The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connected to the office.     

 
CMGT400 WEEK 1 RISKY SITUATIONS TABLE
CMGT/400 WEEK 1 DQ1 TUTORIAL
CMGT400 WEEK 1 Introduction to Security and Risk Management

Summary Word Count: 715 words! 

Create a 1-page Microsoft Word Summary Guide on this presentation.
Include the following:
• Goals and objectives of the presentation in summary form
• Adequate references to support your findings, information, and opinions
• A minimum of two outside academic references are required
• APA Formatting
Note: This presentation will be combined with future presentations to become the chapters of a visual developed in Week Five. This will be presented to the company's executive members at the company's national convention in a few weeks.
Click the Assignment Files tab to submit both parts of the assignment.



Supporting Activity: Information Assets

Word Count: 1,196 words! Organizations have assets typically listed in three groups: Tangible, Intangible, and Intellectual Property. Discuss how you would classify information as an asset. Provide three examples to support your thoughts.



Supporting Activity: CIA Triad

Word Count: 700 words!

Confidentiality, Integrity, and Availability are popularly known as the CIA Triad, often used to guide information security policy development. Explain how lack of security can cause availability to be impacted and why availability is important to an organization.
cmgt/400 Introduction to Security and Risk Management

Use this week's reading assignments and conduct valid and necessary research to complete this assignment.
You have been asked by the CIO to create a Microsoft PowerPoint training presentation along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.


Create a 2-slide Microsoft PowerPoint training presentation which
describes each goal, its definition, values, and importance to your
company. Include the following:
• Adequate references to support your findings, information, and opinions
• A minimum of two outside academic references are required
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting

CMGT/400 WEEK 1

 

Everything Listed for Week 1 is included in purchase - Individual AND Team Assignments!

 

Introduction to Security and Risk Management

Use this week's reading assignments and conduct valid and necessary research to complete this assignment.
You have been asked by the CIO to create a Microsoft PowerPoint training presentation along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.

Create a 2-slide Microsoft PowerPoint training presentation which
describes each goal, its definition, values, and importance to your
company. Include the following:
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting

PowerPoint presentation preview below. 

Includes FULL Speaker Notes!!

 

 

Introduction to Security and Risk Management

Summary Word Count: 715 words!

Create a 1-page Microsoft Word Summary Guide on this presentation.
Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Note: This presentation will be combined with future presentations to become the chapters of a visual developed in Week Five. This will be presented to the company's executive members at the company's national convention in a few weeks.
Click the Assignment Files tab to submit both parts of the assignment.

 

Supporting Activity: Information Assets

Word Count: 1,196 words!

Organizations have assets typically listed in three groups: Tangible, Intangible, and Intellectual Property.  Discuss how you would classify information as an asset. Provide three examples to support your thoughts.

 

Supporting Activity: CIA Triad

Word Count: 700 words!

Confidentiality, Integrity, and Availability are popularly known as the CIA Triad, often used to guide information security policy development. Explain how lack of security can cause availability to be impacted and why availability is important to an organization.

 

Supporting Activity: Examples of Information Protection

Word Count: 1,201 words!

How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.

 

 

CMGT400 WEEK 2 Organization risks and threats
CMGT/400 WEEK 2 Common Information Security Threats
CMGT/400 WEEK 2 Social Network, cmgt400 Regulatory Standards

CMGT/400 Week 2

Everything Listed for Week 2 is included in purchase - Individual AND Team Assignments!

 

Learning Team: Organization Risks and Threats

Create a 5-slide Microsoft PowerPoint presentation communicating the different risks the organization must consider. These risks may include regulatory, criminal, and others your team considers noteworthy. You may use examples from current newsworthy cases of IT security failures. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting

*Bonus Video inside of PowerPoint - Copy of Video included in folder*
Click the Assignment Files tab to submit your assignment.

 

Individual: Common Information Security Threats involving Ethical and Legal Concerns

Use reading assignments and conduct valid and necessary research to complete this assignment.
Social networking is one of the largest and most frequent IT Security risks at your company. The CIO wants a Microsoft PowerPoint Awareness presentation with an Information Guide handout for the of Senior IT employees. This presentation will be shown at all company locations.
Create a 6-slide Microsoft PowerPoint presentation on Awareness. Include the following:
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting

 

Create a 1-page Microsoft Word Information Guide on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

 

Supporting Activity: Social Network

Word Count: 434 words!

Discuss why an organization should worry about Social Networking. How can Social Networking have a positive or negative impact on the organization?

 

Supporting Activity: Regulatory Standards

Word Count: 238 words!

Discuss regulatory standards such as those applicable to health care organizations. Why do you think they are needed? Who do they protect?

 

Supporting Activity: Risks and Access Controls

Word Count: 797 words!

For each item, describe the risk in your own terms and how the controls address that risk. Also, discuss how applicable the same risks and controls are to other organizations.

• Information Integrity

• Authentication Risks

• Access Control

• External network access control

• Database, File and Directory Permissions

• Message Filtering

 

Supporting Activity: Corporate Laptop Protection

Word Count: 751 words!

How can a company protect data on corporate laptops? Why do more organizations choose not to protect such data? Do you expect this to become a legal requirement in the future? Explain why you think so.

 

Supporting Activity: Effective Ways to Save Money

Word Count: 751 words!

Based on the readings and your personal experience, what are effective, information security related ways for an organization to save money?

 

 

CMGT400 WEEK 3 TUTORIAL SECURITY AND PROTECTING INFORMATION
CMGT400 WEEK 3 DQ1 TUTORIAL
CMGT/400 WEEK 3 CMGT/400 Week 3

Learning Team: 

Review of IT Systems Development Practices

Create a 5-slide Microsoft PowerPoint presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used. Include the following:
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting
Click the Assignment Files tab to submit your assignment.

CMGT/400 Week 3

 

Everything Listed for Week 3 is included in purchase - Individual AND Team Assignments!

 

Learning Team:

Review of IT Systems Development Practices

Create a 5-slide Microsoft PowerPoint presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting

Click the Assignment Files tab to submit your assignment.

 

 

Individual: Securing and Protecting Information

Use reading assignments and conduct valid and necessary research to complete this assignment.
Your company is debating transferring all of their information to a Cloud storage provider. The CFO feels this move is a big cash savings plan, one that could save the company a lot of money. The CIO feels the risk is too high and wants you to develop an Awareness presentation and Information Guide handout to outline the Pros and Cons of this storage plan. You will present this presentation at an executive session next week.

 

Create a 2-slide Microsoft PowerPoint Awareness presentation. Include the following:
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting
Create a 1-page Microsoft Word Information Guide on this
presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

 

Supporting Activity: Data Recovery

Word Count: 282 words

Organizations can have data stolen (e.g., through hacking), but if that happens, the organization will typically retain the data on their system.
Discuss some steps to be taken which supports an organization that has lost data (e.g., the company data center burned down).

 

 

CMGT/400 WEEK 4 CMGT/400 Week 4 

Learning Team: Create Secure Environment
Create a 5-slide Microsoft PowerPoint presentation communicating how the company can manage the integration of security practices, and tools, with human behavior. Include the following:
• How to make security important to everyone
• The best methods to communicate information on security related issues
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting
Click the Assignment Files tab to submit your assignment.
CMGT400 WEEK4 Individual: The Role of Information Security Policy
Use reading assignments and conduct valid and necessary research to complete this assignment.
This week, the CIO has asked you to conduct a Supervisor Awareness seminar at your company. The CIO believes employee awareness is essential to IT Security and could easily reduce security breaches, risks, and threats, by half. Additionally, the CIO believes you can persuade the Supervisors that our employees are key to reducing how IT Security negatively affects the company.
Create a 5-slide Microsoft PowerPoint presentation. Include the following:
• Reasons why, how, and what employees need to do to positively reduce the 

causes of IT Security negative events
• Clearly defined and explained suggestions
• Adequate references to support your findings, information, and opinions
• A minimum of two outside academic references are required
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting
CMGT/400 WEEK4 Supporting Activity: Staff Awareness

Word Count: 835 words!

How can an organization make sure all its users know and follow its information security policy? What are the common hindrances? How can an organization overcome them? 



Supporting Activity: Encryption


Word Count: 835 words!

Encryption is a security process whose origin can be traced back to 1900 BC in Egypt. Research the advantages and disadvantages of encryption in user computing. Explain why encryption has not become a standard in user computing. What are some hurdles in successfully implementing encryption?

Supporting Activity: Technology Knowledge


Word Count: 835 words!

Many employees have personal computers in their home. Discuss if this has made those employees more aware of security risks and, as a result, enhanced organizational security or has it made these employees a larger security risk to the organization.
CMGT/400 Week 4

 

Everything Listed for Week 4 is included in purchase - Individual AND Team Assignments!

 

Learning Team: Create Secure Environment
Create a 5-slide Microsoft PowerPoint presentation communicating how the company can manage the integration of security practices, and tools, with human behavior. Include the following:

      • How to make security important to everyone
      • The best methods to communicate information on security related issues
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting
Click the Assignment Files tab to submit your assignment.

 

Individual: The Role of Information Security Policy
Use reading assignments and conduct valid and necessary research to complete this assignment.
This week, the CIO has asked you to conduct a Supervisor Awareness seminar at your company. The CIO believes employee awareness is essential to IT Security and could easily reduce security breaches, risks, and threats, by half. Additionally, the CIO believes you can persuade the Supervisors that our employees are key to reducing how IT Security negatively affects the company.
Create a 5-slide Microsoft PowerPoint presentation. Include the following:


      • Reasons why, how, and what employees need to do to positively reduce the

          causes of IT Security negative events
      • Clearly defined and explained suggestions
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.


Supporting Activity: Staff Awareness

How can an organization make sure all its users know and follow its information security policy? What are the common hindrances? How can an organization overcome them?

 

Supporting Activity: Effective Controls of Health Care Information

What are three controls that would be effective in protecting health care information? For each item, describe the risk in your own terms and how the controls address that risk. Also, discuss how applicable the same risks and controls are to other organizations.

Supporting Activity: Corporate Laptop Policy

How can a company protect data on corporate laptops? Why do more organizations choose not to protect such data? Do you expect this to become a legal requirement in the future? Explain why you think so.

 

 

           CMGT/400 WEEK 5 CMGT/400 Week 5



Learning Team: 

Educate the Board of Directors on IT Security Issues and Costs

Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation. This presentation needs to persuade the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices. Include the following:
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting
Click the Assignment Files tab to submit your assignment.

CMGT410 WEEK 5 The Global Security Policy CMGT/400 WEEK 5 CMGT/400 Week 5



Learning Team: 

Educate the Board of Directors on IT Security Issues and Costs

Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation. This presentation needs to persuade the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices. Include the following:
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting
Click the Assignment Files tab to submit your assignment.

             CMGT/400 Week 5 Brand NEW Supporting Activity: Internal Auditor

Word Count: 321 words!
What are two of the best practices for developing secure software and systems? Why would each practice be suitable for an organization to implement to strengthen its information security posture? Describe the benefits of each.

Supporting Activity: Professional Education

Word Count: 401 words!
A prospective employer recruiting for a security role may get applications from people with a wide variety of backgrounds in terms of experience and education.
Discuss how you would weigh the value of a four year degree, industry certifications, and vendor specific certifications.

Everything Listed for Week 5 is included in purchase - Individual AND Team Assignments!

 

Learning Team:

Educate the Board of Directors on IT Security Issues and Costs

Includes TWO FULL PowerPoint Presentations with FULL Speaker Notes = A+ Work!

Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation. This presentation needs to persuade the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting


Click the Assignment Files tab to submit your assignment.

 

--------------------------------------------------------------------------------------------------------------------------

Individual: The Global Security Policy

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.


Create a 10-slide Microsoft PowerPoint presentation. Include the following:
      • All of the following topics (you may change the order of the topics):
      • Information is a valuable asset to a company
      • Risk Management is necessary to reduce losses
      • Identifying vulnerabilities is a valuable first step
      • What is an organization security policy?
      • Who are regulatory organizations?
      • List at least 3
      • Social networking
      • Three potential risks
      • Three potential threats
      • Is the SDLC involved with reducing threats? How?
      • Why is the Cloud so feared?
      • Is hacking an ethical issue?
      • Four methods for securing information assets
      • Key elements if an IT Security Policy
      • How does encryption work? Why is it considered a premier tool in IT Security?
      • Five different jobs that deals with IT Security
      • Three certifications that are very good to have
      • Auditing is a tool in preventing risks
      • Define information assurance and security
      • Employee awareness is necessary for success. Why?
      • Describe and explain the key elements of recovering from lost assets
      • What are Internet connected systems? Describe five examples
      • Two jobs in IT Security that will grow quickly this year
      • Do not use research quotes or acronyms. You must use your own words.
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting as needed
Create a 1-page Microsoft Word Executive Summary on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

----------------------------------------------------------------------------------------------------------------------------------------

 

CMGT/400 Week 5 Cyber Security Awareness Presentation

Your Company will hold a national convention of all of the Executive Staff Members from all 15 locations of the company in the United States next week. The CIO has selected "Cyber Security Awareness" as the topic and has chosen you to write and deliver the presentation at one of the Executive Round Table Meetings at the convention.

The CIO has stressed to use creativity to make the presentation as interesting as possible. This can be done with the use of graphics, appropriate animation, and/or charts. The presentation should be 15 to 20 slides with detailed speaker notes or transcription of narration.

The CIO is insisting the presentation touch on a list of topics that must be included in the presentation. No research quotes are allowed and it must be in your own words with no acronyms.

The staff members would also like to receive a one-page "take-away document" summarizing the presentation.

Include the following in your presentation and take-away document:

  • Determination of what needs protecting
  • Type of network protection
  • What is a Governess? (Importance, designing, control, structures, developing the   process, planning)
  • Security and Return on Investment (ROI)
  • Control Objectives/Business Goals
  • Observation + Quantitative Strategies = Making Informed Decisions
  • Why is Alignment and Control important?
  • Why does strategic management have to be approached from top-to-bottom?
  • Human Factor in Security/Role of the workforce
  • Training, Awareness, and Motivation
  • What is Motivation? Why is it so important for an IT Security Program?
  • Knowledgeable Workforce (Awareness of Cyber Security Issues)
  • Training is a constant evolution
  • Situation specific skills are good, but what is better?
  • Capability Maturity Process (Recognition, Informal Practice, Security Management,  Deliberate Control)
  • Ensuring continuous effectiveness and review of the training and awareness programs
  • Disaster Recovery and Business Continuity
  • Third-Party Vendors, pros and cons
  • Backups (full, copy, incremental, and differential)
  • Redundancy methods and cost considerations

Note:  The above topics can be arranged in any order you would like, but make sure all are included.

Submit the presentation and one-page take-away to the Assignment Files tab.