Management (how secure is the cloud )

Management Chapter 8: How Secure is the Cloud (30 points) Certainly, there were several trouble, technology, and organization factors responsible for the McAfees Software line of work. As concerning the management factors, the management failed to run the test simulations fort Windows XP after the completion of the simulation tests. The same case applied to the Operating System with reference to service pack 3. Thus, most of the users that were at the time using Windows XP3 and the version8. 7 of the virus scan suffered the wrath of update download that was defective. When it comes to the organization factors, a major concern was the lack of efficiency in the McAfee’s staff. Although the main target of the VirusScan was the new virus ‘W32 / wecorl. a’, the virus file masqueraded as a Windows file named as svchost. exe. Since this file is essential to the performance of the PC, the management failed to detect this slipup in time. Lastly but equally important, it is worthy to note that svchost. exe is an essential file to enable proper booting of a Windows computer. In this regard, McAfee resolved that since the majority of the computers affected were oat the time running on Windows XP3 in combination with version 8. 7 of McAfee VirusScan. Perhaps it is worthy to note that there was appreciable business impact for this software problem and this extended to both the customers of McAfee and McAfee itself. The short letter impact included the fact that several corporates and customers got their information in infusion this this led to difficulties in rebooting their computers. The loss of a myriad of customers saw McAfee suffer losses in Millions of Dollars. This customer wrath was because of losses in vast personal data that were in the computers. The incidence of crippled computer system that affected users of McAfee VirusScan version 8. 7 with Windows XP Service Pack 3 was undoubtedly unprecedented. If I were a McAfee customer, I would consider the response by McAfee to the problem as unacceptable due to a number of reasons. Firstly, it is important to hide that although the decision by McAfee management to hide the information was good intentioned, the fact that it saw the departure of many customers ruined the moral obligation in every sense. Moreover, the slipup that led to the malfunctioning of the computers of customers and companies exposed such victims to insecure working environment, which should not have been the case. Therefore, the response by McAfee did not satisfy the magnitude of the damage that had been caused and this was manifested in the massive exodus of customers. To avoid getting into similar problems, McAfee should undertake a number of significant steps as illustrated below. Considering the extent of the damage, McAfee should especially consider the implementation of additional Quality Assurance procedures. This should be so especially for those releases having a direct impact on the critical systems files