Tuesday, January 28, 2020

Attack Tree Model Analysis of Security Breaches

Attack Tree Model Analysis of Security Breaches THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred Sandsmark, p11) The above-mentioned stated that there was slightly increase in computers attack in 2005. As technology evolving, companies willingly to spend more money on computer systems to do business activities with their associate and partners. This will increase more and more security breaches on the computer systems. The purpose of this analysis report is to examine the various possible attack methods to compromise the availability of the computers, information and associated resources of a small firm. Research for this report includes an attack tree diagram, showing how the hacker can compromise the availability of the systems services, associated resources and to access sensitive information through different attack techniques. Each technique is the subset of the different type of attack methods, with possible assumptions attach to each methods, the attack tree will be discussed in greater details. INTRODUCTION The manager of the Raylee Pte Ltd has recently heard through the media and newspaper publications that there are numerous threats which could compromise the availability of the computers, information and associated resources. Management of Raylee Pte Ltd has decided to hire the security consultant firm Red Alert Security Pte Ltd to undertake a details analysis of its current computer and network state in order to prevent the hackers to compromise the availability of the computers services, information and resources. The under-mentions are the network and desktop environments of the Raylee Pte Ltd. There are six computers and one internal server (for processing orders) within the firm. Each computer encompasses Microsoft Windows 7 and Microsoft 2007 Each workstation has been patched with all updates as of March 25th, 2010. The company shares an ADSL 2+ connection amongst all computers. Server backups are done fortnightly and stored on a DVD spindle name backup1 Workstation backups are done bi-monthly and stored on a DVD spindle name backup2 Employees have email addresses provided by the Internet Service Provider. Documents are shared amongst employees through a D-Link DNS-323 NAS The router is utilising a default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. SCOPE Security consultant of Red Alert Security Pte Ltd will analyse of the company current computer system, network state and desktop environment in order to prevent the hackers to compromise the availability of the computers services, information and resources. Then the consultant will submit a detail analysis report to the Management of Raylee Pte Ltd for recommendations METHODOGLY The security consultant uses a technique known as attack tree to identify the best possible options to compromise the availability of the system services, information and resource in the quickest time. Below is the attack tree he comes up with. Compromise The Availability Of Computers, Information And Associated Resources 1. Remote Access Router: D-Link DSL G604t 2. Access NAS: D-Link DNS-323 3. 3. Gain Access Internal Server (Processing Orders) Orders) 4. Steal Password: Workstations METHODOLOGY From the attack tree in the previous page, each of the sub attack tree will be discussed in more detail. Figure 1 1. Remote Access Router : D-Link DSL G604t 1.1 Determine the password 1.1.1 Learn password 1.1.2 Use widely know password 1.1.3 Dictionary attacks 1.1. Determine password Hacker and cyber criminal will try to determine the password of the router in order to access the network environment and do whatever they want. We will briefly explain the methods as follows 1.1.1 Learn password If the user has not set new password and is using the default which is normally blank. Hackers can easily search online for the manual of the particular wireless router and know the password. Hackers login the wireless router configuration page to change the setting and sabotage the network. For instance, hacker can surf this link http://www.routerpasswords.com/index.asp to get the default password for all the routers. 1.1.2 Use widely know password The common used passwords are admin, password, [emailprotected], 123456, 666666, qwerty, 00000000 and etc. These widely used passwords allow hackers to easily access the router. 1.1.3 Dictionary attacks As the word dictionary it implies that it is one of the attack techniques use by the hackers to determine its decryption key, password or passphrase by searching the all the words which are usually seven characters or lesser chosen by the user in the dictionary. METHODOLOGY Figure 2 2. Access NAS : D-Link DNS-323 2.1 FTP server 2.2 Folder File Permission 2.3 P2P distribution 2.1.1 Bounce Attack 2.1.2 Misconfigure 2.3.1 File poisoning 2.3.2 Sybil attack 2.1 FTP server Most of the Network Attach Storage device comes with the feature of the FTP server which allows user to download or upload file remotely anywhere. However, this service creates a loophole for attacker to retrieve sensitive information and data. The various attack methods on FTP server are discussed as follows 2.1.1 Bounce Attack FTP bounce attack is another attacking technique use by the hacker to exploit the ftp protocol so that he can use the PORT command to send request access to the ftp port indirectly to another victim machine which acts as third party for such request to access the ftp. 2.1.2 Misconfigure One of the common problems is to misconfigure the ftp server which allows users to download and upload the files in the same directory (global/tmp directory) for people to share data with each other. It will create an opportunity for attacker or theft to steal the data or upload virus program to the directory. Hence employee will accidentally install the virus program and infect to the computer systems and network. 2.2 Folder File Permission Proper folder and file permission must be set according to the employee roles and responsibilities. If there is no permission setting on the files and folder and gives everyone permission to read, write and execute it. Then it will be easily for attacker to retrieve information upon hacking into the company network. 2.3 P2P Distribution It is a peer-to-peer file transfer protocol to allow users each download different pieces of the broken file from the original uploader (seed). Users exchange the pieces with their peers to obtain the broken ones which are missing. IT savvy employees can make use of the P2P to download their favourite movies, videos, music and software. Hacker will make use of the P2P attacks to gain access into the network. There are two types of attacks which are file poisoning and Sybil attack. 2.3.1 File Poisoning File poisoning attacks operate on the data plane and have become extremely commonplace in P2P networks. The purpose of this attack is to replace a file in the network by a fake one and this file will be corrupted and no longer in use. 2.3.2 Sybil Attack The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Once the attacker gains the control, he can abuse the protocol in any way he likes. METHODOLOGY Figure 3 3. Gain Access Internal Server (Processing Orders) 3.1 Steal sensitive information from the database 3.1.1 Gain access by internet 3.1.2 Physical access to the server 3.1.3 Access server from workstation OR OR 3.1.1.1 Monitor network traffic 3.1.1.2 Use remote exploit 3.1 Steal sensitive information from the database Sometimes hackers are hired by the competitor to create chaos in the company network and to steal confidential information such as customer data, vendor data, pricing information, new product launch information from the computer systems. There are various methods to steal information from the database and there are as follows: 3.1.1 Gain Access By Internet Attack corporate network by using internet is becoming more sophisticated as technologies evolving. There is an increase of internet attacks orchestrate by the hackers to strike highly protected targets, to coordinate waves of scripted exploits and/or to conceal the true origin of an attack. 3.1.1 .1 Monitor Network Traffic Cyber criminal use network monitor tools to monitor the local area networks or wide area networks. Some of the network monitoring tools such as Microsoft Network Monitor, Ettercap, TCP Dump and DSniff can be download freely from the internet. This program can intercept and log the traffic passing over the network or part of the network. Once the information is captured by the program, hacker will decodes and analyse its content according to the appropriate RFC or other specifications. 3.1.1 .2 Use Remote Exploit The server is connected to the internet and the operating system is not updated the latest patches, then the cyber attacker will use remote exploit the vulnerability of the system to infiltrated the system to steal the information and sabotage the server by destroy the database and hard disk. Since the server backups are done fortnightly, management will be facing difficulties in recover the data. 3.1.2 Physical Access To The Server Due to the space constraint, sometime the server share space with someones cubicle or office. This creates an opportunity for an attacker who able to access files and other data by removes the hard disk, and then attaches it to another computer. He can also use third-party operating system CD to start the computer and steal corporate data or insert USB drive to inject virus into the system. 3.1.3 Access Server From Workstation Cyber attacker is not limited to hack into the server. Workstation is the often the first target the hacker will try to access because from there, he can learn about the network environment and security loopholes to attack the server. He will use the workstation as the stepping-stone to server-level break-in by stealing administrator passwords. METHODOLOGY Figure 4 4. Steal Password: Workstations 4.1 Users Login password 4.1.2 Obtain password illegally 4.1.1 Social Engineering 4.1.1.1 Share password 4.1.1.2 Phishing 4.1.2.2 Find written password 4.1.2.1 Steal password 4.1.2.1.2 Install keyboard sniffer 4.1.2.1.1 Obtain sniffer output file AND 4.1 Users Login Password Companies must know that hackers not only interested in the corporate data, they are also interested in the employees personal data such as bank account, credit card, email address and others. To break into the workstation, hackers will need to know the users login password. 4.1.1 Social Engineering Social engineering is the method of non technical hacking into the system by manipulating people through social interaction via email or phone to reveal their password. 4.1.1.1 Shared Password It is very common for employees to share computer password with their colleagues. Sometimes in their absence in the office, they will usually call one another to help them login to the computer to retrieve some information. 4.1.1.2 Phishing Hacker can create an email or instant messaging with attach fake website link which looks almost the same as the real one to lure the user enters their personal details such as username, password, credit card details and banking credential. All these information will be sending to the hacker. 4.1.2 Obtain Password Illegally Weak password makes hacker to obtain password illegally and faster. Cyber attackers will steal the password by infect the workstation with trojan. Basically there are three types of trojan attackers can use to steal the password namely: keyboard sniffer, login spoofing and password stealer. When attacker install the keyboard sniffer program which will monitor each keystroke the user has entered and this program generate the sniffer output file which send to the attacker. Sometimes hacker can pose as companys guest to access the premises. Upon entering the office, he will look for password which the employee written on a piece of paper and paste it around the working cubicle. CONCLUSION Companies are constantly at risk of losing sensitive corporate data. In this report,  we have use the attack tree model to analyse various attacks method the attackers use to steal sensitive information on the server, network attach storage device, router and workstations. The most common and easier method is to obtain the users password by learn the password, use widely common password, dictionary attack, shared password, phishing, find written password and steal passwords. Cyber attackers and novice hackers are usual like to steal the passwords by downloading keyboard loggers, passwords cracking software, keyboard sniffers and others which are available on the website to test on their skill. Management should implement counter measures to prevent hackers to attack their system and security breaches. We recommend antivirus program to be installed on  the workstation and server as they are utilising Microsoft Windows Malicious Software Removal Tool which is not enough for the prevention of the cyber attacks. Local group policy of the password needs to enforce on the networking devices, workstation and server so that the password is not being easily crack by the hackers. Lastly, passwords should be set minimum 8 characters and contain alphanumeric and symbols for complexity. In conclusion, steal password is the easiest method for hackers to attack the computer system because local authorities might face difficulties in tracking them down if they are distant hackers. GLOSSARY Attack tree Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. (Source : http://www.schneier.com/paper-attacktrees-ddj-ft.html ) Social Engineering In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. (Source : http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html ) 3. Phishing Phishing is a technique of fraudulently obtaining private information. (Source : http://en.wikipedia.org/wiki/Social_engineering_(security)#Pretexting ) 4. Keyboard Sniffer A program which reads the keystrokes made by a user and transmits them to someone else. Such programs are usually used by intruders into computer systems in order to capture important information such as passwords. (Source : http://www.encyclopedia.com/doc/1O12-keyboardsniffer.html ) 5. RFC Short for Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard. Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number. (Source : http://www.webopedia.com/TERM/R/RFC.html )

Monday, January 20, 2020

The Impact Of Television Essay examples -- essays research papers fc

The Impact Of Television   Ã‚  Ã‚  Ã‚  Ã‚  Since the beginning, there have been mixed reactions to television and it was E.B. White who wrote "I believe that television is going to be the test of the modern world, and in this new opportunity to see beyond the range of our own vision, we shall discover either a new and unbearable disturbance of the general peace or a saving radiance in the sky. We shall stand or fall by television, of that I am sure." (Murray 7) White was correct, it would either be beneficial or detrimental to society. Ever since the first television station was licensed in 1941, our lives have been effected by the presence of television. However, this effect is not for the negative since it is used from simple means of entertainment to a widely used, invaluable, source of information. It is also an excellent aid in preparing children for school and assisting in educating children after they have begun school.   Ã‚  Ã‚  Ã‚  Ã‚  Every day millions of people turn to their televisions as a form of escape from the pressures and stress of day to day life. The television, to them, serves the purpose of entertaining them for a half hour or an hour at a time. This is the purpose of sitcoms, such as the popular NBC produced shows Friends and Fraiser, each appealing to different audiences, but both comedy bases for purposes of entertaining. Humor is not the only approach used in television entertainment. Shows, such as NYPD Blue, use thick plot lines and heavy drama to draw the viewer in. Entertaining society through this media has become a multibillion dollar industry. Top movies like Jurassic Park, which grossed 390 million dollars, bring millions of people to movie theater, which are basically large televisions, for the soul purpose of entertainment. Movies are not restricted only to theaters since they are available on video cassette and even broadcasted into millions of homes each day. The privilege of television as entertainment should be used, but not abused. For instance, watching six hours of television every night, stopping only to eat and sleep does not promote and active lifestyle, however, on the other end of the spectrum, never watching any television does not expose a person to a vast array of entertainment and information.   Ã‚  Ã‚  Ã‚  Ã‚  Television is able to show different roles in society and therefore people are able to better u... ...more educational and informative programs for children.   Ã‚  Ã‚  Ã‚  Ã‚  Society has been effected and will continue to be effected, not only by television, but by media in general. Television is a constant form of entertainment and excellent source of information that is assessable by millions of people. The education content in children television is beneficial to preschoolers and students alike. However, television has been the blame for many of societies faults because it is easy to contribute it to violence and a social lack of initiative. Television is such a small part of a much larger picture and its benefits far outweigh its faults. The idea of television as an informative and education media must be embraced in the future to receive its full benefits. Even the thought of a society without television is incomprehensible to many. Bibliography "Background Information: The Impact of Television on Children's Education." Http://haas.berkely.edu/~atham/background.html (October 21, 1996) Murray, John P. "Children and Television Violence." Kansas Journal of Law & Public Policy, 4, No. 3 (1995), 7-14 "Top 50 Movies, 1993." The World Almanac and Book of Facts. 1995

Sunday, January 12, 2020

“A Conversation with my Father” by Grace Paley Essay

A Conversation with My Father is a fictional story about a daughter and her dying father. At his bedside, he asks her to tell a story. She tells a tragic story of a woman who gets involved in drugs because of her son but then the son leaves her and she is stuck in the drug lifestyle. She soon after decides to get her life back on track and she succeeds in doing so. The father rejects the daughters ending because he believes that she is avoiding tragedy. Through ambiguity and connotation in the conversation between daughter and father, Grace Paley shows that people are often afraid of confronting tragedy or even accepting it. Paley repeats the word end throughout the story. The father in A Conversation with My Father is the one that uses both words the most. In lines 6-7, the father says, Poor woman. Poor girl, to be born in a time of fools to live among fools. The end. The end. The father at first shows some sort of sympathy by recognizing that this woman was not in the best condition but he goes on to say that it is the end. By the end he means the end of her life and that her life cannot get back on track no matter what. Anytime that the narrator uses the word end it is meant to describe the end of the drug addict woman in the daughters story (Lines 6-8, 14). Grace Paley also has repetition of the word tragedy. The word tragedy is also ambiguous throughout the story. In line 9, the father says, what a tragedy. The end of a person. In this line the fathers usage of the word tragedy is not ambigious because it is clear that he is describing the end of the mother in the story. In line 14 the father says, Tragedy! Plain tragedy! Historical tragedy! In these lines it is unsure in what context that father is talking about tragedy. It is hard to tell whether he is talking about the character from the story or his own daughter. It seems like he is most likely talking about his daughter because in the line before that he says, You dont want to recognize it. The you refers to the daughter and the it refers to tragedy. The father believes that a weakness of his daughter is that she does not recognize or accept tragedy. The usage of the word tragedy and end together is what helps get Grace Paleys point across to the readers in this story. In several lines the father  mentions both words together in order to show that people are afraid of confronting tragedy or even accepting it (Lines 9, 14). In line 9 the father states that the end of a person is tragic but the daughter goes on to show her naà ¯vetà © ness by saying that it does not have to be the mothers end because in reality, the mother could go on to be successful at her current job or become even more successful at something else. It is this point in the story when the father tells the daughter that her writing is no good because she does not recognize tragedy and therefore there is no hope for her. After he tells her that there is no hope for her, he goes on to say The end. In that point in the story the phrase is used to describe how the father feels about his daughters future (Line 14). In the last line the father says, Tragedy! You too. When will you look it in the face? Here he is pointing out his daughters refusal to recognize or accept tragedy. He is calling her a tragedy because she will not recognize tragedy. At every point in the story before this, the author either used the word tragedy when talking about the mother from the story or about society as a whole but this is the point in the story when he lets his true feelings out. The father believes that society as a whole chooses not to recognize tragedy just like his daughter. He wants to show his daughter that she is turning into a tragedy because she will not accept tragedy like the rest of society. The father seems to believe that if you do not make tragedy a reality then you will become a tragedy yourself. Although there are specific examples throughout the story to show how the father believes that the daughter denies tragedy, there are several parts where the father also comments on the naà ¯vetà © of society when it comes to tragedy. In line 6 the father says, †¦born in a time of fools to live among fools. The word fools refers to society as a whole. The father is trying to say that we are all naà ¯vetà © because noone recognizes tragedy. He continues in this line to use the phrase the end (Line 6). The connotation of the phrase the end changes in this line. In this line it more refers to the entire general population instead of the specifically the mother from the story or his own daughter even though it seems like that is what he is referring to. In lines 22-23 the daughter says, Im sorry for her. Im not going to leave her there in that house crying (Actually neither would Life,  which unlike me has no pity.) By stating that the daughter shows that she does not believe in tragedy and that she refuses to let a story have a bad ending because it is immoral. This line not only shows that the daughter will not recognize tragedy but the second part, where she states that life would not leave the mother in the same condition either, proves that society feels the same way about tragedy. The phrase in the parentheses is interesting because it points out that life itself would not accept tragedy even though in general life pities no one. The whole point shows that although we as a people generally do not pity anyone or anything, we do make an acceptation for tragedy. The word tragedy and end are two very strong words in this short story. No other words would get the authors point across. The author used them ambiguously in order to get her point across to the audience. The father uses the story that he had his daughter tell to show her tragedy. He hoped to show her that people are afraid of it and that they often do not recognize it. He wanted her to realize her own tragedy before it led to her end because he believed that denying tragedy is what leads to failure or the end.

Friday, January 3, 2020

Ibm Organizational Behavior - 2228 Words

Introduction This paper is going to analyse in areas of accommodating cultural diversity in IBM and developing trust in the organisation. IBM is a head leader technology and services organisation working in 77 countries. The connection of the paper to IBM is just an outsider who made researches externally. The paper will be analysing what the expectation of organisation to be managed in those two areas based on literature review, then they are followed by how IBM actually managed. The differences between the theory and IBM’s management will be also explained. Finally, the recommendations will be made in each area. Accommodating cultural diversity in the workplace The expectation the organisation to be managed based on the relevant†¦show more content†¦People who come from cultures which view relationships in terms of hierarchy have a preference form highly structured teams. People from cultures that see relationships as a group want teamwork to be the norm and people from cultures that highlight the individual feel most comfortable with voluntary and informal teams (Aghazadeh 2004, p. 521). The differences between theory and practices There are not many differences between theory and practices; IBM has matched their culture diversity implementation to the literatures. In summary, the major strategies to manage diversity are training for diversity awareness, leadership development and recruitment and selection policies. Recommendation Organisations in which aimed to be flexible and responsive to a demanding marketplace requiring greater attention and service. Therefore; there is likely a need to perform a multiple-skilled and adaptable workforce (Farrer 2004, p. 175). Moreover, the diverse workforce would be able to better deal with and adapt to the varied needs of the customer as well as the varied needs of the employee as there are increased communications and a global focus (Allen et al. 2008, p. 24). IBM’s leaders in every generation have been concerned that diversity was right for the company no matter what the prevailing issues of the day mandated. IBM has already considered diversity as a business imperative to build a workforce as a broad and diversified regardlessShow MoreRelatedOrganizational Structure Essay1147 Words   |  5 PagesDate: January 18, 2013 To: MG 561 Class From: Jessica Rushing Subject: â€Å"Organizational Structure† Introduction: Organizational structure provides the framework of an organization determining how roles and responsibilities are delegated throughout the different levels of the organization. It has been defined by some as the looking glass through which coworkers see their organization and its surrounding environment while others have described structure as the backbone of the organizationRead MoreChange The Structure At Ibm1594 Words   |  7 PagesTo change the structure at IBM, Gerstner needed to clearly communicate his plans, goals, and vision to all stakeholders. Gerstner gave a speech early on with IBM leaders and explained â€Å"why he took the job, what his early expectations were, his thoughts on the structure and strategy of IBM, and morale† (Gerstner, 2002, pg. 22-23). Further, he felt strongly that employees need to essentially have the fire under them lit. He felt his role as CEO required him to define and communicate the crisis, itsRead MoreCase Study Of Ibm s Wise Investmen t Essay1525 Words   |  7 PagesUniversity Online IBM’s Wise Investment Considering that IBM has expanded to having clients in 170 countries and now does two-thirds of its business outside the United States it is vitally important to keep a management team devoted to IBM’s team projects. This has especially been noteworthy for IBM because the market has witnessed how instrumental management teams are and how they bring more positive changes to an organizationRead MoreOrganizational Change Management : An Organization1501 Words   |  7 Pagesorganizations, the change manager should have no doubt about the organization’s ability to identify where to focus energy or how to manage the change required to reach its potential (Palmer, Dunford, Akin, 2009). In regards to the importance of the organizational change, effectively determining its catalysts is a defining management skill. Organizations need to be sensitive to the need for change to thrive (Readers Forum, 1996). Present and future needs inside and outside an organization ar e consistentlyRead MoreOff-Hour Monitoring: Roulon-Miller vs. IBM Case Analysis656 Words   |  3 PagesOff-hour Monitoring IBM had policies in place to prevent conflict of interest between employees and a policy that stated that IBM respected an employees right to privacy during off hours (Rosser, 2011). In the case of Roulon-Miller v IBM (1981), the plaintiff had worked for IBM for sixteen years and was terminated for a relationship with a former employee that was working for a competitor. The court ruling against IBM was based on inadequate policies to justify the action taken against the employeeRead MoreEnvironmental Leadership of IBM Essay977 Words   |  4 PagesFactor: Environmental Leadership of IBM IBM has not only succeeded in maintaining its competition in providing software, computer technology and systems integrators, but IBM also successfully managing its resource such as energy, water, and material, including waste product, thus offering environmentally friendly products and services which have been recognized by various parties and has received many awards (IBM Environment Report, 2012). IBM success is always related to the leadership style ofRead MoreAre the Precepts of the IBM Training Program Consistent with the Concepts in This Chapter? Why or Why Not?859 Words   |  4 Pages1. The precepts of the IBM training program are consistent with the concepts in this chapter because there are a lot of consensuses. There are for example power, which is according to Robbins and Judge, â€Å"a capacity that A has to influence the behavior of B so that B acts in accordance with A’s wishes† (p.420) and the power tactics, which are, according to Robbins and Judge, â€Å"ways in which individuals translate power bases into specific actions† (p.425). There are different power tactics an individualRead MoreCross Cultural Relationships1105 Words   |  5 Pagesperceptions, norms, and patterns of thinking, and consequently adapt their behaviors according to specific cultural contexts. Managing people across cultures  offers solid theoretical frameworks and practical insights to handle the cultural challenges in managing people in a globalized workplace. Cross cultural management addresses topics including cross-cultural communication and understanding at both interpersonal and inter-organizational levels, leading multicultural and global virtual teams, cross-culturalRead More Cultural Values and Personal Ethics Paper1361 Words   |  6 PagesCultural Values and Personal Ethics Paper Personal, organizational, and cultural values are the basis of an individuals personal and professional decision-making style. These values are the key ingredients that make up our core beliefs. Values are ideas that are actions which could be right or wrong, good or bad that are the basis of human action (Tosi 2000). Personal values might also be called morality, since they reflect general expectations of any person in any society, acting in any capacityRead MoreEssay about IBM Case Analysis1455 Words   |  6 PagesCase overview: Change in the business from local to global prospect provided for great opportunity to grow and at the same time brought in more challenges in the organizational structure of the companies. This case provides for a detailed discussion about various challenges present in developing a global integration. There are various forces that narrated about the reasons for IBM’s decision to become a globally integrated enterprise (Kanter, 2009). Various requirements enabled in developing the