Advisory from Professionals Preparing Information .docx
Cmgt 400 week 4 team assignment security policy and training
1. For downloading more tutorials visit
https://bitly.com/1rubu9k
This paperwork of CMGT 400 Week 4 Team Assignment
Security Policy and Training contains:
KUDLER FINE FOODS IT SECURITY REPORT
General Questions - General General Questions
CMGT/400 Entire Course
CMGT/400 Week 1
Week 1 Discussion Question 1
What is the mindset required to properly protect
information? What role does reasoned paranoia play in the
minded and how can an individual keep the proper balance
between protecting information and enabling business?
Week 1 Discussion Question 2
How can information be an asset in a company? Discuss
three different examples of information that should be
protected by a company and not exposed. Include several
examples of what management could do to protect each
example.
CMGT/400 Week 2
Individual Assignment
Note. The Week Two assignment has been identified as a tool
to assist in the university’s Programmatic Assessment
Project. As such, completed student assignments may be
periodically sampled for program analysis purposes. To assist
in maintaining the integrity of the data collected, do not
change the content of this assignment. Please delete this
2. note before submitting to students.
Write a 1,000- to 1,500-word paper on at least three major
information security threats that a specific organization you
choose faces today.
Describe potential risks to the information and the related
vulnerabilities within the organization. Identify the forces
that drive each threat and the related vulnerabilities.
Discuss how the values for threat and vulnerability combine
to indicate the overall risk the organization faces.
Describe how an organization can properly manage its
information security efforts using proper risk management
techniques and cost-benefit analyses for these information
security efforts.
Explain the legal, ethical, and regulatory requirements for
protecting data.
Team Assignment
Develop a table that identifies the top threats to the new
customer rewards program at Kudler Fine Foods in
preparation for your final report (due in Week Five). Include
the likely vulnerabilities each threat might exploit. The
following table is an example of one you might use:
Area of System
Threat
Potential Vulnerability
Draft a summary of those threats that the team feels are
most critical to Kudler.
Week 2 Discussion Question 1
Why do you think one of the methods in the Heimerl (2010)
article would be the most effective way for an organization to
save money?
Week 2 Discussion Question 2
3. Which of the threats from social networking in the Horn
(2010) article also apply to other businesses? Which do not?
Why do you think so?
CMGT/400 Week 3
Individual Assignment
Note. The Week Three assignment has been identified as a
tool to assist in the university’s Programmatic Assessment
Project. As such, completed student assignments may be
periodically sampled for program analysis purposes. To assist
in maintaining the integrity of the data collected, do not
change the content of this assignment. Please delete this
note before submitting to students.
Write a 1,400- to 2,100-word paper that describes the
security authentication process.
Discuss how this and other information security
considerations will affect the design and development
process for new information systems.
Include a brief discussion of how to include preventative
measures for securing data, such as backups and remote or
redundant storage.
Note what role this will play in the other areas covered in the
paper.
Provide an overview of several systems and devices that can
provide security services to meet the needs raised by the
other areas covered in the paper.
Team Assignment
Draft the security considerations for each phase of the
systems development process.
Identify specific concerns if the system is ever removed from
service.
Specify what can and should be done in each systems
4. development process phase to properly mitigate the risk for
each entry in the table from the previous week. Be specific,
but high-level in your mitigations. Most or all items will have
something to check or do in each stage of the systems
development process.
Week 3 Discussion Question 1
What are three of the controls in the Helton (2010) article
that would be effective in protecting health care
information? For each item, describe the risk in your own
terms and suggested solutions to mitigate it. Also, discuss
whether this issue would face other types of organizations,
or if it is limited to only those in the health care field.
Week 3 Discussion Question 2
How can a company protect data on corporate laptops
according to the Storn (2008) article? Why do more
organizations not use this kind of protection? Do you expect
this to become a legal requirement in the future? Explain
why or why not.
CMGT/400 Week 4
Individual Assignment
Note. The Week Four assignment has been identified as a
tool to assist in the university’s Programmatic Assessment
Project. As such, completed student assignments may be
periodically sampled for program analysis purposes. To assist
in maintaining the integrity of the data collected, do not
change the content of this assignment. Please delete this
note before submitting to students.
Write a 1,000- to 1,500-word paper describing the
importance of policies and standards for maintaining
information systems security.
Include a discussion of the role employees—and others
5. working for the organization—play in this effort.
Examine the different levels of security and how an
organization can provide the proper level of effort to meet
each information security need and how this relates to what
is in an organization’s information security policy.
Team Assignment
Identify the key information security policy elements that will
be needed at Kudler Fine Foods to support the efforts to
ensure that the new frequent shopper program properly
protects the customer and organizational information.
Identify the security awareness training needed to ensure
that employees are ready to properly protect customer and
organizational information when using the new system.
Week 4 Discussion Question 1
What are the top three areas that an organization should
work on to respond to the issues raised in the de Villiers
(2010) article? Why are these areas critical to the
organization? Is the author’s assessment correct? Explain
why or why not. Choose a specific organization to illustrate
your argument.
Week 4 Discussion Question 2
What is the value and effect of a good business impact
analysis (BIA)? How can using this help an organization
develop an effective information security policy?
CMGT/400 Week 5
Team Assignment
Develop a 3,000- to 3,500-word report for the CIO of Kudler
Fine Foods.
This report should cover the material from the previous
weeks, providing a comprehensive look at the key safeguards
needed for the project at each stage of the systems