We use cookies to give you a better experience. Carry on browsing if you're happy with this, or read our cookies policy for more information.

Skip main navigation

How do you bring down an organisation?

Revisiting NET DM IT Solutions
12.1
It’s been a difficult decision, Steve has been with me from the beginning but John has more experience of cloud-based systems and working with local government. He is the right person for the job. This is the best decision for the company. Steve Workman was not successful in his application for the role of director of ICT. Newcomer John Watts was appointed instead. Seeking to placate Steve, Nick appointed him as head of ICT. Nevertheless, Steve would still have to report to his new boss, John Watts. Lana Scripal was given a temporary contract to bring operating systems and data sets together, rebuild the network defence systems, and support John and Steve in submitting tenders. Nick then dropped another bombshell on his new team.
61.2
The deadline for the government contract bid has been brought forward by six months. All systems must be ready in order for the company to be considered. We’re going to have to pull out all the stops and Steve, I’ll need your full support to make this happen. Yeah that’s fine John. Lana, I hope you’re as good as John tells me; we can’t make any amateur mistakes if we’re going to win this type of contract. The team identify that the networks of both organisations are running old systems that are unsupported and obsolete. They anticipate that the company will be upgrading to the latest version of the Microsoft operating system in order to be fully compatible and patchable moving forward.
103.6
Nick has high aspirations for his company but did his team investigate Blue Sky’s networks sufficiently before the merger? What are the potential vulnerabilities you would take into consideration when merging two or more IT networks to ensure they are protected?
In this video we revisit NET DM Limited IT Solutions to see if the vulnerability in their network has been resolved.
The video also poses three questions:
  • What are the potential vulnerabilities you would take into consideration when merging two or more IT networks to ensure they are protected?
  • Did Nick’s team investigate Blue Sky’s network sufficiently before the merger?
  • What could go wrong when merging networks? Data? Software? Hardware?

Your task

Answer these questions in the comments and remember to justify your answers.
This article is from the free online

Network Defence Management Overview

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education