CMGT 400 NEW 2015

12
CMGT/400 Business Systems University of Phoenix 2015 UOP-TUTORIALS.INFO UPDATED AUGUST 2015 CMGT/400 WEEK 1

description

CMGT/400 WEEK 1 Risky Situations Table Paper Option #1 = Word Count: 2,987 words! Paper Option #2 = Word Count: 1,164 words! (Both optional papers included) Instructions:• List three types of sensitive information involved with each situation.• Identify three ways each information item could be misused or harmed.• Answer the questions at the end of the table.Questions at the end of the table:1.What is the most effective way to identify risks like those you noted in the tables?2.What are some important factors when weighing the depth of a formal risk analysis? How would you balance the interruption needed for depth and the need to continue ongoing organizational activity?3.What should an organization’s risk management specialist do with the information once a potential risk has been identified? What information would be needed for senior management to know the danger of each risk and the proper way to handle the risk?4.How would this specialist properly prioritize these risks to make sure the most important ones were mitigated first?5.Who is responsible for ensuring that an identified risk is addressed by the organization? What role does the analyst play? What role does senior management play? What roles do the analyst and senior management each play in addressing organizational risks? Supporting Activity: Examples of Information ProtectionWord Count: 1,209 words! How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. Supporting Activity: Confidentiality, Integrity, and AvailabilityWord Count: 689 words!How do confidentiality, integrity, and availability all play key roles in protecting information? Explain what each means and describe how each works together to protect information. CMGT400 WEEK 2 TUTORIAL COMMON INFORMATION SECURITY THREATS CMGT400 WEEK 2 DQ1 TUTORIAL CMGT400 WEEK 2 DQ2 TUTORIAL Add to Cart CMGT/400 Week 2 Learning Team: Kudler Fine Foods IT Security Report and Presentation Top Threats Team - Kudler Top Threats Option #1: Word Count: 902 words Team - Kudler Top Threats Option #2: Word Count: 372 words Team - Kudler Top Threats Option #3: Word Count: 253 words Learning Team Instructions: Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:• Area of System• Threats• Potential VulnerabilityDraft a summary of those threats that the team feels are most critical to Kudler. Individual - PART 1 Common Information Security Threats involving Ethical and LegalCommon Information Security Threats involving Ethical and Legal Common Information Security Threats involving Ethical and Legal Common Information Security Threats involving Ethical and Legal CREDIT UNIONS Paper Option #1Word Count: 2,640 COLLEGES Paper Option #2Word Count: 1,420 AMAZONPaper Option #3Word Count: 1,068 3 Optional Papers to Choose from! All 3 included in this week's Tutorial! Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4.• Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen.• Describe potential risks to the information and the related vulnerabilities within the organization when utilizing web components. How could you mitigate the risk

Transcript of CMGT 400 NEW 2015

Page 1: CMGT 400 NEW 2015

CMGT/400 Business Systems University of Phoenix 2015

UOP-TUTORIALS.INFO

UPDATED AUGUST 2015

CMGT/400 WEEK 1

Page 2: CMGT 400 NEW 2015

Risky Situations Table Paper Option #1 = Word Count: 2,987 words! Paper Option #2 = Word Count: 1,164 words! (Both optional papers included) Instructions:

• List three types of sensitive information involved with each situation. • Identify three ways each information item could be misused or

harmed. • Answer the questions at the end of the table.

Questions at the end of the table:

1. What is the most effective way to identify risks like those you noted in the tables? 2. What are some important factors when weighing the depth of a formal risk analysis? How

would you balance the interruption needed for depth and the need to continue ongoing organizational activity?

3. What should an organization’s risk management specialist do with the information once a potential risk has been identified? What information would be needed for senior management to know the danger of each risk and the proper way to handle the risk?

4. How would this specialist properly prioritize these risks to make sure the most important ones were mitigated first?

5. Who is responsible for ensuring that an identified risk is addressed by the organization? What role does the analyst play? What role does senior management play? What roles do the analyst and senior management each play in addressing organizational risks?

Supporting Activity: Examples of Information Protection Word Count: 1,209 words!

How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.

Supporting Activity: Confidentiality, Integrity, and Availability

Page 3: CMGT 400 NEW 2015

Word Count: 689 words!

How do confidentiality, integrity, and availability all play key roles in protecting information? Explain what each means and describe how each works together to protect information.

CMGT/400 Week 2 Learning Team: Kudler Fine Foods IT Security Report and Presentation Top Threats Team - Kudler Top Threats Option #1: Word Count: 902 words Team - Kudler Top Threats Option #2: Word Count: 372 words Team - Kudler Top Threats Option #3: Word Count: 253 words Learning Team Instructions: Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:

• Area of System

Page 4: CMGT 400 NEW 2015

• Threats • Potential Vulnerability

Draft a summary of those threats that the team feels are most critical to Kudler.

Individual - PART 1 Common Information Security Threats involving Ethical and Legal

CREDIT UNIONS

Paper Option #1 Word Count: 2,640

COLLEGES

Paper Option #2

Word Count: 1,420

AMAZON

Paper Option #3

Word Count: 1,068

3 Optional Papers to Choose from! All 3 included in this week's Tutorial!

Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4.

• Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen.

• Describe potential risks to the information and the related vulnerabilities within the organization when utilizing web components. How could you mitigate the risk?

Page 5: CMGT 400 NEW 2015

• Discuss how the organization can safeguard against legal issues. • Discuss some of the types of social data that could potentially cause

a problem for an organization. • Explain the legal, ethical, and regulatory requirements for protecting

the data of the organization.

Supporting Activity: Threats from Social Networking

Word Count: 761 words!

Based on the readings and your personal experience, are social network threats taken too lightly by organizations?

Supporting Activity: Information Assurance and Security

Word Count: 473 words!

Supporting Activity: Information Assurance and Security

How does an organization identify its vulnerabilities relative to information assurance and security? How do they identify the legalities and ethics involved? What should it do after it has identified them?

CMGT/400 Week 3

Page 6: CMGT 400 NEW 2015

Learning Team: Kudler Fine Foods IT Security Report and Presentation Security Considerations (Part 1 & Part 2 Combined!) Paper Option #1: Word Count: 4,609 words! Paper Option #2: Word Count: 1,053 words!

Learning Team Instructions: Draft the security considerations for each phase of the systems development process. Identify specific concerns if the system is ever removed from service. Specify what can be done in each systems development process phase to mitigate the risk for each entry in the table from the previous week. Be specific, but high-level in your mitigations. Most or all items will have something to check or do in each stage of the systems development process.

Individual - PART 1 & Part 2

Securing and Protecting Information

Security Authentication

Page 7: CMGT 400 NEW 2015

CREDIT UNIONS

Paper Option #1 Word Count: 4,265

COLLEGES

Paper Option #2

Word Count: 3,106

AMAZON

Paper Option #3

Word Count: 2,394

3 Optional Papers to Choose from!

Combined Week 2 & Week 3 Assignment!

Using the paper started in Week 2 add an additional 4-to 6-pages that describes the security authentication process.

• Discuss how this and other information security considerations will affect the design and development process for new information systems.

• Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage.

• Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.

• Provide an overview of several systems and devices that can provide security services to meet the needs raised in the paper.

Supporting Activity: Effective Controls of Health Care Information

Word Count: 985 words

What are three controls that would be effective in protecting health care information? For each item, describe the risk in your own terms and how the controls address that risk. Also, discuss how applicable the same risks and controls are to other organizations.

Page 8: CMGT 400 NEW 2015

Supporting Activity: Vulnerabilities in virtualization and in the Cloud

Word Count: 282 words

How can a company protect data on corporate laptops? Why do more organizations choose not to protect such data? Do you expect this to become a legal requirement in the future? Explain why you think so.

Supporting Activity: Disaster Recovery

Word Count: 644 words How would you create a plan for disaster recovery? What are the factors you would have to take into consideration when setting up your plan? For each factor, describe what you would do to ensure that the data is safe.

CMGT/400 Week 4 Learning Team: Kudler Fine Foods IT Security Report and Presentationtutorials.info/cmgt400.html Security Considerations (Part 1, Part 2, & Part 3 Combined!) Option #1 / Word Count: 5,928 words! Option #2 / Word Count: 1,310 words!

Learning Team Instructions: Identify the key information security policy elements that will be needed at Kudler Fine Foods to support the efforts

Page 9: CMGT 400 NEW 2015

to ensure that the new frequent shopper program properly protects the customer and organizational information. Identify the security awareness training needed to ensure that employees are ready to properly protect customer and organizational information when using the new system.

Individual - PART 3 The Role of Information Security Policy

CREDIT UNIONS

Paper Option #1 Word Count: 5,867

COLLEGES

Paper Option #2

Word Count: 4,580

AMAZON

Paper Option #3

Word Count: 3,359

3 Optional Papers to Choose from! Combined Week 2, Week 3, & Week 4 Assignment! Using the paper in Weeks 2 and 3 add an additional 3-to 4-pages describing the importance of policies and standards for maintaining information systems security.

• Include a discussion of the role employees--and others working for the organization--play in this effort.

• Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy.

• Describe how the organization's policies and standards would be administered to meet the key requirements of accepted industry standards.

• Discuss how organizations manage the different levels of security

Page 10: CMGT 400 NEW 2015

required for differing levels of personnel.

Supporting Activity: Information Security Policy

Word Count: 835 words!

How can an organization make sure all its users know and follow its information security policy? What are the common hindrances? How can an organization overcome them?

CMGT/400 Week 5 Learning Team: Kudler Fine Foods IT Security Report and Presentation Final Paper and Presentation 2 Full Options Included with editable MS Visio file! Final Option #1 PowerPoint (preview below)

KUDLER IT SECURITY CMGT/400

Final Option #2 / Word Count: 2,069 words with PowerPoint (preview below)

Write an 8-to 10-page report for the CIO of Kudler Fine Foods.

Page 11: CMGT 400 NEW 2015

This report should cover the material from the previous weeks, providing a comprehensive look at the key safeguards needed for the project at each stage of the systems development processes. The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats. Include the requirements for future audit provisions the internal staff may use to validate the security measures in the system. Prepare a presentation to executive management at Kudler Fine Foods of the need to make the changes recommended in the paper.

• The presentation should be 10 minutes in length. • The presentation must include appropriate graphics, and may be in a

Microsoft PowerPoint presentation format. • Online students will submit a presentation that must include detailed

speaker notes.

Individual: The Global Security Policy

Word Count: 1,079 words! Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries. Include a discussion of how cultural differences could make keeping your information secure more difficult.

Supporting Activity: Secure Software and Systems

Word Count: 321 words! What are two of the best practices for developing secure software and systems? Why would each practice be suitable for an organization to implement to strengthen its information security posture? Describe the benefits of each. Supporting Activity: Threat Modeling

Word Count: 401 words! Where should threat modeling be used in the system development process? Why is it so challenging

Page 12: CMGT 400 NEW 2015

for some individuals to understand? What can be done to make learning how to do it effectively easier?

DOWNLOAD INSTANTLY @

UOP-TUTORIALS.INFO ALL TUTORIALS PURCHASED ARE 100% SATISFACTION GUARANTEED!