As a network administrator for Illinois branch of MacDonald Company, I was fired two weeks ago because I failed to secure the network when it failed for two hours. The human resource manager, someone who does not differentiate between a computer CRT monitor and a TV set, got angry at me and fired me. She cited that I was sleeping on the job because two hours for such a big company was too much;. I feel I was fired for no apparent reasons. My argument is that systems fail and I do not have to know all solutions to all problems. There are systems that fail for one week! I have requested time and again that an offsite backup system be introduced into the system. This has not been taken into consideration;.
My firing will not go unchallenged. I have a well set strategy that will be a good gift and thank you for McDonald Company. I have the firewall credentials for the company and when I tried two days ago, it was still working and accessible. With the passwords, I am able to get access important information like the finance department. My strategy is well set and I have even posed as a supplier to the finance manager two days ago. We chat and we agreed that I will supply some sugar at a cheaper price. I accessed the information of one of the no-so much trusted supplier some few days ago. I was able to use the network even outside the intranet. I was able to do this because I had the passwords for the system. I am therefore waiting for the agreed time to access the system.
This problem could have been avoided by the company by changing passwords to important systems immediately a very sensitive employee leaves the company. The security policy regarding passwords is not that strong.
Allen, J. (2003). The ultimate guide to system security. Boston: Madison-Wesley.
Andress, J. (2011). The basics of information security. New York: Elsevier.
Benantar, M. (2006). Access control systems: Security, identity management and trust models . New York: Springer.
Garcia-Alfaro, J. (2010). Data privacy management and autonomous spontaneous security. New York: Springer.
Kim, D., & Solomon, M. (2010). Fundamentals of information systems security. Texas: Jones & Bartlett Learning.
Matt, C. (1997). Introduction to Network security. New York: Wiley.
Pfleeger, C., & Pfleeger, S. (2003). Security in computing. London: Prentice Hall Professional.
The paper "Example of research paper on disgruntled employee" was contributed to our database by a real student. You can use this work as a reference for your own writing or as a starting point for your research. You must properly cite any portion of this sample before using it.
If this work is your intellectual property and you no longer would like it to appear in our database, please request its deletion.Ask for Removal
Create a Citation on Research Paper
PaperPrompt. (2021) 'Example of research paper on disgruntled employee'. 28 November.
PaperPrompt. (2021, November 28). Example of research paper on disgruntled employee. Retrieved from https://paperprompt.com/example-of-research-paper-on-disgruntled-employee/
PaperPrompt. 2021. "Example of research paper on disgruntled employee." November 28, 2021. https://paperprompt.com/example-of-research-paper-on-disgruntled-employee/.
1. PaperPrompt. "Example of research paper on disgruntled employee." November 28, 2021. https://paperprompt.com/example-of-research-paper-on-disgruntled-employee/.
PaperPrompt. "Example of research paper on disgruntled employee." November 28, 2021. https://paperprompt.com/example-of-research-paper-on-disgruntled-employee/.
"Example of research paper on disgruntled employee." PaperPrompt, 28 Nov. 2021, paperprompt.com/example-of-research-paper-on-disgruntled-employee/.
Get in Touch with Us
Do you have more ideas on how to improve Example of research paper on disgruntled employee? Please share them with us by writing at the [email protected]