Advertisement
Olkach

CMGT 400 Week 4 The Role of Information Security Policy

Nov 26th, 2014
205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.78 KB | None | 0 0
  1.  
  2.  
  3. This paperwork contains CMGT 400 Week 4 The Role of Information Security Policy
  4.  
  5. General Questions - General General Questions
  6. CMGT/400 Entire Course
  7.  
  8. CMGT/400 Week 1
  9.  
  10. Week 1 Discussion Question 1
  11.  
  12. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business?
  13.  
  14. Week 1 Discussion Question 2
  15.  
  16. How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.
  17.  
  18. CMGT/400 Week 2
  19.  
  20. Individual Assignment
  21.  
  22. Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.
  23.  
  24. Write a 1,000- to 1,500-word paper on at least three major information security threats that a specific organization you choose faces today.
  25.  
  26. Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities. 
  27.  
  28. Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces. 
  29.  
  30. Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.
  31.  
  32. Explain the legal, ethical, and regulatory requirements for protecting data.
  33.  
  34. Team Assignment
  35.  
  36. Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:
  37.  
  38. Area of System
  39.  
  40. Threat
  41.  
  42. Potential Vulnerability
  43.  
  44. Draft a summary of those threats that the team feels are most critical to Kudler.
  45.  
  46. Week 2 Discussion Question 1
  47.  
  48. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money?
  49.  
  50. Week 2 Discussion Question 2
  51.  
  52. Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so?
  53.  
  54. CMGT/400 Week 3
  55.  
  56. Individual Assignment
  57.  
  58. Note. The Week Three assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.
  59.  
  60. Write a 1,400- to 2,100-word paper that describes the security authentication process. 
  61.  
  62. Discuss how this and other information security considerations will affect the design and development process for new information systems. 
  63.  
  64. Include a brief discussion of how to include preventative measures for securing data, such as backups and remote or redundant storage. 
  65.  
  66. Note wha
  67.  
  68. To download this tutorial follow the link - https://bitly.com/1rubupL
  69.  
  70. It is important to remember that college is not all about studying. College is a significant step into adulthood and should be treated as such. While you should not party the night away, do not keep your nose in your books to the point that you do not get to enjoy this time of your life.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement