiative. It is noticeable that the success of the organisations is dependable on various factors and thus there exists various levels of strategy for fulfilling the
Wednesday, February 12, 2020
Combining Anomaly and Signature based Intrusion Detection Systems Essay
Combining Anomaly and Signature based Intrusion Detection Systems - Essay Example The researcher states that the Internet continues to modernize the worldââ¬â¢s economy. It is apparently changing the way people live, study, work, participate, and devour. At the hub, of this rebellion is technology. Technology has moved from the "back office" to the leading edge. Namely, the interface between the customer and the organization has changed spectacularly. Increasingly, technology is shifting the organizationââ¬â¢s associations with its customers from a "face-to-face" to a "screen-to-face" communication. The Internet is not anà innovationà that concerns only one or two sectors of the economy. Because it revolutionizes the way businesses should prudentlyà systematizeà their activities and go to the market, the Internet affects all economic commotions. Organizations maintain data communication networks for paperless business operations along with enhanced communication. On the other hand, threats and vulnerabilities related to data communication networks ar e significantly increasing. Firewalls are not considered as the only solution because these intelligent viruses and malicious codes tend to pass through it. In order to enable advanced security measures, Intrusion Detections Systems are recommended for corporate networks. The types include network-based IDS, host-based IDS, and software-based IDS. These types are further categorized into signature-based IDS which is also referred as misuse detection, and Anomaly Detection. The functionality of ââ¬Ësignature-based IDSââ¬â¢ is dependent on known signatures. The word ââ¬Ëknownââ¬â¢ is important because threats that are detecting so far are categorized as known threats and are called signatures. Signature-based IDS only detect threats similar to the defined available signatures and do not comply with any new threat. Whereas, Anomaly-based IDS detect unknown activities within the network and detect them as threats and vulnerabilities. These two IDS types comply with different types of methods, process, and various profiles that are discussed in the next part of this coursework. II. Signature-Based IDS The signature-based IDS analyze and identify specific patterns of attacks that are recognized by raw data that is in terms of byte sequences called strings, port number, protocol types etc. Likewise, apart from the normal operational pattern, signature-based IDS detects any activity that is unusual from previously defined patterns. Moreover, the patterns are monitored with strict control algorithms. The signatures are stored in a signature repository. The prime object of a ââ¬Ësignature-based IDSââ¬â¢ is to search signatures in order to detect a threat or vulnerability that is similar to antivirus software that also detects viruses. The functionality of IDS is to detect attacks that are initiated directly towards the network. Moreover, IDS tries to identify as many events as possible and therefore generate logs.
Subscribe to:
Posts (Atom)