CMGT 400 Three Week Assignment

profiletoopoor4u

WEEK 2  Common Information Security Threats involving Ethical and Legal

DUE 06/20

 

NOTE: This is part one of a three-part assignment. The final version will be submitted in Week 4. It is expected that adjustments will be made in the final version based on the feedback provided in Weeks 2 and 3.

Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4.

  • Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen.
  • Describe potential risks to the information and the related vulnerabilities within the organization when utilizing web components. How could you mitigate the risk?  
  • Discuss how the organization can safeguard against legal issues.
  • Discuss some of the types of social data that could potentially cause a problem for an organization.
  • Explain the legal, ethical, and regulatory requirements for protecting the data of the organization.

Format your paper consistent with APA guidelines.

 

WEEK 3 Securing and Protecting Information

DUE 06/27

NOTE: This is part two of a three-part assignment. The final version will be submitted in Week 4. It is expected that adjustments will be made in the final version based on the feedback provided in Weeks 2 and 3.

Using the paper started in Week 2 add an additional 4-to 6-pages that describes the security authentication process. 

  • Discuss how this and other information security considerations will affect the design and development process for new information systems. 
  • Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage. 
  • Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.
  • Provide an overview of several systems and devices that can provide security services to meet the needs raised in the paper

 

 WEEK 4  The Role of  information Security Policy

DUE 07/04

 

NOTE: This is part two of a three-part assignment. The final version will be submitted in Week 4. It is expected that adjustments will be made in the final version based on the feedback provided in Weeks 2 and 3.

Using the paper started in Week 2 add an additional 4-to 6-pages that describes the security authentication process. 

  • Discuss how this and other information security considerations will affect the design and development process for new information systems. 
  • Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage. 
  • Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.
  • Provide an overview of several systems and devices that can provide security services to meet the needs raised in the pape

 

 

    • Posted: 4 years ago
    • Due: 
    • Budget: $3
    Answers 1

    Purchase the answer to view it

    blurred-text