- Published: September 20, 2022
- Updated: September 20, 2022
- University / College: University of Glasgow
- Language: English
- Downloads: 20
Disgruntled employee
As a network administrator for Illinois branch of MacDonald Company, I was fired two weeks ago because I failed to secure the network when it failed for two hours. The human resource manager, someone who does not differentiate between a computer CRT monitor and a TV set, got angry at me and fired me. She cited that I was sleeping on the job because two hours for such a big company was too much;. I feel I was fired for no apparent reasons. My argument is that systems fail and I do not have to know all solutions to all problems. There are systems that fail for one week! I have requested time and again that an offsite backup system be introduced into the system. This has not been taken into consideration;.
My firing will not go unchallenged. I have a well set strategy that will be a good gift and thank you for McDonald Company. I have the firewall credentials for the company and when I tried two days ago, it was still working and accessible. With the passwords, I am able to get access important information like the finance department. My strategy is well set and I have even posed as a supplier to the finance manager two days ago. We chat and we agreed that I will supply some sugar at a cheaper price. I accessed the information of one of the no-so much trusted supplier some few days ago. I was able to use the network even outside the intranet. I was able to do this because I had the passwords for the system. I am therefore waiting for the agreed time to access the system.
This problem could have been avoided by the company by changing passwords to important systems immediately a very sensitive employee leaves the company. The security policy regarding passwords is not that strong.
References
Allen, J. (2003). The ultimate guide to system security. Boston: Madison-Wesley.
Andress, J. (2011). The basics of information security. New York: Elsevier.
Benantar, M. (2006). Access control systems: Security, identity management and trust models . New York: Springer.
Garcia-Alfaro, J. (2010). Data privacy management and autonomous spontaneous security. New York: Springer.
Kim, D., & Solomon, M. (2010). Fundamentals of information systems security. Texas: Jones & Bartlett Learning.
Matt, C. (1997). Introduction to Network security. New York: Wiley.
Pfleeger, C., & Pfleeger, S. (2003). Security in computing. London: Prentice Hall Professional.