SlideShare a Scribd company logo
CMGT 582 Assignment Audit of the HR
Department
For more classes visit
www.snaptutorial.com
You are part of a team has been selected by the Chief Information
Officer (CIO) to perform an audit of the HR Department.
Create a 10- to 12-slide presentation (not including the title and
reference slides) that examines the specific audit steps that should be
performed to evaluate the following areas:
· Handling of ethical issues, including security-related
legal/regulatory compliance (non-privacy related), intellectual
property and licensing
· Compliance with privacy related laws and regulations
· Adequacy of security policies and security awareness training
· Identification of security related risks/threats
Include a minimum of two audit steps for each of the areas listed
above. The audit steps should follow the following format:
· Area: From the list above
· Example: Security related risks/threats
· Potential Risk to be Reviewed: Describe the risk
· Example: Viruses and malware can negatively impact the
confidentiality, integrity, and availability of organizational data
· Evaluation of Tools and Methods: Describe the control
objective and the specific controls you will evaluate to determine
potential risk is mitigated. Please note that typically, there will be
more than one control that should be reviewed for a potential risk.
· Example: Determine whether anti-virus software is in use
· Example: Determine whether virus signatures are periodically
updated
· Example: Determine whether periodic virus scans are
performed
· Criteria/Measures to be Used: Describe the criteria/measures
that you will use to evaluate the adequacy of each area/review step
that you review (i.e., what criteria will you use to perform your
evaluation/how will you determine that the risk has been mitigated to
an acceptable level).
· Example: 100% of servers and PCs have virus software
installed
· Example: 100% of the virus software installed is set to
automatically update, including virus signatures.
· Example: 100% of the virus software installed is set to
automatically perform a scan at least weekly
Your grade on the assignment will be based on how well you address:
· The identification of potential ethical, legal/regulatory, privacy,
and security related issues (20%)
· The evaluation of the tools and methods used to mitigate any
ethical, legal/regulatory, and privacy related issues identified, as well
as the tools and methods used to perform the review steps (20%)
· The evaluation of the tools and methods used to mitigate any
security-related issues identified, as well as the tools and methods
used to perform the review steps (25%)
· Criteria/measures that you will use to evaluate the adequacy of
each area/review step that you review (i.e., how will you determine
that the risk has been mitigated to an acceptable level) (20%)
· Quality of written communication
· Use of APA format/style
Include a 1/2- to 1-page executive summary and support your
presentation with appropriate references.
***************************************************************************
CMGT 582 Week 1 Individual Assignment
Getting Involved
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the SkillSoft®
videos, completing the SkillSoft® course, independent student
reading, and research.
Watch the "Fostering Collective Responsibility for IT Risk" video.
Watch the "Balancing Security with User Convenience" video.
Complete "Introduction to Information Security Governance" topic of
the Skillsoft® course "CISM 2012: Information Security Governance
(Part 1)."
Assignment: Situation: You have just joined an organization that
depends on the use of the web to perform most of its major tasks. You
have noticed that information security is mostly ignored by those
performing the work tasks and it is not a priority with management or
executive leadership.
Write a 1- to 2-page memo to the Chief Executive Officer (CEO) that
is designed to increase the priority of information security. Include a
convincing argument of why the survival of the organization may
depend on information security. Include these topics:
Confidentiality, integrity, and availability
Authenticity
Accountability
Threats from malicious software
Security challenges of cloud computing
Cyberterrorism and information warfare
***************************************************************************
CMGT 582 Week 2 Individual Assignment
Security Within My Organization
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the SkillSoft®
videos, completing the SkillSoft® course, independent student
reading, and research.
Watch the "Technology and the Impact on Business and the
Environment" Skillsoft video.
Complete "Defining law and ethics" point of topic "The Relationship
Between Law and Ethics" of the Skillsoft® course "Business Law and
Ethics."
Complete "Recognize the Effect of Laws and Regulations on Audit
Planning," point of topic "Management of an IS Audit Function," of
the lesson "Information Systems and the IS Audit Function" of the
Skillsoft® course "CISA Domain: The Process of Auditing
Information Systems - Part 1."
Write a 3- to 4-page analysis of ethical considerations for maintaining
confidentiality and customer data.
Address the following issues in your analysis:
Define ethics.
Apply ethics to information systems.
Discuss the constituent parts IT/IS professional ethics.
Connect or relate the discussed constituent parts into an overall
structure that may relate to an IT/IS code of conduct or ethics.
Discuss the rules produced by the Ad Hoc Committee on Responsible
Computing.
Describe the privacy regulations or laws related to the identified
ethical issues
***************************************************************************
CMGT 582 Week 3 Assignment Privacy with
Ethics Considerations
For more classes visit
www.snaptutorial.com
Create a 10- to 12-slide presentation evaluating the three areas of
privacy issues specific to FERPA, HIPAA, and EEA. Develop
scenarios in all of the three areas that you feel are most important to
the recipients protected by these laws and the methodology used in
each.
Include how each of these laws affects the requirements of companies
or colleges and how each manages their security strategy to enforce
compliance.
Compare the effectiveness of each industry's efforts to ensure privacy
issues are addressed and protected.
Address and comment on the following issues in your analysis:
· Define privacy in the three areas
· Apply privacy and privacy protection to Information Systems
· Repercussions to the companies protected by the three laws
· Differences in the protection methodologies used by the 3
industries represented by these laws
· Differences in security strategies used by the three industries
· Describe how these three laws can change a company's security
policies and mitigation plans
· Explain why public corporations have the same privacy issues
(for intellectual property) as people do (for personal information)
· Conclude your assignment with ideas regarding how each law
can be improved
Include detailed speakers notes within your presentation.
***************************************************************************
CMGT 582 Week 3 Individual Assignment Risk
Assessment
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the SkillSoft®
videos, completing the SkillSoft® course, independent student
reading, and research.
Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next
Frontier of Competitive Advantage" Skillsoft® video.
Complete the "Intrusion Prevention Technologies" topic of the lesson
"Understanding IPS Fundamentals" in the Skillsoft® course "Cisco
IINS 2.0: Implementing IPS."
Complete slides 1 to 3 of the "Risk Response Strategies" topic of the
Skillsoft® lesson "Plan Risk Responses" of the course "Risk response
and Control (PMBOK® Guide Fifth Edition)."
Prepare a 3- to 5-page risk assessment of your organization or an
organization with which you are familiar.
Include how the formula for risk can be applied to the organization.
Describe how risk assessment is related to security controls or
safeguards.
Include the following in your assessment that is part of Figure 14.3,
Risk Assessment Methodology, of the Stallings and Brown
textbookComputer Security (p. 478):
System characterization
Threat identification
Vulnerability identification
Control analysis
Likelihood determination
Impact analysis
Risk determination
***************************************************************************
CMGT 582 Week 4 Individual Assignment
Technologies and Methodologies Evaluation
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the SkillSoft®
videos, completing the SkillSoft® course, independent student
reading, and research.
Watch the "Creating an Actionable Risk Management Strategy"
SkillSoft® video.
Complete the "Network Security Appliances and Methods" topic of
the Skillsoft® course "CompTIA Network+ 2012: Network Security
Part 3."
Complete the "Firewalls, IDS and Network Security Solutions" topic
of the Skillsoft®course "CompTIA Network+ 2012: Network
Security Part 3."
Consider information management risks to include cybercrime and
cyber-related crimes.
Write a 3- to 5-page evaluation of security technologies and
methodologies used to mitigate information management risks. An
evaluation is generally based on specific criteria and standards.
Include at least the following:
Firewalls
Intrusion prevention systems
Intrusion detection systems
Access control
Cryptographic tools and processes
***************************************************************************
CMGT 582 Week 5 Assignment Mitigating
Information Management Risk
For more classes visit
www.snaptutorial.com
Consider information security risks, including:
Cybercrime and cyber-related crimes
Social engineering
Mobile computing
BYOD (Bring your own device).
Write a 3 full page evaluation (not including the title and reference
pages) of security technologies and methodologies that can be used to
mitigate each of the above information security risks. Support your
paper with appropriate references and follow APA format.
Include the following for each type of risk:
Description of the risk
Security technologies and methodologies that can be used to mitigate
them
Rationale describing how the risks are mitigated to an acceptable
level
Include a Turnitin report.
Submit your assignment and Turnitin report using the Assignment
Files tab.
***************************************************************************
CMGT 582 Week 5 Individual Assignment
Policy Implementation Presentation
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the completing
the SkillSoft®course, independent student reading, and research.
Complete the "Security Policy Documents and Life Cycle" topic of
the Skillsoft® course "SSCP Domain: Security Operations and
Administration Part 1."
Complete the "Risk Management and Regulatory Compliance" topic
of the "Security Policies and Life-Cycle Approach" lesson of the
Skillsoft® course "Cisco IINS 2.0: Security and Strategies."
Consider security planning policies, procedures, and models to
include multilevel and cryptographic processes.
Prepare 10-12 Slides Presentation
Include the following:
Description of security planning policies
Description of how human resources security is included in security
planning
Description of how cryptographic tools may be included in security
planning
Application of security planning policies to manage security
Evaluation of how specific policies are used to implement security
plans
***************************************************************************
CMGT 582 Week 5 Individual Assignment
Policy Implementation
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the completing
the SkillSoft®course, independent student reading, and research.
Complete the "Security Policy Documents and Life Cycle" topic of
the Skillsoft® course "SSCP Domain: Security Operations and
Administration Part 1."
Complete the "Risk Management and Regulatory Compliance" topic
of the "Security Policies and Life-Cycle Approach" lesson of the
Skillsoft® course "Cisco IINS 2.0: Security and Strategies."
Consider security planning policies, procedures, and models to
include multilevel and cryptographic processes.
Write 3-5 Page Paper
Include the following:
Description of security planning policies
Description of how human resources security is included in security
planning
Description of how cryptographic tools may be included in security
planning
Application of security planning policies to manage security
Evaluation of how specific policies are used to implement security
plans
***************************************************************************
CMGT 582 Week 6 Individual Assignment
Systems Development Life Cycle (SDLC)
For more classes visit
www.snaptutorial.com
Assignment Preparation: Activities include watching the completing
the SkillSoft®course, independent student reading, and research.
Complete the "Information Risk Management Overview" topic of the
"Information Risk Management Program" lesson of the Skillsoft®
course "CISM 2012: Information Risk Management and Compliance
(Part 1)."
Completethe "Auditing and Testing IS Security" topic of the
"Auditing Internal and External Security" lesson of the Skillsoft®
course "CISA Domain: Protection of Information Assets - Part 2."
Consider the systems development life cycle (SDLC), security
systems life cycle, and information systems security certification and
accreditation.
Write a 3- to 5-page evaluation of the use of the security life cycle.
Include the following:
All six phases
Review of steps unique to the security life cycle, not in common with
SDLC
Applicable criteria and standards, such as certification and
accreditation, used in your evaluation
***************************************************************************

More Related Content

What's hot

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
Enterprise Security Risk Management
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
Dhani Ahmad
 
CMGT 230 EXceptional Education/snaptutorial.COM
CMGT 230 EXceptional Education/snaptutorial.COM CMGT 230 EXceptional Education/snaptutorial.COM
CMGT 230 EXceptional Education/snaptutorial.COM
McdonaldRyan7
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Precisely
 
AJS 572 Effective Communication - tutorialrank.com
AJS 572  Effective Communication - tutorialrank.comAJS 572  Effective Communication - tutorialrank.com
AJS 572 Effective Communication - tutorialrank.com
Bartholomew6
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
Divya Tiwari
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
donaldzs56
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
robertleses9
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
G3 intelligence Ltd
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
jhonklinz11
 
Administering security
Administering securityAdministering security
Administering security
G Prachi
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
Divya Tiwari
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
robertlesew96
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
CompTIA
 

What's hot (19)

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
CMGT 230 EXceptional Education/snaptutorial.COM
CMGT 230 EXceptional Education/snaptutorial.COM CMGT 230 EXceptional Education/snaptutorial.COM
CMGT 230 EXceptional Education/snaptutorial.COM
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
AJS 572 Effective Communication - tutorialrank.com
AJS 572  Effective Communication - tutorialrank.comAJS 572  Effective Communication - tutorialrank.com
AJS 572 Effective Communication - tutorialrank.com
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Administering security
Administering securityAdministering security
Administering security
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
 

Similar to Cmgt 582 Education Specialist -snaptutorial.com

CMGT 582 Entire Course NEW
CMGT 582 Entire Course NEWCMGT 582 Entire Course NEW
CMGT 582 Entire Course NEW
shyamuopuop
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
GOODCourseHelp
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
Robinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
GeorgeDixon99
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
aryan532920
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 
CIS 558 Effective Communication - tutorialrank.com
CIS 558  Effective Communication - tutorialrank.comCIS 558  Effective Communication - tutorialrank.com
CIS 558 Effective Communication - tutorialrank.com
Bartholomew22
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
ronak56
 
Cmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comCmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.com
Stephenson032
 
Cmgt 582 Success Begins / snaptutorial.com
Cmgt 582  Success Begins / snaptutorial.comCmgt 582  Success Begins / snaptutorial.com
Cmgt 582 Success Begins / snaptutorial.com
WilliamsTaylorza47
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
McdonaldRyan39
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
shyamuop
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
shyamuopuop
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
Robinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
sholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
Stephenson06
 
CMGT 430 Education Organization / snaptutorial.com
CMGT 430 Education Organization / snaptutorial.comCMGT 430 Education Organization / snaptutorial.com
CMGT 430 Education Organization / snaptutorial.com
McdonaldRyan41
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
shyamuop
 

Similar to Cmgt 582 Education Specialist -snaptutorial.com (20)

CMGT 582 Entire Course NEW
CMGT 582 Entire Course NEWCMGT 582 Entire Course NEW
CMGT 582 Entire Course NEW
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 558 Effective Communication - tutorialrank.com
CIS 558  Effective Communication - tutorialrank.comCIS 558  Effective Communication - tutorialrank.com
CIS 558 Effective Communication - tutorialrank.com
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 
Cmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comCmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.com
 
Cmgt 582 Success Begins / snaptutorial.com
Cmgt 582  Success Begins / snaptutorial.comCmgt 582  Success Begins / snaptutorial.com
Cmgt 582 Success Begins / snaptutorial.com
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
CMGT 430 Education Organization / snaptutorial.com
CMGT 430 Education Organization / snaptutorial.comCMGT 430 Education Organization / snaptutorial.com
CMGT 430 Education Organization / snaptutorial.com
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 

Recently uploaded

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Cmgt 582 Education Specialist -snaptutorial.com

  • 1. CMGT 582 Assignment Audit of the HR Department For more classes visit www.snaptutorial.com You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas: · Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing · Compliance with privacy related laws and regulations · Adequacy of security policies and security awareness training · Identification of security related risks/threats Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format: · Area: From the list above · Example: Security related risks/threats · Potential Risk to be Reviewed: Describe the risk
  • 2. · Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data · Evaluation of Tools and Methods: Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. · Example: Determine whether anti-virus software is in use · Example: Determine whether virus signatures are periodically updated · Example: Determine whether periodic virus scans are performed · Criteria/Measures to be Used: Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). · Example: 100% of servers and PCs have virus software installed · Example: 100% of the virus software installed is set to automatically update, including virus signatures. · Example: 100% of the virus software installed is set to automatically perform a scan at least weekly Your grade on the assignment will be based on how well you address: · The identification of potential ethical, legal/regulatory, privacy, and security related issues (20%)
  • 3. · The evaluation of the tools and methods used to mitigate any ethical, legal/regulatory, and privacy related issues identified, as well as the tools and methods used to perform the review steps (20%) · The evaluation of the tools and methods used to mitigate any security-related issues identified, as well as the tools and methods used to perform the review steps (25%) · Criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., how will you determine that the risk has been mitigated to an acceptable level) (20%) · Quality of written communication · Use of APA format/style Include a 1/2- to 1-page executive summary and support your presentation with appropriate references. *************************************************************************** CMGT 582 Week 1 Individual Assignment Getting Involved For more classes visit www.snaptutorial.com
  • 4. Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Fostering Collective Responsibility for IT Risk" video. Watch the "Balancing Security with User Convenience" video. Complete "Introduction to Information Security Governance" topic of the Skillsoft® course "CISM 2012: Information Security Governance (Part 1)." Assignment: Situation: You have just joined an organization that depends on the use of the web to perform most of its major tasks. You have noticed that information security is mostly ignored by those performing the work tasks and it is not a priority with management or executive leadership. Write a 1- to 2-page memo to the Chief Executive Officer (CEO) that is designed to increase the priority of information security. Include a convincing argument of why the survival of the organization may depend on information security. Include these topics: Confidentiality, integrity, and availability Authenticity Accountability Threats from malicious software Security challenges of cloud computing Cyberterrorism and information warfare ***************************************************************************
  • 5. CMGT 582 Week 2 Individual Assignment Security Within My Organization For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Technology and the Impact on Business and the Environment" Skillsoft video. Complete "Defining law and ethics" point of topic "The Relationship Between Law and Ethics" of the Skillsoft® course "Business Law and Ethics." Complete "Recognize the Effect of Laws and Regulations on Audit Planning," point of topic "Management of an IS Audit Function," of the lesson "Information Systems and the IS Audit Function" of the Skillsoft® course "CISA Domain: The Process of Auditing Information Systems - Part 1." Write a 3- to 4-page analysis of ethical considerations for maintaining confidentiality and customer data. Address the following issues in your analysis: Define ethics.
  • 6. Apply ethics to information systems. Discuss the constituent parts IT/IS professional ethics. Connect or relate the discussed constituent parts into an overall structure that may relate to an IT/IS code of conduct or ethics. Discuss the rules produced by the Ad Hoc Committee on Responsible Computing. Describe the privacy regulations or laws related to the identified ethical issues *************************************************************************** CMGT 582 Week 3 Assignment Privacy with Ethics Considerations For more classes visit www.snaptutorial.com Create a 10- to 12-slide presentation evaluating the three areas of privacy issues specific to FERPA, HIPAA, and EEA. Develop scenarios in all of the three areas that you feel are most important to the recipients protected by these laws and the methodology used in each.
  • 7. Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance. Compare the effectiveness of each industry's efforts to ensure privacy issues are addressed and protected. Address and comment on the following issues in your analysis: · Define privacy in the three areas · Apply privacy and privacy protection to Information Systems · Repercussions to the companies protected by the three laws · Differences in the protection methodologies used by the 3 industries represented by these laws · Differences in security strategies used by the three industries · Describe how these three laws can change a company's security policies and mitigation plans · Explain why public corporations have the same privacy issues (for intellectual property) as people do (for personal information) · Conclude your assignment with ideas regarding how each law can be improved Include detailed speakers notes within your presentation. *************************************************************************** CMGT 582 Week 3 Individual Assignment Risk Assessment
  • 8. For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video. Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS Fundamentals" in the Skillsoft® course "Cisco IINS 2.0: Implementing IPS." Complete slides 1 to 3 of the "Risk Response Strategies" topic of the Skillsoft® lesson "Plan Risk Responses" of the course "Risk response and Control (PMBOK® Guide Fifth Edition)." Prepare a 3- to 5-page risk assessment of your organization or an organization with which you are familiar. Include how the formula for risk can be applied to the organization. Describe how risk assessment is related to security controls or safeguards. Include the following in your assessment that is part of Figure 14.3, Risk Assessment Methodology, of the Stallings and Brown textbookComputer Security (p. 478): System characterization Threat identification
  • 9. Vulnerability identification Control analysis Likelihood determination Impact analysis Risk determination *************************************************************************** CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video. Complete the "Network Security Appliances and Methods" topic of the Skillsoft® course "CompTIA Network+ 2012: Network Security Part 3."
  • 10. Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoft®course "CompTIA Network+ 2012: Network Security Part 3." Consider information management risks to include cybercrime and cyber-related crimes. Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards. Include at least the following: Firewalls Intrusion prevention systems Intrusion detection systems Access control Cryptographic tools and processes *************************************************************************** CMGT 582 Week 5 Assignment Mitigating Information Management Risk For more classes visit www.snaptutorial.com
  • 11. Consider information security risks, including: Cybercrime and cyber-related crimes Social engineering Mobile computing BYOD (Bring your own device). Write a 3 full page evaluation (not including the title and reference pages) of security technologies and methodologies that can be used to mitigate each of the above information security risks. Support your paper with appropriate references and follow APA format. Include the following for each type of risk: Description of the risk Security technologies and methodologies that can be used to mitigate them Rationale describing how the risks are mitigated to an acceptable level Include a Turnitin report. Submit your assignment and Turnitin report using the Assignment Files tab. ***************************************************************************
  • 12. CMGT 582 Week 5 Individual Assignment Policy Implementation Presentation For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1." Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies." Consider security planning policies, procedures, and models to include multilevel and cryptographic processes. Prepare 10-12 Slides Presentation Include the following: Description of security planning policies
  • 13. Description of how human resources security is included in security planning Description of how cryptographic tools may be included in security planning Application of security planning policies to manage security Evaluation of how specific policies are used to implement security plans *************************************************************************** CMGT 582 Week 5 Individual Assignment Policy Implementation For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."
  • 14. Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies." Consider security planning policies, procedures, and models to include multilevel and cryptographic processes. Write 3-5 Page Paper Include the following: Description of security planning policies Description of how human resources security is included in security planning Description of how cryptographic tools may be included in security planning Application of security planning policies to manage security Evaluation of how specific policies are used to implement security plans *************************************************************************** CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC)
  • 15. For more classes visit www.snaptutorial.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)." Completethe "Auditing and Testing IS Security" topic of the "Auditing Internal and External Security" lesson of the Skillsoft® course "CISA Domain: Protection of Information Assets - Part 2." Consider the systems development life cycle (SDLC), security systems life cycle, and information systems security certification and accreditation. Write a 3- to 5-page evaluation of the use of the security life cycle. Include the following: All six phases Review of steps unique to the security life cycle, not in common with SDLC Applicable criteria and standards, such as certification and accreditation, used in your evaluation