Categories
Information Systems

You are part of a team selected by the Chief Information Officer (CIO) to perfor

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course: Vampire Legends (Wk 1) Cruisin Fusion (Wks 2“3) Devils Canyon (Wks 4“5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed: Describe the risk. Example: Viruses and malware can negatively impact the confidentiality integrity and availability of organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available beyond the simple explanation in score point two. IT Security “ Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained and which ones might be feasible. IT Security “ Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security how much security is needed different methods to employ etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e. what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

Categories
Information Systems

You are part of a team selected by the Chief Information Officer (CIO) to perfor

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course: Vampire Legends (Wk 1) organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available beyond the simple explanation in score point two. IT Security “ Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained and which ones might be feasible. IT Security “ Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security how much security is needed different methods to employ etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e. what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. Note: The title page and reference page do not count toward the assignment “ power point and summary “ length requirements.

Categories
Information Systems

You are part of a team selected by the Chief Information Officer (CIO) to perfor

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course: Vampire Legends (Wk 1) organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available beyond the simple explanation in score point two. IT Security “ Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained and which ones might be feasible. IT Security “ Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security how much security is needed different methods to employ etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e. what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. Note: The title page and reference page do not count toward the assignment “ power point and summary “ length requirements.

Categories
Information Systems

You are installing a new network and it includes an upgrade of software. Develop

You are installing a new network and it includes an upgrade of software. Develop a contingency plan to mitigate risk for this event. The contingency plan must address the following elements: Where should staff meet in the event the network is not accessible? Who has the authority to initiate a contingency plan? Which staff members are critical and must be on-site or always reachable? Where are the back-ups and how are they restored to go back to the old version of software? Who can cover for each critical staff member? What are single points of failure and how can those risks be ameliorated? What systems vendors and partners pose risk should they fail? Who is responsible for communicating with customers and how? Submission Details: This paper should be approximately 3“4 pages in length using Microsoft Word. Add this to Submissions Areapaper.

Categories
Information Systems

You are in charge of organizing a dinner-dance concert for a local charity. You

You are in charge of organizing a dinner-dance concert for a local charity. You have reserved a hall that will seat 30 couples and have hired a jazz combo. Develop a scope statement for this project that contains examples of all the elements. Assume that the event will occur in 4 weeks and provide your best guess estimate of the dates for milestones.

Categories
Information Systems

You are in networking at a large international company. Your company recently de

You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company. Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports allowing contractors access to the system and setting the hours international customers can place orders on your companys system) can impact the companys network particularly in terms of security. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers. Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long. Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper. 1. Overview of Networking and Security You decide to begin your presentation by providing your audience an overview of networking with an emphasis on security and why it is important for all company roles to assist in securing the companys network. Discuss the potential security risks for each layer of the OSI model and the risks in each of the following: · Distributed vs. centralized computer systems and why your department chose to be distributed/centralized · Different network topologies and why your department chose the topology it did · Why standards bodies are essential in networking and how your department complies with standards · The importance of communication protocols and which one(s) your department chose · The differences between LAN WAN and wireless technologies and how your department incorporated each · The responsibilities associated with providing telecommunications services such as security privacy reliability and performance Click or tap here to enter your speaker notes. 2. Routing and Switching Describe basic routing and switching in the context of the OSI model (i.e. in which layer routing switching and cabling occur). To underscore your departments commitment to achieving 24/7 availability describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks. Click or tap here to enter your speaker notes. 3. Effective Security Policy Describe at least 3 characteristics of an effective security policy emphasizing the ways in which all departments in the company are responsible for helping secure the company network. Click or tap here to enter your speaker notes. 4. Security Strategies Explain strategies your department used to build security directly into the design of your company network. Click or tap here to enter your speaker notes. 5. Malware Define malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your companys network against malware. Click or tap here to enter your speaker notes. 6. Closing Summarize your presentation. Click or tap here to enter your speaker notes.

Categories
Information Systems

You are consulting for a friend who owns a small business with about 20 employee

You are consulting for a friend who owns a small business with about 20 employees. She is in the process of standardizing all the software her employees use. They use a lot of productivity software specifically presentation software spreadsheets and word processing applications. In addition they quite often share the files with external agencies that collaborate on work with them. Your friend wants to keep costs down but she also wants seamless integration with her external agencies. Respond to the following in a minimum of 175 words: Which productivity software options do you advise her to choose? Provide 1-2 reasons for your advice.

Categories
Information Systems

You are going to create a plan over a series of weeks where youre going to look

You are going to create a plan over a series of weeks where youre going to look at developing a new product or do a product extension for a public company. Step one is to identify a company that you would like to learn more about and consider developing a product plan for them. This plan will be written as a cumulative document where you will add a section each week and submit the final plan. Each part: approximately 2-3 pages including in text and work citation. Use data and facts to support your idea. Include images to describe the market landscape and opportunity. Use APA style. Include Min 4 “ 6 credible sources. Week 4 “ Opportunities Read where opportunities for business come from. Please read Peter Druckers article The Discipline of Innovation.( https://hbr.org/2/08/the-discipline-of-innovation ) Write briefly regarding the company you are selecting and a possible product idea / extension for the company to consider. Please describe why you think this new idea is a fit for this company and why you think it is an opportunity. Please refer to Peter Druckers The Discipline of Innovation when discussing opportunities. Post in assignments approximately 1 page. Week 5 “ Strategy Write what kind of customers needs willyour product meet?Why is this product or idea an opportunity for these customers? Write one page and add it to your prior weeks document for opportunities and submit assignments. Week 6 “ Questions Write what questions you think need to be answered to launch this product? You are looking for 10 to 15 questions addressing a broad range of business problems you would need to solve to implement this product plan. (approximately one-two pages added to your original pages for opportunities and strategy.) Week 7 “ How do you find information? Describe how you might search for information to answer the questions from the prior week. Please list your prior weeks questions how you might conduct a search and the sources you may consider. Answer your questions and be really specific. Add data and facts to support your arguments. Please list sources in APA format using in text and work citaiton (at the end). Week 8 “ Systems Looking at your company structure list at least four departments and information/data systems they might use. Be detailed and specific for example your company has an accounting system like QuickBooks in the accounting department. This system may be linked to other departments as well and some departments may have multiple systems. This should be approximately 1 page added to your other four sections. Week 9 “ Conclusions What have you learned by analyzing this product plan? How can MIS be used to resolve the decisions regarding the identified opportunity? Please write one page of conclusions that will be added to your total prior 5-week document. Writing a critique “ https://www.citewrite.qut.edu.au/write/critique.jsp Please watch this: https://www.youtube.com/watch?v=oNFJCcsojPE Separate weekly references E-Textbook: https://fidm.vitalsource.com/reader/books/9781119255246/epubcfi/6/20%5B%3Bvnd.vst.idref%3DAc01%5D!/4

Categories
Information Systems

You are almost at the end of your critical thinking journey”but only for this cl

You are almost at the end of your critical thinking journey”but only for this class! Hopefully this begins a lifelong journey of searching for knowledge improving yourself and seeking the truth! We started the course reflecting on what critical thinking is and how we formulate our opinions and beliefs. We then expanded the concept of critical thinking to include consideration of how we relate to friends family and other personal situations. This week we look at a broader scope of areas where critical thinking is vital. After completing the Learning Activities for the week please respond to all the questions below. Your response should be a minimum of 175 words total (approx. 50 words per question). Where do you get most of your news and how do you analyze what you hear view or read on media outlets? In what ways can/do you as a citizen get involved in the governmental process? How do you apply critical thinking when you are involved in these activities? Share an example of a fallacy or rhetoric you have seen used to market a product or service in commercials advertisements etc. How will you use information provided in Ch. 10 of THiNK: Critical Thinking and Logic Skills for Everyday Life to be a more mindful consumer? If someone asked you what your favorite activity or concept from this class was as well as what the most challenging activity or concept was what would you tell them and why?

Categories
Information Systems

You are an information security manager for a large national retailer and are di

You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits. At the request of the board of directors the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit and consequently the overall success of the systems implemented in the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits.In addition to the typical networking and Internetworking infrastructure of a medium-sized organization the organization has the following characteristics: They have a main office and 268 stores in the United States. They use a cloud computing environment for storage and applications. Their IT infrastructure includes Cisco workgroup and core switches Cisco routers Cisco firewalls and intrusion prevention systems and servers running Microsoft Windows Server 2012. They have over 1 000 desktops and approximately 500 organization-owned laptops at the main headquarters. They allow employees to bring their own devices into the organization; however they are subject to search upon entry and exit from the building. They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners. They enable wireless access at the main office and the stores. They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate website. Write a 4“6 page paper in which you: Explain the management plan for conducting IT audits including: Risk management. System software and applications. Wireless networking. Cloud computing. Virtualization. Cybersecurity and privacy. BCP and DRP. Network security. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.