SlideShare a Scribd company logo
1 of 1
CS-7: The Virus Hunters (19,20)
Imagine what life would be like if your product were never finished, if your work were never done, if your
market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. That’s
the reality of their daily work-life. At the company’s Response Lab in Santa Monica, California, described
asthe “dirtiest of all our networks at Symantec,” software analysts collect viruses and other suspicious code
and try to figure out how they work so security updates can be provided to the company’s customers.
There’s even a hazardous materials box by the door to the lab marked DANGER where they put all the
disks, tapes, and hard drives with the nasty viruses that need to be completely disposed of.
Symantec’s situation may seem unique, but the company, which makes content and network security
software for both consumers and businesses, reflects the realities facing many organizations today: quickly
shifting customer expectations and continuously emerging global competitors that have drastically
shortened product life cycles. The launch of the Blaster-B worm changed the company’s approach to
dealing with viruses. The domino effect of Blaster-B and other viruses spawned by it meant that frontline
software analysts were working around the clock for almost two weeks. The “employee burn-out” potential
made the company realize that its virus-hunting team had to be much deeper talent-wise.
Now, the response center’s team numbers in the hundreds and managers rotate people from the front lines,
where they’re responsible for responding to new security threats that crop up, into groups where they can
help with new-product development. Others write internal research papers. Still others are assigned to
develop new tools that will help their colleagues battle the next wave of threats. There’s even an individual
who tries to figure out what makes the virus writers tick—and the day never ends for these virus hunters.
When Santa Monica’s team finishes its day, colleagues in Tokyo take over. When the Japanese team
finishes its day, it hands off to Dublin, who then hands back to Santa Monica for the new day. It’sa frenetic,
chaotic, challenging work environment that spans the entire globe. But the security experts realize that
despite their team’s best efforts, “they’re losing the battle.” They plan to add another line of defense and
use the power of people to hunt down the cybercriminals by “recruiting victims and other computer users
to help them go on the offensive and track down the hackers.” Rowan Trollope, senior vice president for
consumer products at Symantec, says, “It’s time to stop building burglar alarms to keep people out and go
after the bad guys.” Thus, at the introduction of its new Norton Internet Security system, Symantec is now
asking customers to opt in to a program that will collect data about attempted computer intrusions and then
forward the information to authorities.
Questions:
1. How might the nature of what the virus hunters do affect the most appropriate structure for getting work
done efficiently and effectively?
2. In fighting the onslaught of computer viruses, what will be the challenges of managing a team of
professionals and a group of customer “volunteers”?
3. What types of adaptive organizational designs discussed in this chapter might be most appropriate for
Symantec to most effectively manage its professionals and its customer volunteers? Explain your choices.

More Related Content

Similar to Virus hunter questions

Management case study
Management case studyManagement case study
Management case studymaxmunir
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!UltraUploader
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docxalinainglis
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptxCompanySeceon
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
CIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOneCIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOneSean Roth
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxVirha Tiku
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 

Similar to Virus hunter questions (20)

Management case study
Management case studyManagement case study
Management case study
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
CIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOneCIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOne
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docx
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 

Recently uploaded

一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书
一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书
一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书atedyxc
 
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...beulahfernandes8
 
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书atedyxc
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Champak Jhagmag
 
Bahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxBahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxAbdulNasirNichari
 
New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024Adnet Communications
 
Managing personal finances wisely for financial stability and
Managing personal finances wisely for financial stability  andManaging personal finances wisely for financial stability  and
Managing personal finances wisely for financial stability andraqibmifysolutions
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024ssuser7d2330
 
What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024DOT TECH
 
How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024DOT TECH
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书atedyxc
 
how to exchange pi coins for USD in 2024.
how to exchange pi coins for USD in 2024.how to exchange pi coins for USD in 2024.
how to exchange pi coins for USD in 2024.DOT TECH
 
State Space Tutorial.pptxjjjjjjjjjjjjjjj
State Space Tutorial.pptxjjjjjjjjjjjjjjjState Space Tutorial.pptxjjjjjjjjjjjjjjj
State Space Tutorial.pptxjjjjjjjjjjjjjjjjoshuaclack73
 
DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Mutual Fund
 
project ratio analysis of bcom studies .
project ratio analysis of bcom studies .project ratio analysis of bcom studies .
project ratio analysis of bcom studies .borndark09
 
is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024DOT TECH
 
How can I withdraw my pi coins to real money in India.
How can I withdraw my pi coins to real money in India.How can I withdraw my pi coins to real money in India.
How can I withdraw my pi coins to real money in India.DOT TECH
 
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...aadhyam195
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?DOT TECH
 

Recently uploaded (20)

一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书
一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书
一比一原版(KPU毕业证书)昆特兰理工大学毕业证成绩单学位证书
 
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...
Next Steps for Poonawalla Fincorp After Abhay Bhutada’s Shift to Non-Executiv...
 
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书
一比一原版(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单学位证书
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
 
Bahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxBahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttx
 
New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024
 
Managing personal finances wisely for financial stability and
Managing personal finances wisely for financial stability  andManaging personal finances wisely for financial stability  and
Managing personal finances wisely for financial stability and
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024
 
What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024
 
How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证成绩单学位证书
 
how to exchange pi coins for USD in 2024.
how to exchange pi coins for USD in 2024.how to exchange pi coins for USD in 2024.
how to exchange pi coins for USD in 2024.
 
State Space Tutorial.pptxjjjjjjjjjjjjjjj
State Space Tutorial.pptxjjjjjjjjjjjjjjjState Space Tutorial.pptxjjjjjjjjjjjjjjj
State Space Tutorial.pptxjjjjjjjjjjjjjjj
 
DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024
 
project ratio analysis of bcom studies .
project ratio analysis of bcom studies .project ratio analysis of bcom studies .
project ratio analysis of bcom studies .
 
is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024
 
How can I withdraw my pi coins to real money in India.
How can I withdraw my pi coins to real money in India.How can I withdraw my pi coins to real money in India.
How can I withdraw my pi coins to real money in India.
 
Canvas Business Model Infographics by Slidesgo.pptx
Canvas Business Model Infographics by Slidesgo.pptxCanvas Business Model Infographics by Slidesgo.pptx
Canvas Business Model Infographics by Slidesgo.pptx
 
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Safdarjung Phone No 9999965857 High Profile ℂall Girl Delhi No...
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?
 

Virus hunter questions

  • 1. CS-7: The Virus Hunters (19,20) Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. That’s the reality of their daily work-life. At the company’s Response Lab in Santa Monica, California, described asthe “dirtiest of all our networks at Symantec,” software analysts collect viruses and other suspicious code and try to figure out how they work so security updates can be provided to the company’s customers. There’s even a hazardous materials box by the door to the lab marked DANGER where they put all the disks, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situation may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. The launch of the Blaster-B worm changed the company’s approach to dealing with viruses. The domino effect of Blaster-B and other viruses spawned by it meant that frontline software analysts were working around the clock for almost two weeks. The “employee burn-out” potential made the company realize that its virus-hunting team had to be much deeper talent-wise. Now, the response center’s team numbers in the hundreds and managers rotate people from the front lines, where they’re responsible for responding to new security threats that crop up, into groups where they can help with new-product development. Others write internal research papers. Still others are assigned to develop new tools that will help their colleagues battle the next wave of threats. There’s even an individual who tries to figure out what makes the virus writers tick—and the day never ends for these virus hunters. When Santa Monica’s team finishes its day, colleagues in Tokyo take over. When the Japanese team finishes its day, it hands off to Dublin, who then hands back to Santa Monica for the new day. It’sa frenetic, chaotic, challenging work environment that spans the entire globe. But the security experts realize that despite their team’s best efforts, “they’re losing the battle.” They plan to add another line of defense and use the power of people to hunt down the cybercriminals by “recruiting victims and other computer users to help them go on the offensive and track down the hackers.” Rowan Trollope, senior vice president for consumer products at Symantec, says, “It’s time to stop building burglar alarms to keep people out and go after the bad guys.” Thus, at the introduction of its new Norton Internet Security system, Symantec is now asking customers to opt in to a program that will collect data about attempted computer intrusions and then forward the information to authorities. Questions: 1. How might the nature of what the virus hunters do affect the most appropriate structure for getting work done efficiently and effectively? 2. In fighting the onslaught of computer viruses, what will be the challenges of managing a team of professionals and a group of customer “volunteers”? 3. What types of adaptive organizational designs discussed in this chapter might be most appropriate for Symantec to most effectively manage its professionals and its customer volunteers? Explain your choices.