CMGT/430 Enterprise Security |
|
Or you may Purchase Tutorials by the Week below. |
|
|
|
|
CMGT/430 Week 1
Individual: IT Systems Connection Table
Assignment Content
Refer to the course scenario.
IT systems do not operate alone in the modern enterprise, so securing them will involve securing their interfaces with
other systems. as well as the system itself. It is important to know the different interconnections each system may have.
During your review of the hospital's current documents and files, you run across an IT systems connection table that was
never completed by your predecessors. This document has a table that shows the relationship between multiple IT
systems.
Complete the IT System Connection Table.
Submit your assignment.
Supporting Activity: Enterprise Systems Security Issues
*Includes 3 Full Responses to this question.
What are two important security issues that enterprise systems commonly face? How do these issues threaten information and what high-level steps can a company take to mitigate these threats?
|
|
|
|
|
CMGT/430 Week 2
Individual: Enterprise Security Concerns
Includes Option #1
Includes Option #2
Assignment Content
After reviewing the material your group has prepared so far, the management team has returned with a list of five specific
concerns. They include:
• Access control
• Security enterprise
• Impact of implementing a change management system
• Mitigation
• Risk management
Management has asked you to address concerns with a visual presentation. Address concerns by providing the following
information:
• An overview of the access control
• Required mitigation steps for each concern
• Prioritize concerns
• Concerns with vendor relations from the enterprise security standpoint
• Description of how the organization can apply risk management p rinciples in its efforts
• Description of iterative maintenance effort. including audits and frequency
Include at least two references formatted according to APA guidelines.
Present the i nformation in one of the following ways:
• A detailed chart along with a brief 1- to 2-page executive summary explaining the
decisions made
• A 1 2 -to 14-slide multimedia-rich presentation with speaker notes
Submit your assignment.
|
|
|
|
|
CMGT/430 Week 3
Individual: Responding to Threats
Includes Option #1
Includes Option #2
Assignment Content
Refer t o the Week 3 - Required Learning Activity: Core Security Principles.
A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a
ransomware attack. You have kept a close eye on this event. You decide to complete a review of current material available
regarding ransomware attacks and especially ransomware and hospital enterpr ise systems.
Develop a 1- to 2 -page chart. Your chart should have four columns for Authorization, Authentication, Roles, and
Mitigation , as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes
that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for
small, medium, and large hospital enterprise systems.
Based on your chart, provide a final recommendation on how the hospital can respond
to the threat.
Summarize your
chart findings , provide your recommendation, and answer the following questions in a brief, 2 -to 3-page executive
summary to the Auburn Regional management team:
• How could changes to authorization, authentication, and roles help mitigate and deal
with these systems threats?
• How do you verify people and security levels?
• How will your recommendations alleviate the threat?
Include the chart in your executive summary.
Submit your assignment.
|
|
|
|
|
CMGT/430 Week 4
Individual: Cloud Computing
Includes Option #1
Includes Option #2
Assignment Content
Refer to the Learning lnfographic Design and Cyber Security Awareness: Digital Data Protection.
Your work so far has been well-received and the management team is very interested in quickly bringing the rest of the
organization into the process. The management team has expressed interest in incorporating cloud technology as part of
the Auburn Regional's IT architecture. To integrate both of these requests. you decide to create an infographic that could,
on a single diagram, give the reader an idea of what cloud technology is and how it could be used by Auburn Regional as
these enterprise systems updates are in action. As you might imagine, there is a wealth of information on the internet
involving the use of cloud computing.
Consider the following information and outline your answers:
• What are the pros and cons of cloud computing?
• Where could cloud computing fit in the organizational structure and operations?
• How do companies that enter cloud technology agreements pass on those issues to
their customers?
• How do these companies really know where their data and the data of their customers
is really stored?
• What precautions are being taken?
Using your outline, create an original infographic for a presentation to the Auburn Regional management team that
shows:
• The basics of cloud computing
• Overview of pros and cons of cloud computing
• Where cloud computing could possibly fit into the organizational structure and
operations
• At least two concerns that need to be addressed
Include your outline on a separate document to support your infographic.
|
|
|
|
|
CMGT/430 Week 5
Individual: Enterprise Security Plan Paper
Includes Option #1
Includes Option #2
An enterprise security plan is a document that explains the security exposure that an entity would encounter in a specific
marketplace. A committee of people typically writes this document over a span of a few months. Many times the drafts
begin with developing a high -level overview of strategic objectives that address how to secure the enterprise inside and
outside the enterprise.
The CEO asks you to explain the core principles of enterprise security and respond to five strategic objectives as part of
the overall enterprise system security plan draft. They are:
• Data loss prevention
• Access controls
• Data management
• Risk management
• Cloud technology
For each of the five strategic objectives, write a response that addresses the following:
• Key initiative: Why is this topic important to Auburn Regional?
• Obj ectives: What is the desired outcome to this effort?
• Description: What is the specific strategic objective? Provide a high-level
explanation.
• Benefits: What will be the benefits of this effort?
• Outcome: What will be done to meet this objective?
Include any charts, graphics, or infographics created in previous weeks that support your findings.
Compile your response with the following:
• An updated executive summary
• A final recommendation
• At least three new references throughout your plan overview, cited according to APA guidelines.
Incorporate feedback and use previous assignments as a resource. As a guideline, an overview of this nature is typically 3
to 4 pages long.
Submit your assignment. |