SlideShare a Scribd company logo
Assignment 1: Social Performance of Organizations
According to the textbook, the current world economy is
increasingly becoming integrated and interdependent; as a
result, the relationship between business and society is
becoming more complex. In this assignment, you will be
researching a Fortune 500 company from an approved company
list provided by your professor. Be sure to check the list before
you begin.
Write a four to six (4–6) page paper in which you:
1. Specify the nature, structure, and types of products or
services of your company, and identify two (2) key factors in
the organization’s external environment that can affect its
success. Provide an explanation to support the rationale.
2. Suggest five (5) ways in which the primary stakeholders can
influence the organization’s financial performance. Provide
support for the response.
3. Specify one (1) controversial corporate social responsibility
concern associated with your company.
4. Submit a reference page with at least four (4) quality
references that you have used for this paper. Note: Wikipedia
and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; APA style format.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
· Analyze the relationship between business and society, and the
ways in which they are part of an interactive system.
· Recommend ways stakeholders can influence the destiny of
both business and society.
· Analyze the various primary and secondary stakeholder
groups, their roles, and relationships.
· Compare and contrast the concepts of corporate social
responsibility and citizenship.
· Analyze ways ethical challenges affect the multiple functions
of the business.
· Use technology and information resources to research issues in
business and society.
· Write clearly and concisely about business and society using
proper writing mechanics.
Specific Library Resources to help you get started:.
· Introductory Search - Use the home page’s search box to
keyword search many, but not all, databases.
· Targeted Search - Scroll to the bottom of the page for an A to
Z listing of all databases. Float over each link to see a
description of the database and click to load that particular
database’s custom search page. Custom search pages include
both basic and advanced search options.
· These databases are only partially searchable through the
general search bar. You will have to search for them
individually to find resources for your paper.
. Nexis Uni - This contains legal information and would be
useful to search for court cases in which your company has been
involved.
. Video Explaining Nexis Uni
· Research Starters are like the academic version of Wikipedia.
Search on a topic to get an overview with links to other
information within that topic. It will help you get ideas for
keywords for your own searches and what you need to know in
order to successfully write your paper.
. Research Starters - Business
. Library Databases - Research Starters
· Don't stress over writing papers! Watch this video on writing
papers and essays:
https://www.youtube.com/watch?v=KlgR1q3UQZE&t=9s.
Topics include how to start your research, how to organize your
research, how to draft your paper, and how to revise it.
Grading for this assignment will be based on answer quality,
logic/organization of the paper, and language and writing skills.
.
***THIS IS THE ONLY APPROVED LIST OF COMPANIES
FOR THIS ASSIGNMENT***
BUS475 Week 4 & 9 Assignment Company List (NO
EXCEPTIONS)
Johnson & Johnson
Disney
Delta Airlines
Citibank
Microsoft
Lockheed Martin
FedEx
Costco
Verizon
Assignment
1:
Social
Performance
of
Organizations
According to the textbook, the current world economy is
increasingly becoming integrated
and interdependent; as a result, the relationship between
business and society is becoming
more complex. In this assignment, you will be researching a
Fortune 500 comp
any from an
approved company list provided by your professor.
Be
sure
to
check
the
list
before
you
begin
.
Write a four to six (4
–
6) page paper in which you:
1.
Specify the nature, structure, and types of products or servi
ces of your company, and
identify two (2) key factors in the organization’s external
environment that can affect its
success. Provide an explanation to support the rationale.
2.
Suggest five (5) ways in which the primary stakeholders can
influence the organi
zation’s
financial performance. Provide support for the response.
3.
Specify one (1) controversial corporate social responsibility
concern associated with your
company.
4.
Submit a reference page with at least four (4) quality references
that you have used for
this
paper.
Note:
Wikipedia
and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
·
Be typed, double s
paced, using Times New Roman font (size 12), with one
-
inch margins on
all sides;
APA style format.
·
Include a cover page containing the title of th
e assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page
and the reference page are
not included in the required assignment page length.
The specific course learning outcomes associated with this
assignment ar
e:
·
Analyze the relationship between business and society, and the
ways in which they are part
of an interactive system.
·
Recommend ways stakeholders can influence the destiny of both
business and society.
·
Analyze the various primary and secondary stakehol
der groups, their roles, and
relationships.
·
Compare and contrast the concepts of corporate social
responsibility and citizenship.
·
Analyze ways ethical challenges affect the multiple functions of
the business.
·
Use technology and information resources to
research issues in business and society.
·
Write clearly and concisely about business and society using
proper writing mechanics.
Specific Library Resources to help you get started:
.
·
Introductory
Search
-
Use the home page’s search box to keyword search many, but
not all,
databases.
·
Targeted
Search
-
Scroll to the bottom of the page for an A to Z listing of all
databases. Float
over each link to see a description of the database and click to
load that pa
rticular
database’s custom search page. Custom search pages include
both basic and advanced
search options.
·
These databases are only partially
searchable
through the general search bar. You will have
to search for them individually to find resources for y
our paper.
Assignment 1: Social Performance of Organizations
According to the textbook, the current world economy is
increasingly becoming integrated
and interdependent; as a result, the relationship between
business and society is becoming
more complex. In this assignment, you will be researching a
Fortune 500 company from an
approved company list provided by your professor. Be sure to
check the list before you
begin.
Write a four to six (4–6) page paper in which you:
1. Specify the nature, structure, and types of products or
services of your company, and
identify two (2) key factors in the organization’s external
environment that can affect its
success. Provide an explanation to support the rationale.
2. Suggest five (5) ways in which the primary stakeholders can
influence the organization’s
financial performance. Provide support for the response.
3. Specify one (1) controversial corporate social responsibility
concern associated with your
company.
4. Submit a reference page with at least four (4) quality
references that you have used for this
paper. Note: Wikipedia and other Websites do not qualify as
academic resources.
Your assignment must follow these formatting requirements:
12), with one-inch margins on
all sides; APA style format.
the student’s name, the
professor’s name, the course title, and the date. The cover page
and the reference page are
not included in the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
the ways in which they are part
of an interactive system.
both business and society.
groups, their roles, and
relationships.
and contrast the concepts of corporate social
responsibility and citizenship.
of the business.
in business and society.
rite clearly and concisely about business and society using
proper writing mechanics.
Specific Library Resources to help you get started:.
- Use the home page’s search box to
keyword search many, but not all,
databases.
ted Search - Scroll to the bottom of the page for an A to
Z listing of all databases. Float
over each link to see a description of the database and click to
load that particular
database’s custom search page. Custom search pages include
both basic and advanced
search options.
general search bar. You will have
to search for them individually to find resources for your paper.
IoT References:
https://www.techrepublic.com/article/how-to-secure-your-iot-
devices-from-botnets-and-other-threats/
https://www.peerbits.com/blog/biggest-iot-security-
challenges.html
https://www.bankinfosecurity.asia/securing-iot-devices-
challenges-a-11138
https://www.sumologic.com/blog/iot-security/
https://news.ihsmarkit.com/press-release/number-connected-iot-
devices-will-surge-125-billion-2030-ihs-markit-says
https://cdn.ihs.com/www/pdf/IoT_ebook.pdf
https://go.armis.com/hubfs/Buyers%E2%80%99%20Guide%20to
%20IoT%20Security%20-Final.pdf
https://www.techrepublic.com/article/smart-farming-how-iot-
robotics-and-ai-are-tackling-one-of-the-biggest-problems-of-
the-century/
Video Resources:What is the Internet of Things (IoT) and how
can we secure it?
https://www.youtube.com/watch?v=H_X6IP1-NDc
What is the problem with IoT security? - Gary explains
https://www.youtube.com/watch?v=D3yrk4TaIQQ
Personal data breaches and securing IoT devices
· By Damon Culbert (2019)
The Internet of Things (IoT) is taking the world by storm as
interconnected devices fill workplaces and homes across the
US. While the intention of these devices is always to make our
lives easier, their ability to connect to the internet turns them
into ticking time bombs, lying in wait until their weaknesses
can be exploited by opportunistic hackers.
Personal data breaches are skyrocketing in America, increasing
by 60% in the last year and by 157 percent since 2015. As our
interconnectivity grows, so do the opportunities that our
technology will be hacked. Since every IoT device is connected
to the internet, each one is vulnerable to external access if not
secured properly. In the rush to manufacture these devices and
get them onto the market, security has been an afterthought
which needs to be urgently addressed if the number of yearly
data breaches is to be tackled.
Not only is the actual security of IoT devices under constant
debate but recent news stories surrounding both the Amazon
Alexa and Google Home products -- central machines to most
home IoT set-ups -- show that even when used properly, the
security implications of these devices can be suspect.
Though many expect IoT to revolutionize our everyday lives,
the potential holes they open up in our security infrastructures
could become an insurmountable problem if not dealt with soon.
Workplace IoT
IoT in the workplace can range from integrated systems such as
air conditioning and security systems to Wi-Fi enabled coffee
machines. But every point of access in a system has potential
for weakness, meaning the more connected devices there are the
harder it is to protect. Many believe that blockchain technology
has the answer for IoT security issues due to its decentralized
nature and the ability to timestamp and identify each connected
device, allowing for more accurate access records and a more
stable network where no central point is vulnerable.
The other key issue with workplace IoT is the necessity of
regular updates to keep all devices secured. In working
environments where machines are working 24/7, there is no time
to take machines out of service to complete updates, meaning
identified weaknesses can be left unresolved. This allows
hackers multiple opportunities to exploit the insecurities in an
individual device and gain access to the central network from
there.
Creators of IoT devices will need to address the concerns of
their consumers in order to create products which can be
routinely secured and hold a high base standard of security.
Integrated homes
With an explosion of interconnected devices for the home
comes a unique challenge that consumers are often completely
oblivious to. Some IoT devices have no way to securely store
the Wi-Fi password which connects them, meaning that a hacker
who is able to gain access to this device can find the Wi-Fi
password and exploit the entire network, risking data such as
banking and personal details as well as general internet activity.
It’s unrealistic to expect consumers to use blockchain security
for their washing machines and digital cameras so necessary
security changes are going to have to start with the brands
making the products. Ensuring that safety is properly considered
before marketing any IoT device is the surest way to keep
consumers’ data safe within their own network.
Google Home and Amazon Alexa
While not directly at the mercy of hackers, the recent
revelations that recordings taken by both Amazon’s Alexa and
Google Home devices have been sent to human listeners within
the company raises different privacy concerns. The companies
have assured that the recordings have been shared with human
employees for training and research purposes but as the recent
leak shows, holding personal data on recordings makes it
susceptible to malicious actors online.
Amazon have taken further steps to allow users to control how
Alexa stores their data and have it deleted using voice
commands, making it slightly easier to protect what you say in
your own home. However, many consumers buy these products
without thinking of the implications of keeping a device that is
always listening in their home. Companies who produce home
assistant speakers need to be more transparent with how they
use consumer data and take further steps to ensure no sensitive
personal data is kept in recordings to help reduce the number of
data breaches each year.
Trials are set to begin in the UK by Natwest bank where Google
Home users will be able to check their balance with their voice.
As this follows immediately on from the leaked recordings, it
seems there is still little concern for the ways in which we share
our personal data with the devices we use. However, online
security will likely become a much bigger topic in the future as
the number of internet-enabled devices rises.
The Internet of Things is proving that technology continues to
advance at a rapid pace. Although consumers will need to
ensure that security is a high priority in order to protect their
own data and data handled by organizations, the first step must
be taken by manufacturers to ensure these products are created
to high security standard.
Reference: https://betanews.com/2019/08/13/securing-iot-
devices/
Final Research Project - Securing IoT Devices: What are the
Challenges?
Internet security, in general, is a challenge that we have been
dealing with for decades. It is a regular topic of discussion and
concern, but a relatively new segment of internet security is
getting most attention—internet of things (IoT). So why is
internet of things security so important?
The high growth rate of IoT should get the attention of
cybersecurity professionals. The rate at which new technology
goes to market is inversely proportional to the amount of
security that gets designed into the product. According to IHS
Markit, “The number of connected IoT devices worldwide will
jump 12 percent on average annually, from nearly 27 billion in
2017 to 125 billion in 2030.”
IoT devices are quite a bit different from other internet-
connected devices such as laptops and servers. They are
designed with a single purpose in mind, usually running
minimal software with minimal resources to serve that purpose.
Adding the capability to run and update security software is
often not taken into consideration.
Due to the lack of security integrated into IoT devices, they
present significant risks that must be addressed. IoT security is
the practice of understanding and mitigating these risks. Let’s
consider the challenges of IoT security and how we can address
them.
Some security practitioners suggest that key IoT security steps
include:
1. Make people aware that there is a threat to security;
2. Design a technical solution to reduce security vulnerabilities;
3. Align the legal and regulatory frameworks; and
4. Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
1) Address each of the FOURIoT security steps listed above in
terms of IoT devices.
2) Explain in detail, in a step-by-step guide, how to make
people more aware of the problems associated with the use of
IoT devices.
Bottom of Form
Top of Form
Bottom of Form
What are the Challenges of IoT Security?
IoT has many of the same security challenges that other systems
have. There are, however, some challenges that are unique to
IoT.
1. Embedded Passwords. Embedding passwords in IoT devices
make it easy for remote support technicians to access devices
for troubleshooting and simplifies the installation of multiple
devices. Of course, it also simplifies access to devices for
malicious purposes.
2. Lack of device authentication. Allowing IoT devices access
to the network without authenticating opens the network to
unknown and unauthorized devices. Rogue devices can serve as
an entry point for attacks or even as a source of attacks.
3. Patching and upgrading. Some IoT devices do not provide a
simple (or any) means to patch or upgrade software. This results
in many IoT devices with vulnerabilities continuing to be in
use.
4. Physical hardening. Physical access to IoT devices can
introduce risk if those devices are not hardened against physical
attack. Such an attack may not be intended to damage the
device, but rather to extract information. Simply removing a
microSD memory card to read its contents can give an attacker
private data, as well as information such as embedded
passwords that may allow access to other devices.
5. Outdated components. When vulnerabilities are discovered in
hardware or software components of IoT devices, it can be
difficult and expensive for manufacturers or users to update or
replace them. As with patches, this results in many IoT devices
with vulnerabilities continuing to be used.
6. Device monitoring and management. IoT devices do not
always have a unique identifier that facilitates asset tracking,
monitoring, and management. IT personnel do not necessarily
consider IoT devices among the hosts that they monitor and
manage. Asset tracking systems sometimes neglect to include
IoT devices, so they sit on the network without being managed
or monitored.
Most of these issues can be attributed to security being an
afterthought (if a thought at all) in the design and
manufacturing of IoT devices. Even those IoT developers who
consider security in the design process struggle with
implementation. Most IoT devices are limited by minimal
processing power, memory, and data transfer speeds. This is a
necessary evil in order to keep the size and cost of the devices
small. Accordingly, security controls must be implemented to
compensate for these inherent weaknesses.
The first step to implementing security controls is to determine
where those controls are needed. This is another challenge for
protecting IoT devices. Since IoT devices are often not
recognized as network devices, they get overlooked when
inventorying or mapping the network. If you do not know it is
there, you cannot protect it.
Fortunately, IoT device manufacturers are beginning to address
these issues, but organizations that are planning or currently
using IoT cannot sit back and wait for that to happen. There are
measures that organizations can take right now to protect their
IoT devices and networks from attacks.Security Requirements
of IoT
Manufacturers and implementers must implement security
practices to mitigate IoT risks. Steps can be taken to better
secure IoT and address known risks.
Security Challenge
Solution
Embedded passwords
Rather than embedding passwords in their products,
manufacturers should require users to create a strong password
during device setup.
Lack of device authentication
Manufacturers should provide a means for their devices to
authenticate to the network. IT personnel should require devices
to authenticate before joining the network.
Patching and upgrading
Manufacturers need to make it easy for devices to be upgraded
or patched. Ideally, this would be an automatic or one-click
process.
Physical hardening
IoT devices should be made tamper-proof. Devices should be
monitored to detect time offline and inspected after
unexpectedly dropping offline.
Outdated components
Vulnerable devices should be updated or replaced. This can be
difficult to remedy, especially in environments that have many
IoT devices in remote locations. In those cases, tighter security
controls and more vigilant monitoring should be implemented.
Device monitoring and management
Ensure that all IoT devices are included in asset tracking,
monitoring, and management systems. Manufacturers should
provide a unique identifier for each device.
Clearly, many of these security issues can only be resolved by
the manufacturer. One that organizations’ security, IT, and OT
teams can address is device management. It is up to those
planning and/or implementing the rollout of IoT devices to
ensure that they are accounted for in asset management, systems
monitoring, security monitoring, and incident response systems.
Breaches and Hacks
There are two broad categories of attacks that involve IoT
devices: those in which the IoT devices themselves are the end
target of the attack, and those that use IoT devices to attack
other targets. We have seen both types of attacks used in the
real world and by security researchers as a proof of concept.
In October of 2016, an attack against Dyn, a company that
provides DNS services, made much of the internet inaccessible.
Twitter, Spotify, Github, Netflix, The New York Times, Paypal
and other major websites were down for hours.
The attack used the Mirai IoT Botnet, taking control of over
600,000 IoT devices to flood Dyn with traffic in a massive
DDoS attack. The devices seemed to be mostly routers and IP
cameras. IP cameras are frequently targeted IoT devices.
In a scary example of an attack where the IoT device was the
target, the “device” was a car. Fortunately, this was a controlled
demonstration by security researchers Charlie Miller and Chris
Valasek. They demonstrated the attack for Wired writer Andy
Greenberg, who was driving a Jeep Cherokee.
Miller and Valasek, from miles away over a cellular internet
connection, remotely turned on the A/C, radio, and windshield
wipers. That was just the beginning. Next, they caused the Jeep
to slow, remotely rendering the accelerator useless.How to
Secure IoT Systems and Devices
It is clear that IoT attacks can have serious consequences.
Securing IoT systems and devices must be done by both the
manufacturers and the organizations using them. The security
controls that organizations can put in place are similar to the
controls they already use on their network. The key to securing
IoT is to know what IoT devices are on your network and where
they are in your network topology. Until you know that, you are
flying blind. You cannot protect what you cannot see.
One way to identify IoT devices on your network is to require
all hosts and devices to authenticate when joining the network.
Devices that fail authentication can then be identified. If they
belong on the network, authentication can then be configured
for that device. If they do not belong on the network, you have
discovered a rogue device.
You can further secure IoT devices by segmenting the network
and dedicating one segment to IoT. This will allow you to
firewall that segment and apply IoT-specific rules. It would also
allow you to quickly block traffic from that segment in the
event that an IoT device is compromised.
Once you have IoT devices authenticated, you can then gain
visibility into their activity using a cloud-native security
monitoring and analytics platform like Sumo Logic. The Sumo
Logic platform helps you make data-driven decisions and reduce
the time to investigate security and operational issues so you
can free up resources for more important activities. For even
greater visibility into security events, integrated threat
intelligence from Crowdstrike is included for up-to-date IOC
data that can be quickly cross-correlated to identify threats in
your environment.
Reference: https://www.sumologic.com/blog/iot-security/

More Related Content

More from braycarissa250

1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx
braycarissa250
 
1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx
braycarissa250
 
1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx
braycarissa250
 
1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx
braycarissa250
 
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
braycarissa250
 
1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx
braycarissa250
 
1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx
braycarissa250
 
1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx
braycarissa250
 
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
braycarissa250
 
1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx
braycarissa250
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx
braycarissa250
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
braycarissa250
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx
braycarissa250
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
braycarissa250
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
braycarissa250
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx
braycarissa250
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
braycarissa250
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
braycarissa250
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx
braycarissa250
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx
braycarissa250
 

More from braycarissa250 (20)

1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx
 
1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx
 
1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx
 
1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx
 
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
 
1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx
 
1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx
 
1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx
 
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
 
1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Assignment 1 Social Performance of OrganizationsAccording to .docx

  • 1. Assignment 1: Social Performance of Organizations According to the textbook, the current world economy is increasingly becoming integrated and interdependent; as a result, the relationship between business and society is becoming more complex. In this assignment, you will be researching a Fortune 500 company from an approved company list provided by your professor. Be sure to check the list before you begin. Write a four to six (4–6) page paper in which you: 1. Specify the nature, structure, and types of products or services of your company, and identify two (2) key factors in the organization’s external environment that can affect its success. Provide an explanation to support the rationale. 2. Suggest five (5) ways in which the primary stakeholders can influence the organization’s financial performance. Provide support for the response. 3. Specify one (1) controversial corporate social responsibility concern associated with your company. 4. Submit a reference page with at least four (4) quality references that you have used for this paper. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; APA style format. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: · Analyze the relationship between business and society, and the ways in which they are part of an interactive system.
  • 2. · Recommend ways stakeholders can influence the destiny of both business and society. · Analyze the various primary and secondary stakeholder groups, their roles, and relationships. · Compare and contrast the concepts of corporate social responsibility and citizenship. · Analyze ways ethical challenges affect the multiple functions of the business. · Use technology and information resources to research issues in business and society. · Write clearly and concisely about business and society using proper writing mechanics. Specific Library Resources to help you get started:. · Introductory Search - Use the home page’s search box to keyword search many, but not all, databases. · Targeted Search - Scroll to the bottom of the page for an A to Z listing of all databases. Float over each link to see a description of the database and click to load that particular database’s custom search page. Custom search pages include both basic and advanced search options. · These databases are only partially searchable through the general search bar. You will have to search for them individually to find resources for your paper. . Nexis Uni - This contains legal information and would be useful to search for court cases in which your company has been involved. . Video Explaining Nexis Uni · Research Starters are like the academic version of Wikipedia. Search on a topic to get an overview with links to other information within that topic. It will help you get ideas for keywords for your own searches and what you need to know in order to successfully write your paper. . Research Starters - Business . Library Databases - Research Starters · Don't stress over writing papers! Watch this video on writing papers and essays:
  • 3. https://www.youtube.com/watch?v=KlgR1q3UQZE&t=9s. Topics include how to start your research, how to organize your research, how to draft your paper, and how to revise it. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills. . ***THIS IS THE ONLY APPROVED LIST OF COMPANIES FOR THIS ASSIGNMENT*** BUS475 Week 4 & 9 Assignment Company List (NO EXCEPTIONS) Johnson & Johnson Disney Delta Airlines Citibank Microsoft Lockheed Martin FedEx Costco Verizon Assignment 1: Social Performance of Organizations
  • 4. According to the textbook, the current world economy is increasingly becoming integrated and interdependent; as a result, the relationship between business and society is becoming more complex. In this assignment, you will be researching a Fortune 500 comp any from an approved company list provided by your professor. Be sure to check the list before you begin . Write a four to six (4 – 6) page paper in which you: 1. Specify the nature, structure, and types of products or servi
  • 5. ces of your company, and identify two (2) key factors in the organization’s external environment that can affect its success. Provide an explanation to support the rationale. 2. Suggest five (5) ways in which the primary stakeholders can influence the organi zation’s financial performance. Provide support for the response. 3. Specify one (1) controversial corporate social responsibility concern associated with your company. 4. Submit a reference page with at least four (4) quality references that you have used for this paper. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: · Be typed, double s
  • 6. paced, using Times New Roman font (size 12), with one - inch margins on all sides; APA style format. · Include a cover page containing the title of th e assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment ar e: · Analyze the relationship between business and society, and the ways in which they are part of an interactive system. · Recommend ways stakeholders can influence the destiny of both business and society. · Analyze the various primary and secondary stakehol der groups, their roles, and relationships. ·
  • 7. Compare and contrast the concepts of corporate social responsibility and citizenship. · Analyze ways ethical challenges affect the multiple functions of the business. · Use technology and information resources to research issues in business and society. · Write clearly and concisely about business and society using proper writing mechanics. Specific Library Resources to help you get started: . · Introductory Search - Use the home page’s search box to keyword search many, but not all, databases. ·
  • 8. Targeted Search - Scroll to the bottom of the page for an A to Z listing of all databases. Float over each link to see a description of the database and click to load that pa rticular database’s custom search page. Custom search pages include both basic and advanced search options. · These databases are only partially searchable through the general search bar. You will have to search for them individually to find resources for y our paper. Assignment 1: Social Performance of Organizations According to the textbook, the current world economy is increasingly becoming integrated and interdependent; as a result, the relationship between business and society is becoming more complex. In this assignment, you will be researching a Fortune 500 company from an approved company list provided by your professor. Be sure to check the list before you begin.
  • 9. Write a four to six (4–6) page paper in which you: 1. Specify the nature, structure, and types of products or services of your company, and identify two (2) key factors in the organization’s external environment that can affect its success. Provide an explanation to support the rationale. 2. Suggest five (5) ways in which the primary stakeholders can influence the organization’s financial performance. Provide support for the response. 3. Specify one (1) controversial corporate social responsibility concern associated with your company. 4. Submit a reference page with at least four (4) quality references that you have used for this paper. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: 12), with one-inch margins on all sides; APA style format. the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: the ways in which they are part of an interactive system. both business and society. groups, their roles, and relationships.
  • 10. and contrast the concepts of corporate social responsibility and citizenship. of the business. in business and society. rite clearly and concisely about business and society using proper writing mechanics. Specific Library Resources to help you get started:. - Use the home page’s search box to keyword search many, but not all, databases. ted Search - Scroll to the bottom of the page for an A to Z listing of all databases. Float over each link to see a description of the database and click to load that particular database’s custom search page. Custom search pages include both basic and advanced search options. general search bar. You will have to search for them individually to find resources for your paper. IoT References: https://www.techrepublic.com/article/how-to-secure-your-iot- devices-from-botnets-and-other-threats/ https://www.peerbits.com/blog/biggest-iot-security- challenges.html https://www.bankinfosecurity.asia/securing-iot-devices- challenges-a-11138 https://www.sumologic.com/blog/iot-security/ https://news.ihsmarkit.com/press-release/number-connected-iot- devices-will-surge-125-billion-2030-ihs-markit-says https://cdn.ihs.com/www/pdf/IoT_ebook.pdf https://go.armis.com/hubfs/Buyers%E2%80%99%20Guide%20to %20IoT%20Security%20-Final.pdf
  • 11. https://www.techrepublic.com/article/smart-farming-how-iot- robotics-and-ai-are-tackling-one-of-the-biggest-problems-of- the-century/ Video Resources:What is the Internet of Things (IoT) and how can we secure it? https://www.youtube.com/watch?v=H_X6IP1-NDc What is the problem with IoT security? - Gary explains https://www.youtube.com/watch?v=D3yrk4TaIQQ Personal data breaches and securing IoT devices · By Damon Culbert (2019) The Internet of Things (IoT) is taking the world by storm as interconnected devices fill workplaces and homes across the US. While the intention of these devices is always to make our lives easier, their ability to connect to the internet turns them into ticking time bombs, lying in wait until their weaknesses can be exploited by opportunistic hackers. Personal data breaches are skyrocketing in America, increasing by 60% in the last year and by 157 percent since 2015. As our interconnectivity grows, so do the opportunities that our technology will be hacked. Since every IoT device is connected to the internet, each one is vulnerable to external access if not secured properly. In the rush to manufacture these devices and get them onto the market, security has been an afterthought which needs to be urgently addressed if the number of yearly data breaches is to be tackled. Not only is the actual security of IoT devices under constant debate but recent news stories surrounding both the Amazon Alexa and Google Home products -- central machines to most home IoT set-ups -- show that even when used properly, the security implications of these devices can be suspect. Though many expect IoT to revolutionize our everyday lives, the potential holes they open up in our security infrastructures could become an insurmountable problem if not dealt with soon. Workplace IoT
  • 12. IoT in the workplace can range from integrated systems such as air conditioning and security systems to Wi-Fi enabled coffee machines. But every point of access in a system has potential for weakness, meaning the more connected devices there are the harder it is to protect. Many believe that blockchain technology has the answer for IoT security issues due to its decentralized nature and the ability to timestamp and identify each connected device, allowing for more accurate access records and a more stable network where no central point is vulnerable. The other key issue with workplace IoT is the necessity of regular updates to keep all devices secured. In working environments where machines are working 24/7, there is no time to take machines out of service to complete updates, meaning identified weaknesses can be left unresolved. This allows hackers multiple opportunities to exploit the insecurities in an individual device and gain access to the central network from there. Creators of IoT devices will need to address the concerns of their consumers in order to create products which can be routinely secured and hold a high base standard of security. Integrated homes With an explosion of interconnected devices for the home comes a unique challenge that consumers are often completely oblivious to. Some IoT devices have no way to securely store the Wi-Fi password which connects them, meaning that a hacker who is able to gain access to this device can find the Wi-Fi password and exploit the entire network, risking data such as banking and personal details as well as general internet activity. It’s unrealistic to expect consumers to use blockchain security for their washing machines and digital cameras so necessary security changes are going to have to start with the brands making the products. Ensuring that safety is properly considered before marketing any IoT device is the surest way to keep consumers’ data safe within their own network. Google Home and Amazon Alexa While not directly at the mercy of hackers, the recent
  • 13. revelations that recordings taken by both Amazon’s Alexa and Google Home devices have been sent to human listeners within the company raises different privacy concerns. The companies have assured that the recordings have been shared with human employees for training and research purposes but as the recent leak shows, holding personal data on recordings makes it susceptible to malicious actors online. Amazon have taken further steps to allow users to control how Alexa stores their data and have it deleted using voice commands, making it slightly easier to protect what you say in your own home. However, many consumers buy these products without thinking of the implications of keeping a device that is always listening in their home. Companies who produce home assistant speakers need to be more transparent with how they use consumer data and take further steps to ensure no sensitive personal data is kept in recordings to help reduce the number of data breaches each year. Trials are set to begin in the UK by Natwest bank where Google Home users will be able to check their balance with their voice. As this follows immediately on from the leaked recordings, it seems there is still little concern for the ways in which we share our personal data with the devices we use. However, online security will likely become a much bigger topic in the future as the number of internet-enabled devices rises. The Internet of Things is proving that technology continues to advance at a rapid pace. Although consumers will need to ensure that security is a high priority in order to protect their own data and data handled by organizations, the first step must be taken by manufacturers to ensure these products are created to high security standard. Reference: https://betanews.com/2019/08/13/securing-iot- devices/ Final Research Project - Securing IoT Devices: What are the Challenges?
  • 14. Internet security, in general, is a challenge that we have been dealing with for decades. It is a regular topic of discussion and concern, but a relatively new segment of internet security is getting most attention—internet of things (IoT). So why is internet of things security so important? The high growth rate of IoT should get the attention of cybersecurity professionals. The rate at which new technology goes to market is inversely proportional to the amount of security that gets designed into the product. According to IHS Markit, “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.” IoT devices are quite a bit different from other internet- connected devices such as laptops and servers. They are designed with a single purpose in mind, usually running minimal software with minimal resources to serve that purpose. Adding the capability to run and update security software is often not taken into consideration. Due to the lack of security integrated into IoT devices, they present significant risks that must be addressed. IoT security is the practice of understanding and mitigating these risks. Let’s consider the challenges of IoT security and how we can address them. Some security practitioners suggest that key IoT security steps include: 1. Make people aware that there is a threat to security; 2. Design a technical solution to reduce security vulnerabilities; 3. Align the legal and regulatory frameworks; and 4. Develop a workforce with the skills to handle IoT security. Final Assignment - Project Plan (Deliverables): 1) Address each of the FOURIoT security steps listed above in terms of IoT devices. 2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
  • 15. Bottom of Form Top of Form Bottom of Form What are the Challenges of IoT Security? IoT has many of the same security challenges that other systems have. There are, however, some challenges that are unique to IoT. 1. Embedded Passwords. Embedding passwords in IoT devices make it easy for remote support technicians to access devices for troubleshooting and simplifies the installation of multiple devices. Of course, it also simplifies access to devices for malicious purposes. 2. Lack of device authentication. Allowing IoT devices access to the network without authenticating opens the network to unknown and unauthorized devices. Rogue devices can serve as an entry point for attacks or even as a source of attacks. 3. Patching and upgrading. Some IoT devices do not provide a simple (or any) means to patch or upgrade software. This results in many IoT devices with vulnerabilities continuing to be in use. 4. Physical hardening. Physical access to IoT devices can introduce risk if those devices are not hardened against physical attack. Such an attack may not be intended to damage the device, but rather to extract information. Simply removing a microSD memory card to read its contents can give an attacker private data, as well as information such as embedded passwords that may allow access to other devices. 5. Outdated components. When vulnerabilities are discovered in hardware or software components of IoT devices, it can be difficult and expensive for manufacturers or users to update or replace them. As with patches, this results in many IoT devices with vulnerabilities continuing to be used. 6. Device monitoring and management. IoT devices do not always have a unique identifier that facilitates asset tracking, monitoring, and management. IT personnel do not necessarily consider IoT devices among the hosts that they monitor and
  • 16. manage. Asset tracking systems sometimes neglect to include IoT devices, so they sit on the network without being managed or monitored. Most of these issues can be attributed to security being an afterthought (if a thought at all) in the design and manufacturing of IoT devices. Even those IoT developers who consider security in the design process struggle with implementation. Most IoT devices are limited by minimal processing power, memory, and data transfer speeds. This is a necessary evil in order to keep the size and cost of the devices small. Accordingly, security controls must be implemented to compensate for these inherent weaknesses. The first step to implementing security controls is to determine where those controls are needed. This is another challenge for protecting IoT devices. Since IoT devices are often not recognized as network devices, they get overlooked when inventorying or mapping the network. If you do not know it is there, you cannot protect it. Fortunately, IoT device manufacturers are beginning to address these issues, but organizations that are planning or currently using IoT cannot sit back and wait for that to happen. There are measures that organizations can take right now to protect their IoT devices and networks from attacks.Security Requirements of IoT Manufacturers and implementers must implement security practices to mitigate IoT risks. Steps can be taken to better secure IoT and address known risks. Security Challenge Solution Embedded passwords
  • 17. Rather than embedding passwords in their products, manufacturers should require users to create a strong password during device setup. Lack of device authentication Manufacturers should provide a means for their devices to authenticate to the network. IT personnel should require devices to authenticate before joining the network. Patching and upgrading Manufacturers need to make it easy for devices to be upgraded or patched. Ideally, this would be an automatic or one-click process. Physical hardening IoT devices should be made tamper-proof. Devices should be monitored to detect time offline and inspected after unexpectedly dropping offline. Outdated components Vulnerable devices should be updated or replaced. This can be difficult to remedy, especially in environments that have many IoT devices in remote locations. In those cases, tighter security controls and more vigilant monitoring should be implemented. Device monitoring and management Ensure that all IoT devices are included in asset tracking, monitoring, and management systems. Manufacturers should provide a unique identifier for each device.
  • 18. Clearly, many of these security issues can only be resolved by the manufacturer. One that organizations’ security, IT, and OT teams can address is device management. It is up to those planning and/or implementing the rollout of IoT devices to ensure that they are accounted for in asset management, systems monitoring, security monitoring, and incident response systems. Breaches and Hacks There are two broad categories of attacks that involve IoT devices: those in which the IoT devices themselves are the end target of the attack, and those that use IoT devices to attack other targets. We have seen both types of attacks used in the real world and by security researchers as a proof of concept. In October of 2016, an attack against Dyn, a company that provides DNS services, made much of the internet inaccessible. Twitter, Spotify, Github, Netflix, The New York Times, Paypal and other major websites were down for hours. The attack used the Mirai IoT Botnet, taking control of over 600,000 IoT devices to flood Dyn with traffic in a massive DDoS attack. The devices seemed to be mostly routers and IP cameras. IP cameras are frequently targeted IoT devices. In a scary example of an attack where the IoT device was the target, the “device” was a car. Fortunately, this was a controlled demonstration by security researchers Charlie Miller and Chris Valasek. They demonstrated the attack for Wired writer Andy Greenberg, who was driving a Jeep Cherokee.
  • 19. Miller and Valasek, from miles away over a cellular internet connection, remotely turned on the A/C, radio, and windshield wipers. That was just the beginning. Next, they caused the Jeep to slow, remotely rendering the accelerator useless.How to Secure IoT Systems and Devices It is clear that IoT attacks can have serious consequences. Securing IoT systems and devices must be done by both the manufacturers and the organizations using them. The security controls that organizations can put in place are similar to the controls they already use on their network. The key to securing IoT is to know what IoT devices are on your network and where they are in your network topology. Until you know that, you are flying blind. You cannot protect what you cannot see. One way to identify IoT devices on your network is to require all hosts and devices to authenticate when joining the network. Devices that fail authentication can then be identified. If they belong on the network, authentication can then be configured for that device. If they do not belong on the network, you have discovered a rogue device. You can further secure IoT devices by segmenting the network and dedicating one segment to IoT. This will allow you to firewall that segment and apply IoT-specific rules. It would also allow you to quickly block traffic from that segment in the event that an IoT device is compromised. Once you have IoT devices authenticated, you can then gain
  • 20. visibility into their activity using a cloud-native security monitoring and analytics platform like Sumo Logic. The Sumo Logic platform helps you make data-driven decisions and reduce the time to investigate security and operational issues so you can free up resources for more important activities. For even greater visibility into security events, integrated threat intelligence from Crowdstrike is included for up-to-date IOC data that can be quickly cross-correlated to identify threats in your environment. Reference: https://www.sumologic.com/blog/iot-security/