Question

In: Operations Management

12. What is the swiss cheese model for security? Explain to your employees the risks of quality vulnerabilities.


Congratulations! You are the CEO of GE. GE company culture is all about quality and process improvement!

You are leading a company meeting where you need to convince and inspire your employees that Quality Systems will be the tools to market your Brand and skyrocket your revenue.

12. What is the swiss cheese model for security? Explain to your employees the risks of quality vulnerabilities.

13. What is the Domino effect? Explain to your employees how one quality issue escalates to several company functions, and spreads to the entire supply chain.

Solutions

Expert Solution

12. Swiss cheese model of security and accident causation is a model which is commonly used in risk analysis and comprehensive risk management. This model also serves the foundation for layered security as well as computer security. The human systems are metaphorically treated as layers of swiss cheese, which have been stacked side by side in a row. Any malicious attack on the security of the system has to pass through the different layers and the impact gets mitigated substantially. This mechanism is often referred to as the cumulative act effect.

It is quite important to have a cohesive risk management system in place as the system gets quite vulnerable to malicious attacks and threats. The quality quotient as well as the performance of the overall system gets compromised in absence of such a system.

13. Heinrich’s Domino Theory illustrates that any accident is not an independent incident and happens as a result of various sequential activities. These sequential activities are metaphorically referred to as dominoes.

The various dominoes that can be associated with an accident or system attack are:

  • Ancestry and Social Environment
  • Fault of Person
  • Unsafe Act or Unsafe
  • Accident or attack
  • Damage or injury

In business, the application of domino effect lies in the fact that if the system gets vulnerable from just one dimension or layer, the threat of malicious attack creeps in and has considerable impact of the overall system. Hence, overall quality protection of business is essential.


Related Solutions

What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
What are the security risks involved in allowing cookies to be stored on your computer?
What are the security risks involved in allowing cookies to be stored on your computer?
Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...
Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure? What are the reasons for NOT having such infrastructure? What are the alternatives?
1. What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that...
1. What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy? 2. What default configuration should be placed on host-based firewalls when accessing the network remotely? 3. What risks, threats, and vulnerabilities are introduced by implementing a remote access server? 4. What is a recommended best practice when implementing a remote access policy server user authentication service? 5. What is a Remediation LAN?
Discuss the inherent differences between ARP and NDP and what if any security vulnerabilities they have...
Discuss the inherent differences between ARP and NDP and what if any security vulnerabilities they have in common.
what is PZB model of service quality? explain it as clearly as possible
what is PZB model of service quality? explain it as clearly as possible
Explain the importance of awareness when dealing with employees security. Provide an example of two security...
Explain the importance of awareness when dealing with employees security. Provide an example of two security policies that would help prevent internal employee fraud.
1.Explain the security risks of devices with Remote Desktop access enabled
1.Explain the security risks of devices with Remote Desktop access enabled
explain the specific potential risks and liabilities presented by contracts with employees and why and how...
explain the specific potential risks and liabilities presented by contracts with employees and why and how each area of law creates vulnerability for GC Provide a specific example of why and how the potential risks and liabilities could arise for contracts with employees for the GC business
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT