CMGT/400 Intro to Information Assurance & Security

You have been asked by the CIO to create a Microsoft PowerPoint training presentation covering an introduction to Risk Management and why Risk Management is necessary to reduce losses along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.      CMGT/400 ENTIRE CLASS

Or You May Purchase Tutorials by the Week below.
CMGT/400 WEEK 1 Introduction to Security and Risk Management
CMGT/400 WEEK 1 Introduction to Security and Risk Management
CMGT/400 ENTIRE CLASS
CMGT/400 ENTIRE CLASS

CMGT/400 WEEK 1

 

Everything Listed for Week 1 is included in Tutorial purchase!

 

Individual: Introduction to Security and Risk Management

Includes Option #1 Presentation with Speaker Notes and Summary Guide

Includes Option #2 Presentation with Speaker Notes and Summary Guide

Includes Option #3 Presentation with Speaker Notes and Summary Guide

Use this week's reading assignments and conduct valid and necessary research to complete this assignment.
You have been asked by the CIO to create a Microsoft PowerPoint training presentation covering an introduction to Risk Management and why Risk Management is necessary to reduce losses along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.
Create a 2-slide Microsoft® PowerPoint® training presentation which describes each goal, its definition, values, and importance to your company. Include the following:

      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

          required.
      • APA Formatting

Create a 1-page Microsoft Word Summary Guide on this presentation.
Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Note: This presentation will be combined with future presentations to become the chapters of a visual developed in Week Five. This will be presented to the company's executive members at the company's national convention in a few weeks.
Click the Assignment Files tab to submit both parts of the assignment.

 

Supporting Activity: Information Assets

Word Count: 1,196 words!

Organizations have assets typically listed in three groups: Tangible, Intangible, and Intellectual Property.  Discuss how you would classify information as an asset. Provide three examples to support your thoughts.

 

Supporting Activity: CIA Triad

Word Count: 700 words!

Confidentiality, Integrity, and Availability are popularly known as the CIA Triad, often used to guide information security policy development. Explain how lack of security can cause availability to be impacted and why availability is important to an organization.

 

Supporting Activity: Examples of Information Protection

Word Count: 1,201 words!

How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.

 

 

CMGT400 WEEK 2 Organization risks and threats
CMGT/400 WEEK 2 Common Information Security Threats
CMGT/400 WEEK 2 Social Network, cmgt400 Regulatory Standards

CMGT/400 Week 2

Everything Listed for Week 2 is included in Tutorial purchase!

 

Learning Team: Organization Risks and Threats

Includes Option #1 Presentation with Speaker Notes

Includes Option #2 Presentation with Speaker Notes

Includes Option #3 Presentation with Speaker Notes

Create a 5-slide Microsoft PowerPoint presentation communicating the different risks the organization must consider. These risks may include regulatory, criminal, and others your team considers noteworthy. You may use examples from current newsworthy cases of IT security failures. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

          required.
      • APA Formatting

Click the Assignment Files tab to submit your assignment.

 

Individual:Common Information Security Threats involving Ethical and Legal Concerns

Includes Option #1 Presentation with Speaker Notes and Information Guide

Includes Option #2 Presentation with Speaker Notes and Informatino Guide

Includes Option #3 Presentation with Speaker Notes

Includes Option #4 Presentation with Speaker Notes

Use reading assignments and conduct valid and necessary research to complete this assignment.
Social networking is one of the largest and most frequent IT Security risks at your company. The CIO wants a Microsoft PowerPoint Awareness presentation with an Information Guide handout for the Senior IT employees. This presentation will be shown at all company locations.
Create a 6-slide Microsoft PowerPoint presentation on Awareness. Include the following:
      • Refer to the topics as listed in the linked Week Five Individual assignment and use

          which topics are appropriate for this assignment

      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

         required.
      • APA Formatting

Create a 1-page Microsoft Word Information Guide on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

Supporting Activity: Audit Tool
SSAE 16 is a popular tool for reporting on operational processes.
Discuss SSAE 16 and any industry current information on this tool. Explain how it might be used by an organization, either internally or externally.

 

Supporting Activity: Regulatory Standards
Discuss regulatory standards such as those applicable to health care organizations. Why do you think they are needed? Who do they protect?

 

Supporting Activity: Social Network

Word Count: 434 words!

Discuss why an organization should worry about Social Networking. How can Social Networking have a positive or negative impact on the organization?

 

Supporting Activity: Risks and Access Controls

Word Count: 797 words!

For each item, describe the risk in your own terms and how the controls address that risk. Also, discuss how applicable the same risks and controls are to other organizations.

• Information Integrity

• Authentication Risks

• Access Control

• External network access control

• Database, File and Directory Permissions

• Message Filtering

 

Supporting Activity: Corporate Laptop Protection

Word Count: 751 words!

How can a company protect data on corporate laptops? Why do more organizations choose not to protect such data? Do you expect this to become a legal requirement in the future? Explain why you think so.

 

Supporting Activity: Effective Ways to Save Money

Word Count: 751 words!

Based on the readings and your personal experience, what are effective, information security related ways for an organization to save money?

 

 

CMGT400 WEEK 3 Securing and Protecting Information
CMGT400 WEEK 3 Review of IT Systems Development Practices
CMGT/400 Week 3 Create a 5-slide Microsoft PowerPoint presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. This development function is critical,
CMGT/400 Week 3 Create a 5-slide Microsoft PowerPoint presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. This development function is critical,

CMGT/400 Week 3

 

Everything Listed for Week 1 is included in Tutorial purchase!

 

Learning Team: Review of IT Systems Development Practices

Includes Option #1 Presentation with Speaker Notes

Includes Option #2 Presentation with Speaker Notes

Create a 5-slide Microsoft PowerPoint presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting

Click the Assignment Files tab to submit your assignment.

 

 

Individual: Securing and Protecting Information

Includes Option #1 Presentation with Speaker Notes and Summary Guide

Includes Option #2 Presentation with Speaker Notes

Use reading assignments and conduct valid and necessary research to complete this assignment.
Your company is debating transferring all of their information to a Cloud storage provider. The CFO feels this move is a big cash savings plan, one that could save the company a lot of money. The CIO feels the risk is too high and wants you to develop an Awareness presentation and Information Guide handout to outline the Pros and Cons of this storage plan. You will present this presentation at an executive session next week.

Create a 2-slide Microsoft PowerPoint Awareness presentation. Include the following:

      • Refer to the topics as listed in the linked Week Five Individual assignment and use

          which topics are appropriate for this assignment

      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

         required.
      • APA Formatting
Create a 1-page Microsoft Word Information Guide on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

Supporting Activity: Data Recovery

Word Count: 282 words

Organizations can have data stolen (e.g., through hacking), but if that happens, the organization will typically retain the data on their system.
Discuss some steps to be taken which supports an organization that has lost data (e.g., the company data center burned down).

 

 

CMGT/400 WEEK 4 Create Secure Environment
CMGT400 WEEK4 The Role of the Information Security Policy
CMGT/400 WEEK 4 Create Secure Environment
CMGT400 WEEK4 The Role of the Information Security Policy
CMGT/400 Week 4

 

Everything Listed for Week 4 is included in purchase - Individual AND Team Assignments!

 

Learning Team: Create Secure Environment

Includes Option #1 Presentation with Speaker Notes

Includes Option #2 Presentation with Speaker Notes

Create a 5-slide Microsoft PowerPoint presentation communicating how the company can manage the integration of security practices, and tools, with human behavior. Include the following:

      • How to make security important to everyone
      • The best methods to communicate information on security related issues
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting
Click the Assignment Files tab to submit your assignment.

 

Individual: The Role of Information Security Policy

Includes Option #1 Presentation with Speaker Notes

Includes Option #2 Presentation with Speaker Notes

Use reading assignments and conduct valid and necessary research to complete this assignment.
This week, the CIO has asked you to conduct a Supervisor Awareness seminar at your company. The CIO believes employee awareness is essential to IT Security and could easily reduce security breaches, risks, and threats, by half. Additionally, the CIO believes you can persuade the Supervisors that our employees are key to reducing how IT Security negatively affects the company.
Create a 5-slide Microsoft PowerPoint presentation. Include the following:

      • Reasons why, how, and what employees need to do to positively reduce the

          causes of IT Security negative events
      • Clearly defined and explained suggestions

      • Refer to the topics as listed in the linked Week Five Individual assignment and use

          which topics are appropriate for this assignment

      • Adequate references to support your findings, information, and opinions
      • A minimum of two outside academic references are required
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

         required.
      • APA Formatting

Click the Assignment Files tab to submit the assignment.


Supporting Activity: Staff Awareness

How can an organization make sure all its users know and follow its information security policy? What are the common hindrances? How can an organization overcome them?

 

Supporting Activity: Effective Controls of Health Care Information

What are three controls that would be effective in protecting health care information? For each item, describe the risk in your own terms and how the controls address that risk. Also, discuss how applicable the same risks and controls are to other organizations.

Supporting Activity: Corporate Laptop Policy

How can a company protect data on corporate laptops? Why do more organizations choose not to protect such data? Do you expect this to become a legal requirement in the future? Explain why you think so.

 

 

           CMGT/400 Week 5 Educate the Board of Directors on IT Security Issues and Costs

CMGT410 WEEK 5 Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation.

             CMGT/400 Week 5 Educate the Board of Directors on IT Security Issues and Costs

CMGT410 WEEK 5 Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation.

Everything Listed for Week 5 is included in purchase - Individual AND Team Assignments!

 

Learning Team:

Educate the Board of Directors on IT Security Issues and Costs

Includes TWO FULL PowerPoint Presentations with FULL Speaker Notes = A+ Work!

Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback into a 20- to 30-slide Microsoft PowerPoint presentation. This presentation needs to persuade the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices. Include the following:
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation. Audio narration is optional and not

         required.
      • APA Formatting
Click the Assignment Files tab to submit your assignment.

 

 

Individual: The Global Security Policy

Includes Option #1 Presentation with Speaker Notes and Summary Guide

Includes Option #2 Presentation with Speaker Notes and Summary Guide

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

Create a 10-slide Microsoft PowerPoint presentation. Include the following:
      • All of the following topics (you may change the order of the topics):
      • Information is a valuable asset to a company
      • Risk Management is necessary to reduce losses
      • Identifying vulnerabilities is a valuable first step
      • What is an organization security policy?
      • Who are regulatory organizations?
          • List at least 3
      • Social networking
      • Three potential risks
      • Three potential threats
      • Is the SDLC involved with reducing threats? How?
      • Why is the Cloud so feared?
      • Is hacking an ethical issue?
      • Four methods for securing information assets
      • Key elements if an IT Security Policy
      • How does encryption work? Why is it considered a premier tool in IT Security?
      • Five different jobs that deals with IT Security
      • Three certifications that are very good to have
      • Auditing is a tool in preventing risks
      • Define information assurance and security
      • Employee awareness is necessary for success. Why?
      • Describe and explain the key elements of recovering from lost assets
      • What are Internet connected systems? Describe five examples
      • Two jobs in IT Security that will grow quickly this year
      • Do not use research quotes or acronyms. You must use your own words.
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting as needed
Create a 1-page Microsoft Word Executive Summary on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.

 

Alternate Topic Included - "Cyber Security Awareness" Presentation

 

 

Individual:The Global Security Policy

Includes Presentation with Speaker Notes and Summary Guide

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "Cyber Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

Create a 10-slide Microsoft PowerPoint presentation. Include the following:
      • All of the following topics (you may change the order of the topics):
      • Information is a valuable asset to a company
      • Risk Management is necessary to reduce losses
      • Identifying vulnerabilities is a valuable first step
      • What is an organization security policy?
      • Who are regulatory organizations?
          • List at least 3
      • Social networking
      • Three potential risks
      • Three potential threats
      • Is the SDLC involved with reducing threats? How?
      • Why is the Cloud so feared?
      • Is hacking an ethical issue?
      • Four methods for securing information assets
      • Key elements if an IT Security Policy
      • How does encryption work? Why is it considered a premier tool in IT Security?
      • Five different jobs that deals with IT Security
      • Three certifications that are very good to have
      • Auditing is a tool in preventing risks
      • Define information assurance and security
      • Employee awareness is necessary for success. Why?
      • Describe and explain the key elements of recovering from lost assets
      • What are Internet connected systems? Describe five examples
      • Two jobs in IT Security that will grow quickly this year
      • Do not use research quotes or acronyms. You must use your own words.
      • Videos, audio, photos, diagrams, or graphs as appropriate
      • Substantial speaker notes to elaborate on the key points of your plan
      • Audio narration within your presentation
      • APA Formatting as needed
Create a 1-page Microsoft Word Executive Summary on this presentation. Include the following:
      • Goals and objectives of the presentation in summary form
      • Adequate references to support your findings, information, and opinions
      • APA Formatting
Click the Assignment Files tab to submit both parts of the assignment.