SlideShare a Scribd company logo
1 of 9
We Work Articles:
WeWork Accused of Mishandling Sexual Assault Reports Amid
‘Frat-Boy Culture’ (Oct. 12)
-This article explains how the culture and tone for
WeWork can and has fostered a dangerous workplace for
individuals who are accusing the company of sexual harassment
and assault complaints and what this means for the company.
(Fortune)
WeWork Investors Turned Off by 'Sloppy' IPO Filings (Oct. 7)
-This article explains how the parent company of WeWork,
We Co. misstated financials and omitted information about the
company’s governance which was shown throughout their IPO
filings which ultimately upset investors involved with WeWork.
(Wall Street Journal)
Chastened WeWork Weighs Pullback in China (Oct. 1)
-This article examines challenges that WeWork is
confronted with, especially their pressure and struggle to make
money. Other challenges include lower-priced competition and
the Chinese economy slowing down. (Wall Street Journal)
WeWork Still Needs Cash After Pulling IPO (Sept. 30)
-In effort to combat their cash burn out, WeWork will be
selling extraneous buildings, laying off employees, and other
luxuries the former CEO had previously purchased. This article
examines how this could effect WeWork’s growth rate, which is
expected to decrease after these changes. (Wall Street Journal)
WeWork's Adam Neumann Steps Down as CEO (Sept. 24)
-This article explains why Adam Neumann resigned and
relinquished his control of WeWork after they lost backing from
SoftBank which owns a third of their company. (Wall Street
Journal)Scott Galloway: "We work is arguably the most
overvalued company in the world"(May 15)
-This article provides an educated opinion on WeWork’s
valuation and why it is believed to be overvalued. (Business
Insider)
Videos:
SoftBank to Boost Stake in WeWork in Deal That Cuts Most
Ties With Neumann
-This video goes into detail about the company’s “risky
business model” after they failed to present an IPO to investors
and why the CEO, Adam Neumann stepped down. (Wall Street
Journal)
Management expert weighs in on whether WeWork
-This video is a discussion with Jeff Sonnenfield, a senior
associate dean for leadership studies at the Yale School of
Management who comments on SoftBank since they are urging
to shelve WeWork initial IPO. (CNBC Television)
Formaldehyde Debacle
-This video explains the health issue that WeWork has
been confronted with in their phone booth stations and what this
means for the WeWork company. (CNBC Television)
WeWork services store video
-This video explains the new store that WeWork created to
give their members more freedom. This store known as the
“WeWork Services Store” is supposed to offer a business
services for the more sophisticated user of WeWork. (WeWork)
Long beach WeWork office tour
-This video offers a tour and visualization of one of
WeWork’s locations in Long Beach, California.
(HeatherJustCreate)
Reply to two discussion ½ each APA format.
1st Discussion
What is IDs and what is IPs?
Well, IDs was kind of the origination of intrusion detection
system and historically they were signature-based, meaning it
would look for certain types of data, data payloads, and data
packets then it would watch all the traffic in the network that
which it had visibility to, and make decisions if this is a good
traffic or bad traffic, then it would alert you through either a
console or some other alerting mechanism like Syslog or
something like that. and to look at this traffic that it could be
malicious as you can imagine a device on the network seeing
hundreds thousands millions of packets evaluating them and
then sending alerts to a human to make an action on isn't very
real-time.
So, the next evolution of that was IPS which is an intrusion
prevention system, so instead of just detecting and saying this
looks bad it wouldn't do its best to say this looks bad and I'm
going to stop it. IPs would make decisions based on signatures
in real-time to block traffic, the good side of this is that you're
potentially blocking malicious traffic in your environment, the
bad side is if it thought something was malicious that really
wasn't potentially you're causing a negative impact into your
network environment, So things applications may not be
working. Why would you use IDs or IPS? Well, maybe you're
regulated by some agency maybe you want to have best-in-class
security, so you enable these types of tools to tell you more
about what's happening through your network.
With all of our technology around AI and machine learning, we
know that this type of security is going there as well.
Companies like ExtraHop and Dart Trace are working towards
that, so they look at the network and they make decisions based
on deep learning as opposed to signature to determine what's
normal and what's not normal and make decisions from there. so
it's a little bit more intelligent in the way that it reports issues
and potentially can prevent threats. (Intrusion Detection and
Prevention Systems (IDS/ IPS) | Security Basics, 2018).
Intrusion Detection and Prevention Systems (IDS/ IPS) |
Security Basics. (2018). [Video]. Retrieved from
https://www.youtube.com/watch?v=cGIgJOICpX0
2nd Discussion
This discussion board will be a continuation of the one I posted
in week 05 where I talked about what an Intrusion Detection
System was and discussed the major differences between an
Intrusion Detection System and an Intrusion Prevention System.
Chapter 5 of our textbook went into great detail discussing all
of the various types of Intrusion Detection Systems and
describes it as being different from a firewall because it is
designed to detect a security breach. As I mentioned a few
weeks ago, an Intrusion Detection System is just as its name
sounds, it detects anomalies and will report on those anomalies
as long as it is configured properly, or is a statistical anomaly-
based IDS, which can learn what is normal behavior on the
network and then alarm when it sees something abnormal.
Regardless of the type of Intrusion Detection System you may
have, it still takes no action. Don’t get me wrong, it’s a
wonderful tool to have in possibly preventing something
potentially catastrophic because it can be identified early
enough and alert the right folks to take action, but that is the
extent of an Intrusion Detection System.
Intrusion Prevention Systems on the other hand do what their
name suggest, they prevent intrusions. The premise behind an
Intrusion Prevention System was to fill a frustrating void that
the Intrusion Detection System had left, and that was to not
only identify a potential threat, but to not allow that traffic
through. Intrusion Prevention Systems have similar features to
Intrusion Detection Systems in that they can be host-based or
network-based, and they can also be content-based and
determine what is and is not malicious based upon analysis or
signatures. While neither solution is an end all, be all solution,
they add an extra layer of defense to your network.
References
Cooper, S. (2019, February 27). 2019 Best Intrusion Detection
Systems (10+ IDS Tools Reviewed). Retrieved from
https://www.comparitech.com/net-admin/network-intrusion-
detection-tools/.
Maymi, F., & Harris, S. (2018). Cissp All-In-One Exam Guide,
Eighth Edition (8th ed.). McGraw-Hill Education.
pp_pankaj. (2019, April 8). Intrusion Detection System (IDS).
Retrieved from https://www.geeksforgeeks.org/intrusion-
detection-system-ids/.
What is an Intrusion Detection System? (n.d.). Retrieved from
https://www.paloaltonetworks.com/cyberpedia/what-is-an-
intrusion-detection-system-ids.
[STUDENT NAME]
[Date]
BUSINESS FOUNDATIONS (ENT101 Section [Letter])
SWOT Analysis: [Case Name]
Strengths
1.
2.
3.
4.
5.
Weaknesses
1.
2.
3.
4.
5.
Opportunities
1.
2.
3.
4.
5.
Threats
1.
2.
3.
4.
5.
BSAM OUTLINE: [Case Name]
When and Where are we in Time? (Firm location, during what
time frame does the case take place):
·
·
Who are the Stakeholders? (Group them into categories and list
them all on the same line by category):
·
·
·
·
·
What Industry does firm compete in? What is the Target Market
and Market Segments of the firm?:
·
·
·
·
·
Who is the Competition? (Group them into categories and list
them all on the same line by category):
·
·
·
·
·
Assessment (Key Symptoms and causes):
Analysis (The ONE Primary Problem that encompasses most or
all of the key symptoms):
·
Explain Best Alternatives and How They Will Help “Solve” the
Singular Primary Problem Above:
Alternative #1:
Alternative #2:
Alternative #3:
Implementation Action Plan: Describe the research you must do
to answer the following questions about EACH alternative:
· How could it be implemented?
· How much will it cost short & long-term? (Make educated
assumptions about cost!)
· How quickly can it be completed?
· How risky is it? How easy is it to do?
· How well does it solve primary problem (estimate a
percentage)?
· What are the consequences of each alterative? – Think through
EVERYTHING!
Alternative #1:
Alternative #2:
Alternative #3:
2
Updated 07/2019

More Related Content

Similar to We Work ArticlesWeWork Accused of Mishandling Sexual Assault Re.docx

Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
audeleypearl
 

Similar to We Work ArticlesWeWork Accused of Mishandling Sexual Assault Re.docx (6)

The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Security
SecuritySecurity
Security
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Intellectual Property Protection for Products
Intellectual Property Protection for ProductsIntellectual Property Protection for Products
Intellectual Property Protection for Products
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 

More from jessiehampson

Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
jessiehampson
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
jessiehampson
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
jessiehampson
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
jessiehampson
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
jessiehampson
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
jessiehampson
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
jessiehampson
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
jessiehampson
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
jessiehampson
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
jessiehampson
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
jessiehampson
 

More from jessiehampson (20)

Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxMilestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
 
Migration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docxMigration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docx
 
Min-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docxMin-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docx
 
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
 
Migrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docxMigrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docx
 
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docxMike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
 
MicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docxMicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docx
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
 
midtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docxmidtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docx
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
 
Microsoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docxMicrosoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docx
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
 
Miami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docxMiami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docx
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

We Work ArticlesWeWork Accused of Mishandling Sexual Assault Re.docx

  • 1. We Work Articles: WeWork Accused of Mishandling Sexual Assault Reports Amid ‘Frat-Boy Culture’ (Oct. 12) -This article explains how the culture and tone for WeWork can and has fostered a dangerous workplace for individuals who are accusing the company of sexual harassment and assault complaints and what this means for the company. (Fortune) WeWork Investors Turned Off by 'Sloppy' IPO Filings (Oct. 7) -This article explains how the parent company of WeWork, We Co. misstated financials and omitted information about the company’s governance which was shown throughout their IPO filings which ultimately upset investors involved with WeWork. (Wall Street Journal) Chastened WeWork Weighs Pullback in China (Oct. 1) -This article examines challenges that WeWork is confronted with, especially their pressure and struggle to make money. Other challenges include lower-priced competition and the Chinese economy slowing down. (Wall Street Journal) WeWork Still Needs Cash After Pulling IPO (Sept. 30) -In effort to combat their cash burn out, WeWork will be selling extraneous buildings, laying off employees, and other luxuries the former CEO had previously purchased. This article examines how this could effect WeWork’s growth rate, which is expected to decrease after these changes. (Wall Street Journal) WeWork's Adam Neumann Steps Down as CEO (Sept. 24) -This article explains why Adam Neumann resigned and relinquished his control of WeWork after they lost backing from SoftBank which owns a third of their company. (Wall Street Journal)Scott Galloway: "We work is arguably the most overvalued company in the world"(May 15) -This article provides an educated opinion on WeWork’s valuation and why it is believed to be overvalued. (Business Insider)
  • 2. Videos: SoftBank to Boost Stake in WeWork in Deal That Cuts Most Ties With Neumann -This video goes into detail about the company’s “risky business model” after they failed to present an IPO to investors and why the CEO, Adam Neumann stepped down. (Wall Street Journal) Management expert weighs in on whether WeWork -This video is a discussion with Jeff Sonnenfield, a senior associate dean for leadership studies at the Yale School of Management who comments on SoftBank since they are urging to shelve WeWork initial IPO. (CNBC Television) Formaldehyde Debacle -This video explains the health issue that WeWork has been confronted with in their phone booth stations and what this means for the WeWork company. (CNBC Television) WeWork services store video -This video explains the new store that WeWork created to give their members more freedom. This store known as the “WeWork Services Store” is supposed to offer a business services for the more sophisticated user of WeWork. (WeWork) Long beach WeWork office tour -This video offers a tour and visualization of one of WeWork’s locations in Long Beach, California. (HeatherJustCreate) Reply to two discussion ½ each APA format. 1st Discussion What is IDs and what is IPs?
  • 3. Well, IDs was kind of the origination of intrusion detection system and historically they were signature-based, meaning it would look for certain types of data, data payloads, and data packets then it would watch all the traffic in the network that which it had visibility to, and make decisions if this is a good traffic or bad traffic, then it would alert you through either a console or some other alerting mechanism like Syslog or something like that. and to look at this traffic that it could be malicious as you can imagine a device on the network seeing hundreds thousands millions of packets evaluating them and then sending alerts to a human to make an action on isn't very real-time. So, the next evolution of that was IPS which is an intrusion prevention system, so instead of just detecting and saying this looks bad it wouldn't do its best to say this looks bad and I'm going to stop it. IPs would make decisions based on signatures in real-time to block traffic, the good side of this is that you're potentially blocking malicious traffic in your environment, the bad side is if it thought something was malicious that really wasn't potentially you're causing a negative impact into your network environment, So things applications may not be working. Why would you use IDs or IPS? Well, maybe you're regulated by some agency maybe you want to have best-in-class security, so you enable these types of tools to tell you more about what's happening through your network. With all of our technology around AI and machine learning, we know that this type of security is going there as well. Companies like ExtraHop and Dart Trace are working towards that, so they look at the network and they make decisions based on deep learning as opposed to signature to determine what's normal and what's not normal and make decisions from there. so it's a little bit more intelligent in the way that it reports issues and potentially can prevent threats. (Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics, 2018).
  • 4. Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics. (2018). [Video]. Retrieved from https://www.youtube.com/watch?v=cGIgJOICpX0 2nd Discussion This discussion board will be a continuation of the one I posted in week 05 where I talked about what an Intrusion Detection System was and discussed the major differences between an Intrusion Detection System and an Intrusion Prevention System. Chapter 5 of our textbook went into great detail discussing all of the various types of Intrusion Detection Systems and describes it as being different from a firewall because it is designed to detect a security breach. As I mentioned a few weeks ago, an Intrusion Detection System is just as its name sounds, it detects anomalies and will report on those anomalies as long as it is configured properly, or is a statistical anomaly- based IDS, which can learn what is normal behavior on the network and then alarm when it sees something abnormal. Regardless of the type of Intrusion Detection System you may have, it still takes no action. Don’t get me wrong, it’s a wonderful tool to have in possibly preventing something potentially catastrophic because it can be identified early enough and alert the right folks to take action, but that is the extent of an Intrusion Detection System. Intrusion Prevention Systems on the other hand do what their name suggest, they prevent intrusions. The premise behind an Intrusion Prevention System was to fill a frustrating void that the Intrusion Detection System had left, and that was to not only identify a potential threat, but to not allow that traffic through. Intrusion Prevention Systems have similar features to
  • 5. Intrusion Detection Systems in that they can be host-based or network-based, and they can also be content-based and determine what is and is not malicious based upon analysis or signatures. While neither solution is an end all, be all solution, they add an extra layer of defense to your network. References Cooper, S. (2019, February 27). 2019 Best Intrusion Detection Systems (10+ IDS Tools Reviewed). Retrieved from https://www.comparitech.com/net-admin/network-intrusion- detection-tools/. Maymi, F., & Harris, S. (2018). Cissp All-In-One Exam Guide, Eighth Edition (8th ed.). McGraw-Hill Education. pp_pankaj. (2019, April 8). Intrusion Detection System (IDS). Retrieved from https://www.geeksforgeeks.org/intrusion- detection-system-ids/. What is an Intrusion Detection System? (n.d.). Retrieved from https://www.paloaltonetworks.com/cyberpedia/what-is-an- intrusion-detection-system-ids. [STUDENT NAME] [Date] BUSINESS FOUNDATIONS (ENT101 Section [Letter]) SWOT Analysis: [Case Name] Strengths 1. 2. 3. 4. 5. Weaknesses
  • 6. 1. 2. 3. 4. 5. Opportunities 1. 2. 3. 4. 5. Threats 1. 2. 3. 4. 5. BSAM OUTLINE: [Case Name] When and Where are we in Time? (Firm location, during what time frame does the case take place): · · Who are the Stakeholders? (Group them into categories and list them all on the same line by category): · · · · ·
  • 7. What Industry does firm compete in? What is the Target Market and Market Segments of the firm?: · · · · · Who is the Competition? (Group them into categories and list them all on the same line by category): · · · · · Assessment (Key Symptoms and causes): Analysis (The ONE Primary Problem that encompasses most or all of the key symptoms):
  • 8. · Explain Best Alternatives and How They Will Help “Solve” the Singular Primary Problem Above: Alternative #1: Alternative #2: Alternative #3: Implementation Action Plan: Describe the research you must do to answer the following questions about EACH alternative: · How could it be implemented? · How much will it cost short & long-term? (Make educated assumptions about cost!) · How quickly can it be completed? · How risky is it? How easy is it to do? · How well does it solve primary problem (estimate a percentage)? · What are the consequences of each alterative? – Think through EVERYTHING! Alternative #1: