Skip main navigation

How do you bring down an organisation?

Revisiting NET DM IT Solutions
It’s been a difficult decision, Steve has been with me from the beginning but John has more experience of cloud-based systems and working with local government. He is the right person for the job. This is the best decision for the company. Steve Workman was not successful in his application for the role of director of ICT. Newcomer John Watts was appointed instead. Seeking to placate Steve, Nick appointed him as head of ICT. Nevertheless, Steve would still have to report to his new boss, John Watts. Lana Scripal was given a temporary contract to bring operating systems and data sets together, rebuild the network defence systems, and support John and Steve in submitting tenders. Nick then dropped another bombshell on his new team.
The deadline for the government contract bid has been brought forward by six months. All systems must be ready in order for the company to be considered. We’re going to have to pull out all the stops and Steve, I’ll need your full support to make this happen. Yeah that’s fine John. Lana, I hope you’re as good as John tells me; we can’t make any amateur mistakes if we’re going to win this type of contract. The team identify that the networks of both organisations are running old systems that are unsupported and obsolete. They anticipate that the company will be upgrading to the latest version of the Microsoft operating system in order to be fully compatible and patchable moving forward.
Nick has high aspirations for his company but did his team investigate Blue Sky’s networks sufficiently before the merger? What are the potential vulnerabilities you would take into consideration when merging two or more IT networks to ensure they are protected?

In this video we revisit NET DM Limited IT Solutions to see if the vulnerability in their network has been resolved.

The video also poses three questions:

  • What are the potential vulnerabilities you would take into consideration when merging two or more IT networks to ensure they are protected?
  • Did Nick’s team investigate Blue Sky’s network sufficiently before the merger?
  • What could go wrong when merging networks? Data? Software? Hardware?

Your task

Answer these questions in the comments and remember to justify your answers.
This article is from the free online

Introduction to Network Security and Defence

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now