Course Hero Logo

Cyber Security in Mergers and Acquisition.docx - Running...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 5 out of 17 pages.

Running Head: ENTERPRISE NETWORK SECURITYiEnterprise Network SecurityInstitutionName
ENTERPRISE NETWORK SECURITYiiTable of ContentsExecutive Summary.....................................................................................................................................31.0 Policy Gap Analysis..............................................................................................................................42.0 Protocols for Streaming Services...........................................................................................................62.1Common Streaming Protocols............................................................................................................73.0 Securing the New Company from Cyber Attacks..................................................................................84.0 Technical Vulnerabilities Associated with the Target Company.............................................................95.0 Merged Network Infrastructure.............................................................................................................96.0 Wireless and BYOD Policies...............................................................................................................116.1 Current Stance.................................................................................................................................116.2 What need to be done to Comply with Policy..................................................................................127.0 Data Protection Plan............................................................................................................................138.0 Supply Chain Risk...............................................................................................................................149.0 Vulnerability Management Program....................................................................................................1510.0 Training requirement.........................................................................................................................1511.0 Conclusion.........................................................................................................................................16References.................................................................................................................................................17
ENTERPRISE NETWORK SECURITYiiiExecutive SummaryCompanies entering into mergers and acquisition agreement must consider the securityand the possibility data breach. This paper discusses the merger between Disney and Netflix andthe system security consideration of the new company. The problem of data breach on mergershas been identified as one of the causes that can lead to a no-go mergers and acquisition in casethey are discovered before the agreement has not been completed. Data breach will be preventedthrough the use of appropriate streaming services. Media streaming protocols commonly usedinclude the MPEG-DASH, HTTP streaming, smooth streaming and HDS. Understanding thestreaming services will be helpful in formulating protection for the target company by identifyingthe technical vulnerability of such company since either the parent companies had security issuesor not cyber security threats are still in existence and the company needs to set the requiredsecurity needs in place. Merged network infrastructure on which the new company will operatewill be formulated which will ensure customer preferred media files are delivered. This willdictate the required BYOD policy to be implemented by the new company but this will bedependent on the security policy of the new company which is independent of the parentcompany’s security policy. A data protection plan is then formulated so that the data is protectedfrom any possible threats from malicious software or the attack by hackers. The supply chainrisks are identified and their possible solutions suggested to protect the company from possiblelosses that might result from such risks and minimizing them through hedging. The staff needs tobe updated on any possible changes system requirements and trained in case the new softwarerequires new skills.The executive of the new company will then be briefed on system securityof the new company.
ENTERPRISE NETWORK SECURITY11.0 Policy Gap AnalysisOne of the most critical issues that a company has to consider before they enter into amerger and acquisition agreement is the possibility that the security, privacy and breach risk arekept as minimal as possible. While some mergers and acquisitions will require that the formerorganizations will keep their data as confidential as possible with the aim of protecting new

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 17 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
ArgwingsOtieno

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture