1. CMGT 582 Entire Course (June,2020)
For more course tutorials visit
www.tutorialrank.com
CMGT 582 Week 1 Discussion Information Systems
CMGT 582 Week 1 Vampire Legends
CMGT 582 Week 2 Discussion Digital Rights Management
CMGT 582 Week 2 Crusin’ Fusion, Part 1
CMGT 582 Week 3 Discussion Privacy v. Convenience
2. CMGT 582 Week 3 Crusin’ Fusion, Part 2
CMGT 582 Week 3 Team Privacy Challenges
CMGT 582 Week 4 Discussion Safeguarding Against Security Threats
CMGT 582 Week 4 Devil’s Canyon, Part 1
CMGT 582 Week 5 Discussion Information Security Risks
CMGT 582 Week 5 Devil’s Canyon, Part 2
3. CMGT 582 Week 6 Discussion Security Life Cycle Steps
CMGT 582 Week 6 Signature Assignment Security Audit
.....................................................................................................................
.........................................
CMGT 582 Week 1 Discussion Information Systems
For more course tutorials visit
www.tutorialrank.com
As customers, students, patients, taxpayers, and citizens, we are
surrounded by information systems that support customer interactions.
4. Respond to the following in a minimum of 175 words:
Identify and describe two such systems that you have used. Briefly
discuss the types of customer interactions you have experienced with
these systems. Compare what you found to be important security
features of each one.
.....................................................................................................................
.........................................
CMGT 582 Week 1 Vampire Legends
For more course tutorials visit
www.tutorialrank.com
Resource: Simulation Transcript
Part A: Ch. 10 Role Playing Sim: Vampire Legends
In this role-playing simulation, you will be the acting CIO and will
specifically work on the strategy and the budget of the game Ancient
Age, the sequel to Vampire Legends. The simulation will require you to
give a breakdown of the budget report, choose an allocation strategy
based on the risks and expenses involved, choose the best advertising
5. campaign, analyze threats related to information security, and decide the
course of action in handling threats to information security.
Using the Vampire Legends Access link, complete the interactive before
moving to Part B.
Part B: Memo to CEO
Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the
Vampire Legends organization to:
Analyze the components of information security asit applies to the
scenario presented in Vampire Legends, including:
A breakdown of the budget report
Your allocation strategy based on the risks and expenses involved
Your choice for the best advertising campaign
The course of action in handling information security threats in the
future
6. Illustrate the role of ethics as presented in the Vampire Legends
simulation conflict to reflect the relationship between ethics the success
of the Vampire Legends organization. Include:
The ethical conflict in this scenario
The consequences of the conflict
The solution to the conflict
The impact of ethics on revenue
Submit your assignment.
.....................................................................................................................
.........................................
CMGT 582 Week 2 Crusin’ Fusion, Part 1
For more course tutorials visit
www.tutorialrank.com
Part A: Ch. 6 Role Playing Sim: Cruisin' Fusion
In this simulation, you will understand how to develop a website for a
chain of concession stands you inherited from Uncle Al. You’re not sure
what to do with the concession truck, but a couple of your friends think
Al was onto something with his unusual taco food truck. They want to
7. partner with you to expand, targeting sports events, outdoor concerts,
political rallies, holiday marches, and other events where customers
might pay a little more for a very distinctive and healthier meal. With
the right marketing, this could be a promising business venture.
Using the Crusin’ Fusion Simulation Access link, complete the
interactive before moving to Part B.
Part B: Cruisin’ Fusion Contest
Now that the Crusin’ Fusion website is up-and-running, you and your
team have decided to run a contest on the blog asking customers to name
the latest fusion recipe. In order to participate, the customer will need to
enter first and last name, phone number, and an email address, as well as
the suggested fusion name. The winner of the contest will receive a $20
gift card.
8. Kiran supports this idea but has concerns she wants the team to consider
before moving forward. She has asked that you prepare a 6- to 10-slide
presentation with speaker notes for the next web meeting to address the
following:
Research and assess the ethical issues related to data customer collection
and information management. How will customer information be
protected?
Research and examine the need to protect the intellectual property of the
customers who submit name suggestions. What protection will Cruisin’
Fusion need in order to use the name suggested by the winner? What
protection or disclaimer does the customer require?
Include a 1/2-page disclaimer to add to the blog for customers outlining
the contest rules, explaining how their personal information will be used
and stored, and discussing the use of all intellectual property submitted
as part of the contest.
Submit your assignment.
.....................................................................................................................
.........................................
CMGT 582 Week 2 Discussion Digital Rights
Management
9. For more course tutorials visit
www.tutorialrank.com
Respond to the following in a minimum of 175 words:
Discuss digital rights management. Why do organizations use
technology to protect intellectual capital? Describe a typical DRM
application that can be used to manage access to digital content. Discus
any disadvantages to using DRM.
.....................................................................................................................
.........................................
CMGT 582 Week 3 Crusin’ Fusion, Part 2
For more course tutorials visit
www.tutorialrank.com
Refer to Cruisin’ Fusion, Part A in Week 2.
10. The Crusin’ Fusion taco trucks are gaining popularity, fueling a demand
for an order-ahead option on the website. After careful consideration, the
team has decided to add shopping cart software to the Cruisin’ Fusion
website to meet this demand.
Research various shopping cart software to determine the best choice for
website.
Write a 1- to 2-page blog post to launch this new feature and to reassure
your customers that placing online orders is safe. In addition to
introducing the order-ahead option, your blog post should:
Analyze how the new shopping cart software upholds ethical trends in
consumer privacy.
Examine ethical considerations for maintaining confidentiality and
consumer data.
Describe the various privacy regulations upheld with the shopping cart
software.
12. Under what circumstances does Google share personal information with
other companies?
How do you describe the information security measures that Google
takes to safeguard access to personal information?
Is there anything in the privacy policy that makes you uncomfortable?
Are you likely to change your Google search habits as a result of
reviewing its privacy policy?
.....................................................................................................................
.........................................
CMGT 582 Week 3 Team Privacy Challenges
For more course tutorials visit
www.tutorialrank.com
Using the Case Study #1 Facebook and Instagram: Privacy Challenges
Access link, review the information presented in the Case Study:
Facebook and Instagram: Privacy Challenges.
Working together as a team, prepare an email analyzing ethical privacy
trends, confidentiality, and privacy regulations based on the information
in the Case Study for the employees in the Vampire Legends
organization from Week 1. Consider the following questions as you
create your email:
13. How might privacy and user considerations differ for an application
such as Facebook, which is used primarily by individual users,
compared with an application such as an ERP system that is used
primarily by corporations?
How does the default selection of sharing versus not sharing information
affect the subsequent choices of individual users?
What is the likely perspective of marketers on privacy issues at
Facebook?
How do app developers fit into the social media industry?
Submit your assignment.
.....................................................................................................................
.........................................
CMGT 582 Week 4 Devil’s Canyon, Part 1
For more course tutorials visit
www.tutorialrank.com
In this simulation, you will evaluate how to design an enterprise
architecture for a Mountain Resort. Your job is to utilize the team’s
14. vision to design the enterprise architecture using the interactive map
tools while staying in budget.
Using the Devil’s Canyon Simulation Access link, complete the
interactive before moving to Part B.
Part B: Policies, Plans, and Risks
Now that you’ve seen all of the elements contributing to the Devil’s
Canyon enterprise architecture, Justin wants to move forward with
developing privacy policies to ensure videos aren’t distributed or
uploaded to the net without the consent of the people in them. This
opens a much larger conversation: Devil’s Canyon is also in need of a
complete security plan, as well as risk assessments.
In a 2- to 3-page rationale and table, prepare the following information
to present to the Devil’s Canyon team:
15. Explain the relationship between policies and security plans. Identify
potential policy needs, noting Justin’s privacy policy, in relation to the
Devil’s Canyon enterprise structure.
Outline the importance of a security plan in relation to security roles and
safeguards.
Analyze at least 5 security-related risks/threats that Devil’s Canyon may
face.
Assess the probability and impact to the Devil’s Canyon if each risk
occurs. Based on these two factors, determine the overall risk level. For
purposes of this assignment, evaluate and categorize each factor as low,
medium, or high, and create a table to illustrate the risks. For example, a
risk/threat with a low likelihood of occurrence and a high impact would
represent an overall medium risk.
Consider digital elements mentioned in the designing of the enterprise
architecture, such as software, hardware, proposed security measures,
smart lift tickets, web cam systems, and smartphones.
Submit your assignment.
.....................................................................................................................
.........................................
CMGT 582 Week 4 Discussion Safeguarding Against
Security Threats
16. For more course tutorials visit
www.tutorialrank.com
Individuals and organizations today face a variety of security threats. To
protect themselves from these threats, they usually take certain
protective measures—commonly known as safeguards.
Respond to the following in a minimum of 175 words:
Discuss some important safeguards and explain how they function in
protecting organizations from security threats. Use a specific example
when possible.
.....................................................................................................................
.........................................
CMGT 582 Week 5 Devil’s Canyon, Part 2
For more course tutorials visit
www.tutorialrank.com
17. Refer to Devil’s Canyon, Part A in Week 4.
Using the potential risks for Devil’s Canyon you identified in Week 4,
create a 3- to 4-page matrix to share with the team. In your matrix:
Briefly describe each of the identified risks/threats.
Analyze and evaluate the security controls that mitigate each of the
risks/threats identified.
Provide a rationale for how each of the controls identified mitigates the
risk to an acceptable level.
Research and describe the security technologies and security design that
can be used to mitigate each of the identified information security risks.
Submit your assignment.
.....................................................................................................................
.........................................
CMGT 582 Week 5 Discussion Information Security
Risks
18. For more course tutorials visit
www.tutorialrank.com
Respond to the following in a minimum of 175 words:
Discuss the steps that an organization takes in order to manage
information security risks and build a risk matrix. What is involved in
each step of this process? Use a specific organization in your response.
.....................................................................................................................
.........................................
CMGT 582 Week 6 Discussion Security Life Cycle Steps
For more course tutorials visit
www.tutorialrank.com
Respond to the following in a minimum of 175 words:
Discuss the differences between the systems development life cycle
(SDLC) and the security life cycle. Include in your discussion, both
management and non-management IT security positions that perform
security life cycle steps and briefly describe their role.
19. .............................................................................................
.................................................................
CMGT 582 Week 6 Signature Assignment Security Audit
For more course tutorials visit
www.tutorialrank.com
You are part of a team selected by the Chief Information Officer (CIO)
to perform a security audit for one of the companies explored in this
course. Vampire Legends (Week 1)
Cruisin’ Fusion (Weeks 2- 3)
Devil’s Canyon (Weeks 4 – 5)
Create a 10- to 12-slide presentation (not including the title and
reference slides) that shows the results of your security audit based on
the following audit process:
Potential Risk to be Reviewed:Describe the risk.
Example: Viruses and malware can negatively impact the
confidentiality, integrity, and availability of organizational data.
20. Regulation and Compliance Issues:Analyze how regulations and
compliance issues could impact the organization.
Provide a detailed analysis of regulations and compliance issues, beyond
the simple explanation in score point two.
Regulation and Compliance Resources and Tools: Analyze what
resources and/or tools are available to address regulations and
compliance issues.
Describe the control objective and the specific controls you will evaluate
to determine potential risk is mitigated. Please note that typically, there
will be more than one control that should be reviewed for a potential
risk.
Example: Determine whether anti-virus software is in use.
Example: Determine whether virus signatures are periodically updated.
Example: Determine whether periodic virus scans are performed.
Provide a detailed analysis of the resources and/or tools available,
beyond the simple explanation in score point two.
IT Security – Processes and Methods: Differentiate between the various
processes and methods involved in management of IT security
resources.
Review the various options available to address those processes and
methods previously explained, and which ones might be feasible.
IT Security – Measures: Analyze the various security measures that
could be taken within the organization.
Demonstrate a detailed understanding of what the alternatives are to
approach security, how much security is needed, different methods to
employ, etc.
21. Describe the criteria/measures that you will use to evaluate the adequacy
of each area/review step that you review (i.e., what criteria will you use
to perform your evaluation/how will you determine that the risk has been
mitigated to an acceptable level).
Example: 100% of servers and PCs have virus software installed.
Example: 100% of the virus software installed is set to automatically
update, including virus signatures.
Example: 100% of the virus software installed is set to automatically
perform a scan at least weekly.
Include a 1/2- to 1-page executive summary to support your
presentation. Include appropriate references.
Submit your assignment.