CMGT 430 Education Organization / snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CMGT 430 Education Organization / snaptutorial.com

Description:

CMGT 430 Assignment Week 1 IT Systems Connection Table CMGT 430 Assignment Week 2 Enterprise Security Concerns CMGT 430 Assignment Week 3 Responding to Threats – PowerPoint PPT presentation

Number of Views:5
Slides: 31
Provided by: McdonaldRya60

less

Transcript and Presenter's Notes

Title: CMGT 430 Education Organization / snaptutorial.com


1
CMGT 430Education Organization / snaptutorial.com
2
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
CMGT 430 Assignment Week 1 IT Systems Connection
Table   CMGT 430 Assignment Week 2 Enterprise
Security Concerns
3
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
After reviewing the material your group has
prepared so far, the management team has returned
with a list of five specific concerns. They
include  
4
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
A few Assignment Weeks ago, a nearby hospital,
which is very similar in operations and scale to
Auburn Regional, was the target of a ransomware
attack. You have kept a close eye on this event.
You decide to complete a review of current
material available regarding ransomware attacks
and especially ransomware and hospital enterprise
systems.  
5
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
Your work so far has been well-received and the
management team is very interested in quickly
bringing the rest of the organization into the
process. The management team has expressed
interest in incorporating cloud technology as
part of the Auburn Regional's IT architecture. To
integrate both of these requests, you decide to
create an infographic that could, on a single
diagram
6
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
An enterprise security plan is a document that
explains the security exposure that an entity
would encounter in a specific marketplace. A
committee of people typically writes this
document over a span of a few months. Many times
the drafts begin with developing a high-level
overview of strategic objectives that address how
to secure the enterprise inside and outside the
enterprise.   The CEO asks you to explain the
core principles of enterprise security and
respond to five strategic objectives as part of
the overall enterprise system security plan
draft. They are  
7
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
Respond to the following in a minimum of 175
words  Just a few years ago, all IT processing
took place in-house. Payroll processing, human
resources and benefits management, real estate
management, and investor relations
8
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
Respond to the following in a minimum of 175
words  Consider?the following scenario 
9
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com      
Respond to the following in a minimum of 175
words  At many security checkpoints where
biometrics are used, only one protocol is
employed, such as a fingerprint reader, a
hand-scanner, or facial recognition. Other
checkpoints use several biometric checkpoint
protocols in tandem to add a layer of security. 
10
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 1 Individual IT Systems Connection
Table   CMGT 430 Week 2 Learning Team
Vulnerabilities
11
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Deli
neate the difference between system architecture,
software architecture, and information
architecture. Provide some examples to illustrate
what each represents
12
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Why
should an organization consider implementing
role-based access control (RBAC) over
discretionary access controls (DAC) or mandatory
access controls (MAC)? Provide an example to put
in context the differences between the three
approaches?
13
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutoria.com   Based
on the Shaw (2009) article, why would you
consider deploying an intrusion prevention system
(IPS) over an intrusion detection system (IDS) to
improve
14
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Base
d on the Barr article (2009), how can
radio-frequency identification (RFID) technology
be applied to
15
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   In
role-based systems, you want to establish
mutually exclusive roles to prevent assignment of
conflicting permissions to a single role. Provide
examples of two
16
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Base
d on the Barr article (2010), what software must
be considered to provide adequate security
management across the enterprise?
17
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   What
is a virtual enterprise, and how is that
different from a physical one?
18
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Base
d on the Drumheller article (2008), should
biometrics be used instead of passwords and pins
to authenticate enterprise users, or should they
be used in conjunction with passwords and pins?
What factors should be considered?
19
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Base
d on the Ulasien article (2008), why is an IT
security audit critical in developing an
enterprise security strategy? Should threats to
the enterprise be reviewed
20
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   Base
d on the Drumheller article (2007), why should
the critical business processes be identified,
and their impact on the business be evaluated
along with
21
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 1 Individual IT Systems Connection
Table Enterprise systems consist of multiple IT
systems.  It is important to know the different
interconnections each system may have.  IT
systems do not operate alone in the modern
enterprise, so securing them will involve
securing their interfaces with other systems, as
well as the system itself.
22
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 2 Individual Applying Risk Management
Consulting Note This is the first of three
assignments that will be completed for this
three-assignment project, ending with
23
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 2 Learning Team Vulnerabilities and
Threat Pairs Select an organization that you are
familiar with or an organization from a published
case study. Find case studies through the
following sources or through
24
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 3 Individual Using Roles Note This is
the second of three parts to this project.  Refer
back to your organization used in the Week Two
Applying Risk Management Consulting assignment. A
better way to control user access to data is to
tie
25
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 3 Learning Team Ranking the Pairs The
CEO of your selected organization has requested
an enterprise security plan from your team. This
week you will prioritize the threats and
vulnerabilities previously
26
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 4 Individual Controlling Access This is
the third assignment of the series.  Continue the
Applying Risk Management Consulting assignment
for your chosen organization. Refer to your Week
Three individual assignment. Write a 4- to 5-page
business proposal in which you
27
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 5 Individual An IT Security Department
Profile The CEO asks you to create a presentation
for the company about the IT Security Department.
She wants you to highlight the core principles of
enterprise security, and visually present the
positions in the IT Security Department that are
responsible for which principles
28
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 5 Team Enterprise Security Plan
29
CMGT 430Education Organization / snaptutorial.com
For more classes visit www.snaptutorial.com   CMGT
430 Week 5 Team Enterprise Security Plan
30
CMGT 430Education Organization / snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com