Advertisement
Olkach

CMGT 400 Week 1 IT Security Report

Nov 23rd, 2014
206
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.88 KB | None | 0 0
  1.  
  2.  
  3. This work of CMGT 400 Week 1 IT Security Report includes:
  4.  
  5.  
  6. Kudler Fine Foods Security Overview
  7.  
  8. General Questions - General General Questions
  9. CMGT/400 Entire Course
  10.  
  11. CMGT/400 Week 1
  12.  
  13. Week 1 Discussion Question 1
  14.  
  15. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business?
  16.  
  17. Week 1 Discussion Question 2
  18.  
  19. How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.
  20.  
  21. CMGT/400 Week 2
  22.  
  23. Individual Assignment
  24.  
  25. Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.
  26.  
  27. Write a 1,000- to 1,500-word paper on at least three major information security threats that a specific organization you choose faces today.
  28.  
  29. Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities. 
  30.  
  31. Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces. 
  32.  
  33. Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.
  34.  
  35. Explain the legal, ethical, and regulatory requirements for protecting data.
  36.  
  37. Team Assignment
  38.  
  39. Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:
  40.  
  41. Area of System
  42.  
  43. Threat
  44.  
  45. Potential Vulnerability
  46.  
  47. Draft a summary of those threats that the team feels are most critical to Kudler.
  48.  
  49. Week 2 Discussion Question 1
  50.  
  51. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money?
  52.  
  53. Week 2 Discussion Question 2
  54.  
  55. Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so?
  56.  
  57. CMGT/400 Week 3
  58.  
  59. Individual Assignment
  60.  
  61. Note. The Week Three assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.
  62.  
  63. Write a 1,400- to 2,100-word paper that describes the security authentication process. 
  64.  
  65. Discuss how this and other information security considerations will affect the design and development process for new information systems. 
  66.  
  67. Include a brief discussion of how to include preventative measures for securing data, such as backups and remote or redundant
  68.  
  69. To download this tutorial follow the link - https://bitly.com/1rubtSN
  70.  
  71. It may seem best to buy books long before a class starts, but you may save some cash if you wait until the first day of each class. Sometimes, you can save yourself a purchase by doing this. Since you don't know what the situation is until you actually go to class, it is best to wait to buy. Often, the lectures and online readings will be sufficient for you to do well in the course.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement