Question: 1. Describe how the Project Zero team achieves process gains? What factors might create process losses for this team? 2. Describe how the three general
1. Describe how the Project Zero team achieves process gains? What factors might create process losses for this team?
2. Describe how the three general types of taskwork are important to the success of Project Zero.
3. Identify the communication network structure that would be most suitable for Project Zero. Explain.
The growing number and insidiousness of cyber-threats has become a huge concern for companies that are responsible for the security of private user data, account information, personal information, passwords, and so forth. The average cost of a data breach for a company is reported to be $3.6 million, but this cost can be significantly higher in situations where millions of accounts are compromised. Like most other companies in the technology sector that are involved in internet content and information, Google employs teams of cyber-security personnel to examine the computer code in their products and services to ensure there are no bugs or related problems that can be exploited by cyber-criminals. Google also offers bounties to friendly hackers who find and report vulnerabilities in the company's code. For Google, however, the concern with cyber-threats transcends its own products and services. The company's search engine and other products and services rely on third-party code, such as Adobe Flash, and the underlying Windows, Mac, or Linux operating system. In short, bugs in the code of software for which other companies are responsible could create costly vulnerabilities for Google. Additionally, Google generates revenue primary from users who click on ads. If there are hugs that result in major security breaches, user confidence in the internet would erode, and in fear that their private data may be exposed in a single website visit, users could become less likely to click on ads. To deal with this particular concern, Google created an elite team called "Project Zero." The mission of this team is to identify hackable bugs in the code of any software that touches the internet and to communicate the problems to the responsible companies so that the bugs are addressed in a timely manner. The team is composed of some of the world's best hackers and vulnerability researchers. Team members use their intuition, as well as programs that blast software with data, to expose the bugs. When a team member finds something amiss-a strange pattern in data that can't be explained the team gathers to discuss. Of particular importance is what happens after Project Zero finds a vulnerability. The team first alerts the responsible company about the problem. The team then works with the company to settle on a deadline to fix the problem and to notify users. If the company is uncooperative or misses a deadline, Project Zero can expose the problem on their blog. Obviously, this type of exposure could be a public relations nightmareStep by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
