Anda di halaman 1dari 15

c 

à  

Inbound logistics : Refers to goods being obtained from the organisations suppliers
ready to be used for producing the end product.

’ 
: The raw materials and goods obtained are manufactured into the final
product. Value is added to the product at this stage as it moves through the production
line.

’   

 Once the products have been manufactured they are ready to be
distributed to distribution centres, wholesalers, retailers or customers.

    
Marketing must make sure that the product is targeted towards
the correct customer group. The marketing mix is used to establish an effective
strategy, any competitive advantage is clearly communicated to the target group by
the use of the promotional mix.

 
: After the product/service has been sold what support services does the
organisation have to offer. This may come in the form of after sales training,
guarantees and warranties.

With the above activities, any or a combination of them, maybe essential for the firm
to develop the competitive advantage which Porter talks about in his book.

 

The support activities assist the primary activities in helping the organisation achieve
its competitive advantage. They include:

à   : This department must source raw materials for the organisation and
obtain the best price for doing so. For the price they must obtain the best possible
quality

        The use of technology to obtain a competitive advantage


within the organisation. This is very important in today¶s technological driven
environment. Technology can be used in production to reduce cost thus add value, or
in research and development to develop new products, or via the use of the internet so
customers have access to online facilities.
Ô 
      The organisation will have to recruit, train and
develop the correct people for the organisation if they are to succeed in their
objectives. Staff will have to be motivated and paid the µmarket rate¶ if they are to
stay with the organisation and add value to it over their duration of employment.
Within the service sector eg airlines it is the µstaff¶ who may offer the competitive
advantage that is needed within the field.

   
  : Every organisations needs to ensure that their finances, legal
structure and management structure works efficiently and helps drive the organisation
forward.

As you can see the value chain encompasses the whole organisation and looks at how
primary and support activities can work together effectively and efficiently to help
gain the organisation a superior competitive advantage.

© 
     
  


    



c           

a à          


a à      
a a        
a 3 
a u  


à     
à 

£ ©               

£ º           


       

£                       


        

£ c à    à  cÃà3 !"#


3          
     $a  %   &

à  c à    à  

 Ã               

' ©       &  & 


 

# (                 


       

) *                      

à  º  à 

£ º 

ü ©       

ü           

ü Ô& &+

    &   

' ,     3 


# ©  &         &     
  &    Ã   &    

) ©,           , 
 

- $. & &    &  


    ,    

£ /

ü ©     0    

ü     Ã   

£ 3& 

ü &      &    &    


          ,
     &   

ü 3&      0    
    

à    à

£ Ã    à


ü Ã             

ü 31             &

£ © &        




ü ©  

ü º 

ü à  


© 3 

£ Ã    &         

£ 3º     


ü            

ü              

ü         & &   

ü ©  

ü a         2 

ü a     &   &     


 

ü Ã  

à  

£ Ã    

ü        &&     &
       

£ à  


ü V     &  .         
    "'3 

ü .            

º      


 




ü 3  &    &         


       +

3




ü º      &  & 

à



ü º    &    

a       



£    
a              

£ a    
(           

£ V  
à           

£  
V & &  &   &       
  

   +

a © 3 +


a ©   &  +
a ©     Ô  / &  &  +
a  


        +
a 3


   .   &+
a à


©& .          +

é u V 




£ o  à  



à 

ü Ãé       0  &   &   &  


             +

ü 6   

ü                1


   

ü    o 


 


ü Ô      &   &    4  


&5   

ü A      

ü &    Ã 3          
  
ü © &       .   
      & & &  

0%    6V

£   1    0   &   

£ ©     Ã         
1 0&     &0&    

£    .  1 é   &1       &0
&          0&   &

é          




(      

Machine translationî   


    MTî   
                         
           

           


 &   &  (  7    

u  
 


     


   
 
   
   
           
   

       


   

 

 
     
   !      î   
    
 "       

à      




ü         


ü ©   


         
        

ü   à  c 

# à


ü    &           

ü   &   

# ’ 



ü          


  

ü    (  c 

# a   
        

# ’      .0 

# Ã    *    c 

# 3  


  
   
Methods of enhancing internet security

Prevention

This kind of approach refers to limiting the level of information available to personnel. In
this case, businesses can ensure that their employees only gain access to information that
they need to complete certain tasks. This means that even those who modify information
should only do this within their own jurisdictions. Additionally, businesses should restrict
information availability completely for documents that are extremely sensitive. (Roily, 2007)

All the latter categories ought to be determined by the process of data classification. One
can define data classification as the process of labeling data on the basis of security
vulnerability or sensitivity. Organizations ought to place their documents into the following
categories

a Top secret
a Open
a 3ecret
a ºonfidential
The classification system is the first step in protecting one's documents because it lays out
the major framework for security. The person who should do the classification is the owner
of the information. Besides the latter, it is very necessary for businesses to document all the
classifications systems within a security handbook. This is instrumental in the event that a
security crisis occurs. (Fraser et al, 2005)

Policy changes

No method of information security can be successful without changing the policies and
procedures within organizations. Organizations must struggle to create an environment
where workers respect the issue of internet security. Here, it would be necessary to create a
disciplined environment where work practices foster information security. Additionally, those
people who are given confidential information must be capable of maintaining its integrity.
This means that they must be trustworthy. Businesses must also explain to their staff about
the most vital information and information that is not. This means that a large percentage
of them need to keep off sensitive information. (Garfinkel, 2001)

ºompanies ought to train their employees about security threats. Here, the training
sessions are supposed to inform the employees about how to use security tools, how to
detect threats and how to deal with them. Here, employees need to know the experts they
can contact in case of a perceived security threat. Besides that, they should also be
informed about how to make back up systems. Training is especially important for new
employees within the company.

Clarification of problems
3ecurity threats differ from business to business. 3ome groups may be very vulnerable to
internet crime while some may not. ºonsequently, guidelines should be laid out as to what
constitutes a security threat and how vulnerable one is. The following should be outlined
clearly

a 3ecurity targets
a àrinciples of information classification
a Responsible personnel
a àrinciples for reaching targets
In line with the latter, organizations should create a well laid out security plan. While
curbing internet crime can be done in variety of ways, businesses should prioritize the most
important security measures. Management and users need to be told about their
responsibilities. (Grimes, 2004)

Ãmplementing internet security

3ecurity implementation can be done through a variety of methods. The first one is through
authorization. Authorization ought to be done through two major steps; validation and
identification.

Identification can be done through simple or more complex methods. 3ome companies opt
to use password systems. Here, specific individuals are given passwords that act as keys to
information. ºompanies that manage to use this system successfully are those ones that
have one password for each individual. When everyone can use a password, then it makes it
a lot easier for internet crime to occur. Good passwords must be distinct, must be changed
frequently and must not be repeated if they had ever been used in the past. Lastly,
passwords must be changed when individuals leave job positions or change departments.
(Dekker, 2006)

These days, security systems have improved tremendously. The latter method of passwords
merely depends on something that a user possesses. However, more effective security
measures depend on things that one has and things that one knows. For example, an
organization could ask for a password along with a magnetic card in order to enhance
security. The magnetic card contains some confidential information which can be identified
by the computer system. Additionally, businesses can use chip cards. The chip normally has
memory. (Van and Forno, 2001)

A more effective system is one that combines, something one has, with something one
owns and something that is such as biometric systems. Here, individuals are only allowed to
access certain categories of information after their physical features have been verified. One
of the examples includes finger print and retina patterns.

Internet security can also be enhanced through backing up information. This is because
some viruses have the ability to destroy ones' documents completely. In order to counter
such actions, then it is necessary for businesses or individuals back up their data through
another system of storage such as a removable device. The device can then be placed in a
locked cabinet or a place that is completely secured.

ºompanies should be careful about their back up systems because one can focus on the
primary source of information and then ignore the other source of information. This means
that in case the primary information is destroyed, one would be forced to contend with
obsolete information. Organisations must be keen about editing and changing their back up
information from time to time. This will go a long way in promoting the reliability of the
back up systems (Anderson, 2003)

Alternatively, companies can decide to set up firewalls for their data. This is a system that
prevents access to information between two networks. Firewalls can be divided into two.
3ome of them focus on restricting access while others dwell on allowing selective access. A
packet filter firewall allows packets of information to enter a protected server or they may
have the ability to block those respective packets. The other type of firewall called the
application gateway is one that acts as a go between two servers by addressing packets to
user application. (Zwicky et al, 2000)

Conclusion

The proliferation of Information Technology into all aspects of life has made users extremely
vulnerable. ºomputer crimes may occur through a number of methods and seriously
compromise the user's functions. It is therefore necessary to implement a wide range of
security measures that can prevent internet crime. 3ome of these measures include
preventive measures, changing security policies, creating data back ups, using firewalls,
using biometrics, using effective passwords and lastly utilizing tangible methods of
identification such as magnetic cards.


&&&      0   0  0 0  0 ! !)88 

 ’ !"#’"" !’ $’


’à$à$’Ô$ ’$à $%
è OUSTON) - Ehab Ali Ashoor, 49, a Saudi citizen who resides in Sugarland, Texas, has
been found guilty of trafficking in counterfeit Cisco goods after a three-day jury trial before
United States District Judge David ittner, United States Attorney Tim Johnson announced
today. The case was re-tried this week after a hung jury last Friday.
Ashoor was convicted of purchasing counterfeit Cisco Gigabit Interface Converters èGBICs)
from an online vendor in China in an attempt to satisfy a contract he had with the United
States Marine Corps in Iraq to deliver genuine Cisco GBICs. Judge ittner ordered Ashoor
taken into custody pending sentencing on April 13, 2010, where he faces up to 10 years
imprisonment and a $250,000 fine.
During this week¶s re-trial, the United States presented evidence proving Ashoor, through his
company CDS Federal Inc., was awarded a contract in June 2008 to supply 200 Cisco GBICs
to the Marine Corps for use in their computer network at the Marine Base in Al Taqaddum,
Iraq, located approximately 65 kilometers west of Fallujah. The language of the contract
signed by Ashoor specifically stated the GBICs had to be genuine Cisco products and not an
imitation brand that claimed the same specifications. It further cautioned that, ³Not only is
this a quality issue it is a possible security issue.´ Testimony at trial showed that the computer
network for which the GBICs were intended is used by the Marine Corps to transmit troop
movements, relay intelligence and maintain the security of the base at Al Taqaddum.
Despite the language of the contract and despite receiving a warning from an online vendor
that GBICs being sold by Chinese online vendors were counterfeit, Ashoor nevertheless
purchased 200 GBICs from a ong Kong vendor off eBay for approximately $25 each on
July 21, 2008. Further, e-mails recovered by Immigration and Customs Enforcement èICE)
agents showed that Ashoor had to specify to the ong Kong seller that he wanted the GBICs
to be in Cisco packaging. The price Ashoor paid for the GBICs was less than 5% of the
market price for genuine Cisco GBICs. Ashoor was to be paid $595 per GBIC for a total
contract price of $119,000 while Ashoor paid only $5,500 for the 200 counterfeit Cisco
GBICs from China. Thus, Ashoor would have netted Ashoor a profit of more than $113,000,
or 2,000%, had Customs and Border Protection Inspectors in Chicago, Ill., not intercepted the
counterfeit parts on July 28, 2008, before Ashoor could successfully deliver them to the
Marine Corps in Iraq.
This case was investigated by ICE as well as agents with the Department of Defense -
’$$"ANGELA DODGE
Jan. 22, 2010 PUBLIC AFFAIRS OFFICER
WWW.USDOJ.GOV/USAO/TXS è13) 56-9388
Criminal Investigative Service. This case is being prosecuted by Assistant United States
Attorneys Jason Varnado and Gregg Costa.

’$$&’ ! ! $  ’ $"#'(#$


 à$’ ’$" !$’à$’$Ô 
3    
Ú An aerospace engineer was sentenced today to 188 months in federal
prison for his conviction on charges of economic espionage and acting as an agent of the
People's Republic of China for more than three decades while employed by Rockwell and
Boeing, from which he stole restricted technology and trade secrets, including information
related to the Space Shuttle program and Delta IV rocket.
Dongfan ³Greg´ Chung, 3, of Orange, California, who was employed by Rockwell
International from 193 until its defense and space unit was acquired by Boeing in 1996, was
sentenced by United States District Judge Cormac J. Carney.
At today¶s sentencing hearing, Judge Carney said that he could not ³put a price tag´ on national
security, and that with the long sentence for Chung he wanted to send a signal to China to ³stop
sending your spies here.´
Following a three-week bench trial last year, Judge Carney found Chung guilty of conspiracy to
commit economic espionage, six counts of economic espionage to benefit a foreign country, one
count of acting as an agent of the People's Republic of China and one count of making false
statements to the FBI.
Chung, a native of China who is a naturalized United States citizen, held a ³secret´ security
clearance when he worked at Rockwell and Boeing on the Space Shuttle program. e retired
from the company in 2002, but the next year he returned to Boeing as a contractor, a position he
held until September 2006. During the trial, the government proved that Chung stole Boeing
trade secrets relating to the Space Shuttle and the Delta IV rocket, materials he acquired for the
benefit of the PRC.
³Mr. Chung betrayed his adopted country and endangered our national security,´ said Acting
United States Attorney George S. Cardona. ³This case demonstrates our resolve to protect the
secrets that help protect the United States, as well as the important technological advancements
developed by scientists working for companies that provide crucial support to our national
security programs.´
Steven M. Martinez, the Assistant Director in Charge of the FBI in Los Angeles, stated: ³The
FBI and our partners in the intelligence community are committed to stopping those intent on
stealing American technology, whether they are motivated by money or allegiance to their native
country, as in the case of Mr. Chung. The lengthy sentence imposed on Mr. Chung should send a
strong message to others contemplating theft of U.S. secrets, that such criminal activity is a
serious affront to the nation's stability and will be prosecuted accordingly.´
The case against Chung resulted from an investigation into another engineer who worked in the
United States and obtained sensitive military information for the PRC. That engineer, Chi Mak,
and several of his family members were convicted of providing defense articles to the PRC. In
2008, Judge Carney sentenced Chi Mak to more than 24 years in prison èsee:
http://www.usdoj.gov/usao/cac/pressroom/pr2008/032.html).
According to the evidence presented during Chung¶s trial, individuals in the Chinese aviation
industry began sending Chung ³tasking´ letters as early as 199. Over the years, the letters
directed Chung to collect specific technological information, including data related to the Space
Shuttle and various military and civilian aircraft. Chung responded in one undated letter that ³I
would like to make an effort to contribute to the Four Modernizations of China.´ In various
letters to his handlers in the PRC, Chung referenced engineering manuals he had collected and
sent to the PRC, including 24 manuals relating to the B-1 Bomber.
Between 1985 and 2003, Chung made multiple trips to the PRC to deliver lectures on technology
involving the Space Shuttle and other programs During those trips he met with PRC government
officials, including agents affiliated with the People¶s Liberation Army. Chung and PRC officials
exchanged letters that discussed Chung¶s travel to China and recommended methods for passing
information, including suggestions that Chung use Chi Mak and his wife Rebecca to transmit
information. A May 2, 198 letter from Gu Weihao, an official in the Ministry of Aviation and
China Aviation Industry Corporation, discussed the possibility of inviting Chung¶s wife, who is
an artist, to visit an art institute so that Chung could use her trip as an excuse to travel to the
PRC. This same letter suggested that passing information to the PRC through Chi Mak would be
³faster and safer´ and concluded with the statement: ³It is your honor and China¶s fortune that
you are able to realize your wish of dedicating yourself to the service of your country.´
On September 11, 2006, FBI and NASA agents searched Chung¶s house and found more than
250,000 pages of documents from Boeing, Rockwell and other defense contractors inside the
house and in a crawl space underneath the house. Among the documents found in the crawl
space were scores of binders containing decades¶ worth of stress analysis reports, test results and
design information for the Space Shuttle.
The investigation in this case was conducted jointly by the Federal Bureau of Investigation and
NASA Counterintelligence.
Ô 
       

 
      

è OUSTON, Texas) Ú A sealed indictment accusing a arris County Sheriff¶s Deputy of
disclosing confidential law enforcement information in exchange for money was unsealed today
following the deputy¶s arrest, United States Attorney José Angel Moreno, FBI Special Agent in
Charge Richard C. Powers, Department of omeland Security Office of Inspector General
èD S-OIG) Special Agent in Charge Ronald D. Moore and arris County Sheriff Adrian Garcia
announced today.
Kurt Douglas Green, 42, of ockely, Texas, a deputy with the arris County Sheriff¶s Office
è CSO) assigned to the jail located at 01 San Jacinto, was arrested this morning without
incident by investigating agents. e will remain in custody pending his appearance before a
United States Magistrate Judge in ouston today when the issue of bond is expected to be raised.
The CSO has computers for law enforcement use which provide access to various databases
including the National Crime Information Center èNCIC). Access to NCIC database is restricted
to law enforcement officers for law enforcement purposes only.
The indictment, returned on Feb.10, 2010 and unsealed today, alleges that on Jan. 19, 2010,
Green exceeded his authorized access to a law enforcement computer to obtain information from
the restricted NCIC database for disclosure to a non-law enforcement person for financial gain.
³Misuse of the authority vested in a law enforcement officer by the position of trust he holds
affects us all. We - the law enforcement community and the public at large alike - stand to lose
much,´ said United States Attorney José Angel Moreno. ³The indictment unsealed today
evidences our continued commitment to maintain the public¶s trust and the integrity of law
enforcement.´
"The stated core values of the arris County Sheriff's Office include meriting and maintaining
the public's trust,´ said Sheriff Adrian Garcia. We are accomplishing the goals vigorously and
transparently through the honest hard work of our employees, but we must be just as vigorous
and transparent in the effort to root out alleged wrongdoing in our agency by an extremely small
number of individuals. When these rare situations happen, it hurts us all - the honest
hardworking employees who obey the rules as well as the citizens who we are obligated to
serve."
The investigation leading to the charges was conducted by the FBI ouston office and the D S
Office of Inspector General with the assistance and cooperation the arris County Sheriff¶s
Office. Assistant U. S. Attorney James McAlister is prosecuting the case.
   
 
     )    *
   

    

       

 +*

             ,- 


 
  à 
 .'     
January 14, 2010
’$$"
/’Ԓ !, age 34, a resident of ouston, Texas, was sentenced to thirty è30) months in
federal prison for computer fraud by visiting U. S. District Judge Frederick Block from the
Eastern District of New York, announced U.S. Attorney Jim Letten. In addition, the defendant
was ordered to serve three è3) years of supervised release, during which time the defendant will
be under federal supervision and risks additional imprisonment should she violate any terms of
the release. Judge Block also ordered the defendant to pay $1,01,01.35 in restitution.
According to court documents, Ԓ !pled guilty on September 15, 2009. Ԓ !was an
accounting clerk at Standard Mortgage Corporation, a corporation located in New Orleans that
originates and services residential loans. The defendant¶s duties included processes funds
received by Standard Mortgage Corporation at loan closings using accounting software on the
company¶s computer system. Using the computer system, Ԓ !changed the deposit code for
payments made by customers at mortgage closings. Ԓ !then created checks payable to
herself or her credit card providers from funds which she had previously fraudulently changed
the accounting codes. As the individual responsible for reconciling Standard¶s general operating
account, Ԓ !separated and concealed all cancelled checks which had been made payable to
her or her credit card providers.
The case was investigated by agents of the Federal Bureau of Investigation and is being
prosecuted by Assistant U. S. Attorney Carter K. D. Guice, Jr. of the Financial and Computer
Crime Unit.

Anda mungkin juga menyukai