Thursday, January 30, 2020

Computer Security Incident Response Team Essay Example for Free

Computer Security Incident Response Team Essay In the last decade, more and more companies have started to look into e-commerce to connect them to the infinite world of global suppliers, partners, consumers and much more. This boom in technology has placed multiple assets are risk from a security stand point allowing hackers/crakers and anyone on the internet to gain access to these network and gain information or try to jeopardize business to a point where it stand stills. Increase in Denial of service attacks, child pornography, virus/worms and other tools used by individuals to destroy data has lead to law enforcement and media to look into why and how these security breaches are conducted and what new statutory laws are needed to stop this from happening. According to CSI computer crime and security Survey 2007, the average annual loss reported by security breach has shot up to $350,424 from 168,000 the previous year. To add to this, more and more organizations are reporting computer intrusions to law enforcement which inclined to 29 percent compared to 25 percent the year before. 1] To be successful in respond to an incident, there are a few things that need to be followed: 1. Minimize the number of severity of security incidents. 2. Assemble the core computer security Incident Response Team (CSIRT). 3. Define an incident response plan. 4. Contain the damage and minimize risk. [3] How to minimize the number of severity and security incidents: It is impossible to prevent all security related incidents, but there are things that can be done to minimize the impact of such incidents: †¢Establishing and enforcing security policies and procedures. Gaining support from Management in both enforcing security policies and handling incide nts. Accessing vulnerabilities on the environment on regular basis including regular audits. †¢Checking all devices on certain time frames to make sure that all the updates were performed. †¢Establishing security policies for both end users and security personal and asking for security clearance each and every time an access is granted. †¢Posting banners and reminders for responsibilities and restriction of use of applications, and other systems on the network. †¢Implementing secure password polices thought the network. Checking log files on regular basics and monitoring traffic. †¢Verifying backups are done on regular basics and maintained in an appropriate manner. This would also include the new email backup policy laws. †¢Create Computer Security Response Team (CSIRT) [3] Security threat is the same for both large, small, and government organizations and therefore it is important that regardless of what the company has for its security measures, it also ha s a written document that establishes guidelines for incident response. Incident respond planning is a set of guidelines that document on security incident handling and communication efforts. This plan is activated when an incident that could impact the company’s ability to function is established. Computer Security Incident Response Plan (CSIRP) should contain the following: 1. Mission: Things the response team will be responsible for, including how to handle incidents as they happen and what steps are necessary to minimize the impact of such incidents. 2. Scope: this would define, who is responsible for which area of security, it can include things like application, network(s), employees, communication both internally and to the public and much more. . Information flow: How information will be handled in case of an emergency and how it will be reported to the appropriate authority, pubic, media and internal employees. 4. Services provided: This document should contain all the services that are either provided to the users or services that are used or bought from other vendors including testing, education, service provider issues to name a few. [2] The CSIRT team must contain several members including a Team leader which will monitor changes in individual’s actives and responsibility of reviewing actions. An Incident Lead, that will be dedicated as the owner of set of incidents and will be responsible for speaking to anyone outside the team while and corresponding changes and updates. A group of individual’s part of the CISRT team called members will be responsible to handle responsibility of the incident and will monitor different areas of the company. Other members of this team should include Legal help, public relations officers, contractors and other member of management both from business and IT that can help during security breaches. If an Incident has occurred, it is important to classify this as an incident severity. Most companies use between Severity 1-5. 1 being the highest and 5 being the research phase where no system or user’s are affected. For most system anything under Severity 3 is not a major impact of the system but if there is a system wide issue that requires immediate attention, a severity 1 or 2 would fall under the category of Incident response procedure and set up a high alert. The cost of an incident can be very high, depending on the loss of data, therefore identifying the risk and all the real threat fall under this category. Once the incident has been identified it should go into the assessment phase, where it should be determined if the system can be bought back up again and how much damage is done. If the business is impacted assessment should be done. The assessment includes forensic investigation usually involving a team of expert that look into the how many computer were affected, what kind of information was stolen or changed, entry level of attacks, potential damage done by incident, recovery process and the best way to assess this from happening again. The next phase of this is containment, which is the assessment of damage and isolation of other systems that can also be compromised including network. Backup of the system in the current state should be done at this time for further forensic investigation. Analyzing of log files and uncovering systems that were used like firewalls, routers should be identified. Any modification of files including dos, exe should also be carried out in this phase. Once all this is done, the next step is Recovery. Recovery is restoring clean data back the system so it can perform is function as required. After installing last good backup, it is important to test the system before putting this in production again. Further surveillance of network and application should be set in place as intruders might try this again. Every company today, weather small or big needs an incident response unity to defend itself against predators on the web. The government agencies has set some rules and regulations on such standards and are required that company follow these standards to avoid further disruption of the service. This becomes even more critical for companies that play important place in the economy like credit card, health, insurance and much more. Several regional companies today can help plan CSIRP plan that provide help creating a team of individuals that can act fast in such situations. The implementation of such plan cost less in the long run, when compared to companies that don’t have such response plan and loose data that is critical to their survival.

Wednesday, January 22, 2020

Cryptographic Protocols for Electronic Voting Essay -- Technology Elec

Cryptographic Protocols for Electronic Voting After some preliminary research into the subject of electronic voting [BARL2003], it became apparent that there may be reason to mistrust current electronic voting systems. Further, as I studied a variety of voting systems, I realized I had little confidence that any of them (even paper ballots) would be guaranteed to produce a perfectly accurate tally. In my previous paper [BARL2003], I suggested the following definition: "An accurate voting system counts all valid votes with minimal processing error such that the intent of eligible voters is reflected in the final tally." I believe it is important for a voting system to (a) minimize error, (b) count all valid votes, and (c) preserve the intent of eligible voters in the final tally. At least in theory, I believe that today's electronic voting systems are capable of counting votes with minimal processing error. Assuming that all parties involved in the process of creating an electronic voting machine perform ethically, and that enough time, money, and effort is expended to do the job correctly, it should be possible to create a system that processes each entry that was received by the system. However, even making those assumptions, it is not quite that simple. There may be many reasons that a valid entry is not received by the system. For example, voters may be confused by the systems and may not enter their selections into the machine they way they intended. The system may "crash" before reporting its results. An eligible voter may be denied access to voting machines during the election interval . As far as I have been able to determine, the process for deciding the validity of a vote is subject to interpret... .../www.notablesoftware.com/Papers/1002evot.pdf [MERC2003] Mercuri, Rebecca. Website on "Electronic Voting" last updated September 1, 2003. http://www.notablesoftware.com/evote.html [PFIT1996] Pfitzmann, Birgit. Digital Signature Schemes: General Framework and Fail-Stop Signatures; Springer-Verlag, Berlin 1996. [PITT2003] Pitt, William Rivers. "Electronic Voting: What You Need to Know," Interview with Rebecca Mercuri, Barbara Simons, and David Dill, October 20, 2003. http://truthout.org/docs_03/102003A.shtml [RaRaNa] Ray, Indrajit and Ray, Indrakshi and Narasimhamurthi, Natarajan. "An Anonymous Electronic Voting Protocol for Voting Over the Internet." (Date of publication unknown.) http://citeseer.nj.nec.com/471417.html [SCHN1996] Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons, New York 1996.

Tuesday, January 14, 2020

How Does Peer Pressure Affect Decision Making Essay

Axel Blaze (ShÃ… «ya GÃ… enji) is the ace striker and voice of reason of the team. His sister, Yuka is in a coma because of Kageyama’s interference to stop him from play against Teikoku Academy. He keeps an amulet made by his sister, and makes a promise with her to stop playing soccer, but when he sees that his passion for the game is strong, he changes that promise to become the champion of the Soccer Frontier. Later, Yuka wakes up from a coma, and he began to play soccer more freely with his teammates. Goenji joins up with the others to play against teams around the world. He becomes close friends with Endou, Fubuki, and Kido as the story progresses. Killer Shots * Fire Tornado Spins in mid-air, showing fire coming from his feet, then kicks the ball in mid-air. * Dragon Tornado: the combination of Axel’s Fire Tornado and Kevin’s Dragon Crash. * Inazuma Drop: Jump high then use the other player as a stepping stone to jump once more then kick the ball in high mid-air. This move was used to give Raimon a 1-0 win against Wild Junior High * Inazuma No.1:Both Mark and Axel kick the ball towards the goal. Was first used in the match against Brainwash Middle High. * Fire Rooster: Kicks the ball up high with Nathan then kicks the ball with Nathan in mid-air releasing six fire wings. * Inazuma No.1 Drop: The Inazuma Drop adding Mark as one of the kickers. * Final Tornado: Combination of Tri-Phoenix and Fire Tornado.This was only used against Zeus Eleven. This move is also called Tri-Phoenix X. * Bakunetsu Storm:The technique that Axel develop when Aliea Academy arc and this technique debut when Inazuma caravan vs Epsilon Remastered * Twin Boost: A move first used by Jude and Eric. Jude kicks the ball to Eric then Eric kick the ball back to Jude for the final kick. A more powerful version of the Twin Boost was used by Jude and Axel. Jude kicks the ball upward then Axel uses Fire Tornado to pass the ball to Jude for the final kick. This is sometimes called Double Boost. * Bakunetsu Screw:The technique that Axel develop during the fight with Australia’s Big Wave team. It is the evolution of the Bakunetsu Storm with a added spin to the ball. * Tiger Storm: The technique Gouenji and Toramaru created by using Tiger Drive followed up by Bakunetsu Storm. * Grandfire: This technique is used by Gouenji, Toramaru and Kiyama. This was used to topple Argentia’s The Empire impenetrable defense. * Grand Fire Ignition: The ball is kicked by Gouenji, Toramaru and Kiyama. This technique is the evolution of Grand Fire with a more intense flame on the ball.

Monday, January 6, 2020

Power Of The Fourth Estate How Does New Media Coverage...

Power of the Fourth Estate: How does new media coverage on polarized criminal justice cases influence case verdicts, public opinion and policy in the United States? The disbursement of accurate information is vital for the sustenance of a healthy democracy. It ensures that its citizens are equipped to make responsible, informed decisions pertaining to matters that affect their daily lives. In the United States, the media is referred to as the fourth estate or fourth branch of government (alongside the legislative, executive and judiciary branches). The media has been used as a conduit to broadcast local, state-level, federal-level and international government and social affairs. It may also be used to endorse campaigns, report misuses of†¦show more content†¦The cases chosen were: The Casey Anthony trial, the McCarthy hearings, Megan Kanka’s law, the Central Park Five case and lastly, the Watergate scandal. Each circumstance providing ample evidence of how the media’s role in each instance served a major factor for which altered or contributed to the case’s outcome. On July 15, 2008 in Orange County, Florida, Cindy Anthony, grandmother of two year old Caylee Marie Anthony called emergency services to report her grandchild as missing. Cindy explained to the 911 dispatcher that she had not seen Caylee in over 30 days. Cindy Anthony also explained to law enforcement officials that her daughter Casey Anthony (mother of Caylee) had given several different explanations as to the toddler’s whereabouts. Upon several interviews with law enforcement, Casey also told detectives that her daughter had been kidnapped by her nanny a month prior, before finally admitting that she had not seen her daughter Caylee in weeks.[1] On July 16th, 2008, Casey was arrested and charged with first-degree murder. The quest for missing Caylee continued as the media was now alerted by the unusual details of the pending trial. Casey Anthony was the target for extreme public inquiry and for her actions following the disappearance of her two year old daughter Caylee. Despite not knowing where her child was, Casey indulged in activities such as getting a tattoo, partying and drinking, all of which was

Sunday, December 29, 2019

Literary Wetback as Mexican America Literature Free Essay Example, 750 words

ï » ¿Ã¢â‚¬Å"Literary Wetback† is Mexican America Literature Mexican American Literature is writings by people of Mexican ancestry who have resided permanently in the United States. Their writings include their ethnic identity in terms of characters, cultural situations and patterns of speech. This basic definition shows three requisites that must be present for a writing to be considered as Mexican American Literature, namely: 1) It is written by a person of Mexican ancestry who have resided permanently in the United States; 2) It deals with the life or concerns of Mexican Americans; 3) And, contains their ethnic identity showing historical and cultural significance. The essay â€Å"Literary Wetback† was written by Alicia Gaspar de Alba (El Paso). It is a personal narrative. A personal narrative is a form or writing wherein â€Å"the writer relates an event, incident, or experience in his or her own life†¦ The personal narrative incorporates vivid descriptive details as well as thoughts, feelings, and reactions of the writer. â €  Hence, all information obtained from the essay comes from the life of the author, de Alba. In the essay de Alba reveals that: â€Å"I say I come from the border between Tejas and Mexico. .† And, â€Å"I was born into a strict, Mexican-Catholic family. .We will write a custom essay sample on Literary Wetback as Mexican America Literature or any topic specifically for you Only $17.96 $11.86/pageorder now That this strict Mexican-Catholic family has its residence in the United States†¦Ã¢â‚¬  These statements show that the first requisite for this piece of literature to be considered as Mexican American is that the writer is of Mexican ancestry and has resided permanently in the United States have been fulfilled. The second requisite is met with her narration of the life of people like her, children of Mexican migrants living in the United States, who have to follow their cultural practices and heritage, and yet live in another country which imposes a different set of practices. The author calls it cultural schizophrenia that plagues their lives: â€Å"the influence and the inbreeding of Mexican and North American cultures†¦ I do recognize its problems, cultural schizophrenia being the one that most concerns me in my writing. † The third requisite is the presence of their ethnic identity showing historical and cultural significance. The ethnic identity is clear in her acceptance of the Mexican-American or â€Å"Chicanos† wherein she mentions their similar beliefs and practices. To emphasize this point is when she used their superstitious belief in demons to characterize her cultural schizophrenia: â€Å"†¦Chicanos practiced the same rituals, listened to the same music, believed the same superstitions, ate the same food, even told the same jokes as my purebred Mexican family? Needless to say, my cultural schizophrenia transcended the real of my unconscious and became a conscious demon, grinning over my shoulder at every turn. † â€Å"Literary Wetback† Expands Mexican American Literature â€Å"Literary Wetback† goes beyond the three basic requisites for a literary piece to be considered Mexican America Literature as obtained from the definition by Raymund Paredes. Alicia Gaspar de Alba therefore expands the definition of American Literature by: trying to reconcile social discrimination between a race, the Chicano and the â€Å"Purebred† Mexicans living in the United States; and thereby proclaiming that there is no â€Å"Literary Wetback† but a Mexican American Literature with its own identity and uniqueness. â€Å"†¦Chicanos practiced the same rituals, listened to the same music, believed the same superstitions, ate the same food, even told the same jokes as my purebred Mexican family? Needless to say, my cultural schizophrenia transcended the real of my unconscious and became a conscious demon, grinning over my shoulder at every turn. † This quotation is a clear acknowledgement that there is no difference between the â€Å"Chicano† and â€Å"Purebred. † It is safe to assume that the literature that they will produce being influenced by the same environment and background will be basically the same. The writer no longer distinguishes herself from them. In fact the â€Å"demon† that grins behind her back is non-existent for she realized that she is not a â€Å"Wetback† and neither are the â€Å"Chicanos. † They have their own identity – Mexican American: â€Å"Chicanos did have a heritage after all, and I was living it! At home I was Mexican and spoke Spanish, and yet we celebrated Thanksgiving and the Fourth of July. At school, my language was English and we pledged allegiance to the American flag, and yet we prayed to the Virgen de Guadalupe. Naturally, imperceptibly, this bilingual/bicultural identity became the controlling image of my life, and nowhere did it manifest it self more than in my poetry. † The beauty of this is that they have the best of both worlds leading them to a contemporary vision: â€Å"Chicanos are lucky because our heritage straddles two countries and feeds off two traditions, but Chicano culture feeds tradition as well, with change, with individual history, with contemporary vision. †

Friday, December 20, 2019

Elements of Network Security - 1681 Words

Elements of Network Security Louis Kibby Network / Datacom I TCM 537 Mr. Stuart Sandler November 28, 2005 Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and attachments. 2. Threats to network infrastructure devices. 3. Theft of network connectivity services. 4. Unauthorized access from internal and external sources. 5. Denial of service attacks.†¦show more content†¦28, 2001). Because this is an automated system, it depends on a mechanical process of discerning what is good or bad. This at times can lead to false positives or negatives, or the blocking of a legitimate user and giving access to a system violator. This weakness in the Cisco IDS requires that an additional form of violation detection be used. In addition to the IDS, LADWP has a staff of technicians who provide continuous network monitoring. In addition to keeping track of the alarms detected by the IDS Director Platform, these technicians also use other tools to keep an eye on network traffic levels, as well as performing routine vulnerability probing. One key tool used is Lucents VitalSuite. This tool uses real-time event analysis, which helps to identify network resources that have exceeded acceptable levels. To properly use VitalSuite, the technicians establish what they believe to be normal network activity. This norm is then used as a baseline to help in the identification of any abnormal network traffic. Once the baseline is established, levels of severity are set. The levels are minor, major and critical, with critical meaning immediate action is required. The only time the system alarms is when a critical error is detected. During normal operations, the technicians monitor VitalSuites display, looking for unusual events. These events canShow MoreRelatedElements Of Network Security Essay1618 Words   |  7 PagesElements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and attachments. 2. Threats to network infrastructureRead MoreSecurity Is A Process Not Product1041 Words   |  5 PagesDr. Wang â€Å"Security is a process not product†. Security is a continuous process to ensure information, people and network have necessary protection for reliable and secure day to day operations. The Information Technology(I.T) and telecommunications firms need complete and low cost security solutions. It is required and essential to protect a secured network from dangerous and deliberate threats. Security should have the qualities that enhance the interweaving of capabilities of security in completeRead MoreDeveloping Mixed Environments Of 802.1x And Non 802.1x Endpoints1701 Words   |  7 Pageschallenging to configure different switches (particularly in multivendor networks) to handle a mix of both 802.1X and non- 802.1X endpoints. The combination of these factors in wired environments can outweigh the intended benefits of deploying 802.1X in the first place. [callout box]  »FACTORS LIMITING 802 .1X DEPLOYMENT IN WIRED LANS †¢ Legacy switches and unmanaged devices lack 802.1X support †¢ Configuration challenges in multi-vendor networks †¢ High proportion of non-802.1X endpoints †¢ Resource-intensiveRead MoreEffective Information Security Policy Elements864 Words   |  4 PagesEffective Information Security Policy Elements In the world today technology is used everywhere, no matter if it is personal or business. Although technology has become important for so many reasons, there is also a measure of security that must be taken for protection. Policies are put into place for protection the organization from fall into a pitfall. It has also helped the organization to build better relations with personals, and build growth within the cooperate industry. There a several waysRead MoreSecurity Architecture Is Developed For Systems Providing End For End Communications1069 Words   |  5 PagesX.805 security architecture is developed for systems providing end to end communications. It was developed by ITU-T SG 17 and was published in October 2003. Issues which X.805 addresses are: 1. What type of protection is to be given against what kind of threats? 2. What are the various kinds of system gear and facility groupings that needs to be secured? 3. What are the different types of network exercises that needs to be secured? X.805 architecture incorporates three security layers which areRead MoreThreat Vectors For Cyber Security965 Words   |  4 Pagesthreat vectors for cyber security in relation to CIP: IT networks, insider threats, and equipment and software. Normally, ICS operate on an internal network, called OT (Operational Technology). Occasionally, this isolated network requires a connection to the organization’s corporate network (IT) for routine operation and management. As displayed in the Ukraine blackout, cyber threats infiltrate an organization’s IT systems in order to access ICS networks on the OT network. The methods used to achieveRead MoreSynopsis Of The Sdn Technology1156 Words   |  5 Pagesallows the controller to control data plane resources. SDN simplifies the configuration of the wide range of resources that are available. SDN must be applicable within systems that already exist which contain many organizations with the need for security of the information that is being shared. Limitations in the real world include the need to exist with the present support systems, administrative or technology fields. Functional subsets maybe summarized from the SDN architecture if the environmentRead MoreFailures in Design and Security Principles1347 Words   |  6 Pagescompanys employees. Hackers who do intentionally tamper with the companys network often do so because they are tempted by assets they know are poorly protected. Weak security policies present the image that a company does not truly value its assets, which in turn attracts the petty thief and curiosity seeker. Therefore, the preventive element of any network security system should include a strong and enforceable security policy for its employees to follow, re-enforced by a form of technical protectionRead MoreBuilding Adaptive Defense Against Cybercrimes Using Real Time Data Mining1648 Words   |  7 Pagessystems behind in the race, because of their inability to identify new patters of cybercrime and to ameliorate to the required levels of security. This paper visualizes the empowerment of security systems through real-time data mining by the virtue of which these systems will be able to dynamically identify patterns of cybercrimes. This will help those security systems stepping up their defense capabilities, while adapting to the required levels posed by newly germinating patterns. In order to confineRead MoreThe Cost Effective Enhancement Of Enterprise Network Security Via Openflow Controlled Switches And Specialized Sdn Applications Running On A1481 Words   |  6 Pagesproject focuses on the cost effective enhancement of enterprise network security via OpenFlow controlled switches and specialized SDN applications running on a controller. The project will investigate on securing the network from various attacks like ping attack, TCP SYN attack, Distributed Denial of Service (DDoS), DHCP attack. Different security measures will be discussed through which the us er can establish a secured network. These security measures will be implemented over SDN. 3. Objectives of Proposed

Thursday, December 12, 2019

Cultures in the Organizations

Question: Discuss the activities of human resource management in an organization. Answer: Introduction: Human Resource Management or HRM is a well nurtured factor in all business firms since the beginning of the 20th century (Price, 2006). It is a sum of some most needed processes in an organization. It is such a function in a firm which has been innovated to accelerate the performances of the concerned employees. Human Resource Management focuses not only on the people attached with that organization but also systems and strategies to enhance workforce. From recruitment of an employee to rewarding her or him, Human Resource Management takes place in an organization to smoothen the work-policies (Andolsek and Stebe, 2009). Activities of Human Resource Management in an organization: If the job of any employee is taken for instance, her or his recruitment will go under HRM and rewarding after being a good employee will be done also by the HRM. All organizations work by the labor and intelligence of human beings, so human beings are most resourceful factors for any firm or organization (Becker and Huselid, 2009). Human Resource Management works to take out best possible efforts of the workers or employees and applies the extract of the efforts to get best result. Generally HRM is rehearsed by the HRM practitioners, but it can also be staged by managers of an organization. Human Resource Management actually comes with the strategies to maintain employees for getting long time goals in the business world (Budhwar and Debrah,. 2009). HRM has some frameworks to execute its tasks. Recruitment is the very first procedure of Human Resource Management. HRM practitioners or managers of an organization employ such people in work who are very much capable to perform the tasks assigned in the workshop (Colbert, 2010). The recruitment process takes place according to the conditions, natures and spaces of the work and ability of the employees to be fit for those. After the recruitment procedure training of the employees takes position in the organization. Human Resource Management of the concerned organization trains its employees on a regular basis to make them more suitable for work. Employees-motivation is a big matter in the activities of HRM (Beech and Macintosh, 2012). A motivated and well-trained employee is a big asset for a firm. She or he can deliver best output in job. In the premises of the heavy industries the matter of safety obviously is in the to-do list of concerned Human Resource Management. After safety, wellness and hygienic happiness are the responsibilities of HRM and HRM practitioners (Beerel, 2010). If an employee is not physically, psychologically and wage-wise satisfied, she or he is hardly capable to put best labor. HRM segment of a firm is generally seen to look after all the workers so that they can be productive and effective (Hughes, 2010). Development of the organization is a big responsibility of the HRM. An organization is expected not only to be bigger but also reputed and in the market. HRM is employed to add value to the products and services of an organization. Improvement matters in the world of HRM practitioners. Administration and communication are two big stands on which an organization acts in the market. Managers and Human Resource Management practitioners together play a key role in the administration. It is considered as the nucleus of a firm and HRM is the nucleolus of the administration (Price, 2006). Communication is such stream in the business world which is needed to expand regularly. Communication between employees and managers, leaders and board of directors, stakeholders and directors etc. are regularly performed by Human Resource Management. HRM practitioners are in charge of the main business communications in an organization (Andolsek and Stebe, 2009). If communication breaks down somehow, whol e work process will be damaged and hampered. HRM practitioners have a vital role in hiring also along with the managers. They also play big parts to decide wages and allowances for each and every kind of employees. Benefits and compensations are also allowed to all employees after going through the reports of Human Resource Management of the concerned organization (Budhwar and Debrah, 2009). Performance reprisal and rewarding are done by the HRM segment. All monetary and adjacent factors are cultivated by the HRM to meet the need of the employees and the organization itself (Colbert, 2010). Cultures in the Organizations: Culture in an organization or organizational culture stands for the actions and activities of human beings in a workhouse (Beech and Macintosh, 2012). This also means such activities and actions with which human beings are attached in the concerned organization. Organizational culture comprises values and morals of whole organization, principles of business and values of the entire firm (Beerel, 2010). The culture in a business firm is the addition of a few factors such as background of the organization, services and products, business market, know-how to market the products and strategic steps of the concerned firm. Many organizations deploy various advanced notions in the premise of the organizational culture. Different firms use different cultures and sub-cultures to enhance the workforce. Each and every organization applies unique culture according to the products or services, strategies and work-cultures of the concerned firm. Beside this, many bigger organizations often experie nce contradictions in various sub-cultures, as various sub-cultures are normally assigned to various managerial segments (Beerel, 2010). Actually organizational cultures are too much related to the work-culture of an organization (Price, 2006). It is not depended only on the employees or leaders or the managers who are very nearer to the workshops. The organizational culture is a sum of behavior from directors to the trainee employees. All collectively construct the unique culture in an organization. There is a notion in the human world that human beings are what and which they do repeatedly (Andolsek and Stebe, 2009). Culture mainly defines repeated behavior, habits, thinking and beliefs. It is as true in an organization as true in the life of an individual human being. Culture of an organization is defined by its behavior toward stockholders, employees and customers. The organizational culture of the concerned firm are also supported by its strategy of marketing, process of works, deals with all engaged individuals and values added with beliefs (Becker and Huselid, 2009). Human Resource Management practitioners play a pivotal role to improve and keep intact the environment of organizational culture. HRM segments keep focusing the demands of the cultures in a firm to shape right work culture in the workshops (Becker and Huselid, 2009). They also nurture a few factors related to the organizational culture such as whether the organizational culture is nothing but a behavioral outcome or collectiveness of some relevant forces e.g. enticements, configuration and process. Organizational culture is defined and constituted by various individual matters. It is a procedure to make sense in an organization. This helps to create collective awareness to make out different individual personnel in the firm. Jointly beliefs, strategies and interpretations move an organization forward in the market (Colbert, 2010). A big aim of the organizational culture is to make every worker know the actual reality of the concerned organization. It is not only related to what and w hich factors but also attached with why factors. Culture in the firm is just like that story whose ceremonies and values construct the narrative (Beerel, 2010). Organizational culture is the unique and independent civilization in the organization. Human Resource Management is to give this civilization a positive and progressive force (Hughes, 2010). Sub-culture is taken often as the most debated and nurtured matters which have most influences on the organizational culture. Sub-culture is a team or group into a large culture. The sub-culture in an organization may be revealed or suppressed. A sub-culture in a large organization may be similar to the mainstream culture of the concerned firm or different from some aspects. Founder has a great influence on the culture of a firm (Andolsek and Stebe, 2009). Her or his own personality plays a crucial role to determine the culture. Size of the organization is a big factor. Cultures in a small company and in a multinational company are definitely different. All firms do not have same development programs and visions. Therefore their executive cultures are not similar mandatorily. Managerial sector and leadership quality always determine the culture in an organization. Beside these, personal quality of the leaders also matter here. Strategies, procedures and structures of an organization have a key function in the culture at workplace. Mainly organizational structure gives birth to the sub-cultures and sometimes the conflicts between the subcultures and the cultures (Becker and Huselid, 2009). Rewarding policies are very important in this context. Not only rewarding but also giving allowances to the employees detect the organizational culture. Wages, bonus, additional allowances, individual reward, team rewards are a few of those. Organizational culture depends on the market segment in which the organization invests. Type of works also is a big factor. Intellectual labor and physical labor belong to different cultures certainly. Natural environment at the work place also play a significant role (Becker and Huselid, 2009). Airy weather has been shown a hygienic culture while contaminated environment decreases the spirit of an organizational culture. External affairs of an organization are always matter in the organizational culture. Economic deals in market, legal position of the firm, social reputation of the organization etc. are important in this matter. Culture at innovative sectors and culture at conventional segments are witnessed to be totally different. Attitude tow ards work define the organizational culture often. Adoption of calculated risk at the time of task changes attitude in the workshop and organizational culture also (Colbert, 2010). Business-sector is a globally known aspect to conclude the organizational culture. Different sectors show different culture. Culture at service oriented workplace and culture at manufacturing workshops do not resemble. Some factors in these places can be similar, but the organizational culture is separate (Becker and Huselid, 2009). Human Resource Management has a pivotal significance to keep the organizational culture and subculture improved and healthy. There are many organizations which have different socio-cultural and socio-economic employees at different branches. Multinational companies have employees of different nationality and languages (Beech and Macintosh, 2012). These things create various subcultures under a single roof. In some organizations subcultures are mightier than main culture. This is sometimes better, sometimes worse. Human Resource Management practitioners are expected to maintain this matter. Cultural difference within a firm is an obvious matter. HRM practitioners deal with this. They nurture the matter of subculture on the basis of job, service line, utility, surrounding and level of the chain of command. Actually subcultures always stand on those things (Hughes, 2010). Position and necessity wise HRM practitioners merge or take the subcultures over to keep the works of the firm on. H uman Resource Management wants to run culture and subcultures together but parallel. It is mere challenging and imperative duty of HRM in recent era. Strong and Weak Cultures in an organization: As different human entities have different DNAs, different organizations have different cultures. Organizational culture is considered as the DNA of an organization, though it is an arguable issue. There are certain types or fashions of the culture in a firm. According to those types or variations generally two types of organizational cultures are witnessed on the basis of comparison. Those are Strong culture and Weak culture within an organization (Hughes, 2010). The strong culture is such organizational culture that is deeply rooted in the strategy and work procedure of a firm. Human Resource Management and managerial sector are actively attached with this type of organizational culture. Here HRM practitioners, along with the managerial section, make out well which are needed for employees and them too (Colbert, 2010). Human Resource Management tries to meet both ends accordance with the policies, market and values of the concerned firm. Maintaining of strong culture by HRM is not too tough and mere challenging, because it is embedded into the core of the organization. Strong culture is well acknowledged and made out by the employees. It is seen that the weak culture in an organization breaks out when aims, values and policies of the concerned organization are not clearly spoken, conversed and established. Aim and values of the firm is expected to be cleared to the employees (Colbert, 2010). Weak culture takes place when works and wages have a large difference. Beside this, values of works in the organization result into weak culture. If an organization goes under a weak organizational culture, customer satisfaction and meeting the marketing needs reaches at the lees. Weak organizational culture has many consequences such as necessity of accurate procedures in workforce, exact need for policies and strategies (Price, 2006). A weak organizational culture demands more engagement from Human Resource Management to execute tasks through the expected paths. Analysis for the HRM practitioner: In this part of the essay this study is going to present some analysis for the Human Resource Management practitioner in the perspective of organizational culture. A well known organization namely KFC is to be mentioned for dealing with the matter. KFC or Kentucky Fried Chicken is reputed as a US based fast food restaurant industry. It has near about 19000 outlets for selling products in almost 120 nations and territories. KFC works under Yum! Brands along with Taco Bell and Pizza Hut (KFCjobs, 2015). A deep look at the work culture of KFC tells that HRM of them put efforts to take out best potential of all people engaged to their business chain. Human Resource Management practitioners work there with energy and passion (KFCjobs, 2015). Restaurant industry is such an organization where maximum employees deal directly with the customers. Therefore recruitment plays here a vital role (KFCjobs, 2015). HRM practitioners at KFC choose people keeping the needs and natures of the customers at that location in mind. At many KFC outlets employees get free meals and chicken preparations other than wages and allowances. After doing a good job employees get on-spot admiration from HRM and managerial sections. Employees get special pins on uniforms as rewarding for achievement. Human Resource Management practitioner at KFC celebrates success of everyone to keep workers enthusiastic (KFCjobs, 2015). HRM practitioners of any organization can be inspired from the HRM of KFC, but they need not to follow it blindly. Unique management of Human Resource in different firms is located to bring success. An HRM practitioner initially needs to understand the focus and strategy of the managerial segments of the concerned organization. S/he is expected to act according to this. Secondly an HRM practitioner needs to make out the existing culture and subculture of the firm. Generally s/he has to be fit into those or s/he is employed to correct those. An HRM practitioner works in the core section of a workforce. S/he has to play vital role in recruitment. Well sorted employees can shoulder the strategy of the organization well. Generating motivation and enthusiasm is a big responsibility of an HRM practitioner. Appraisal and rewarding are projected to be handled without biasness. All employees are to be estimated without age or gender sub-category. A good HRM practitioner always is aware of sub culture and weak culture in a firm. S/he tries heart and soul to run subculture properly along with the main culture and repair the weak culture to convert it into stronger one. Reference: Andolsek, D.M. and Stebe, J. (2009) Devolution or (de) centralization of HRM functions in European organizations. International Journal of HRM, 16 (3): 311-329. Becker, B. E. and Huselid, M. A. (2009) Strategic human resources management: Where do we go from here? Journal of Management, 32 (6), 898-925. Beech, N and Macintosh, R (2012) Managing Change - Enquiry and Action, Cambridge: Cambridge University Press Beerel, A. (2010) Leadership and Change Management, California: Sage Beta.tutor2u.net, available from: https://beta.tutor2u.net/business/blog/organisational-culture-factors-influencing-the-culture-of-an-organisation-a [Accessed 05th May 2015] Budhwar, P. and Debrah, Y.A. (2009) Rethinking comparative and cross national human resource management research. International Journal of Human Resource Management, 12(3), 497515. Colbert, B.A. (2010) The Complex Resource-based View: Implications for Theory and Practice in Strategic Human Resource Management, Academy of Management Review, 28, 3, 341 358. Hughes, M (2010) Change Management, London: CIPD KFCjobs (2015). Culture. Retrieved from: https://jobs.kfc.com/article/ourculture Price, L., (2006) Poor personnel practice in the hotel and catering industry: does it matter? Human Resource Management Journal, 4(4), 44-62.