CMGT/430 Enterprise Security
CMGT/430 Complete the University of Phoenix Material: IT System Connection Table for four different IT systems. The table is located in the Materials section to the right.
Complete the directions within the document.     CMGT/430 Complete the University of Phoenix Material: IT System Connection Table for four different IT systems. The table is located in the Materials section to the right.
Complete the directions within the document.
Or you may Purchase Tutorials by the Week below.
CMGT430 IT Systems Connection Table
CMGT430 IT Systems Connection Table
CMGT430 IT Systems Connection Table
CMGT430 IT Systems Connection Table

CMGT/430 Week 1

Individual: IT Systems Connection Table

Assignment Content
Refer to the course scenario.
IT systems do not operate alone in the modern enterprise, so securing them will involve securing their interfaces with other systems. as well as the system itself. It is important to know the different interconnections each system may have.
During your review of the hospital's current documents and files, you run across an IT systems connection table that was never completed by your predecessors. This document has a table that shows the relationship between multiple IT systems.
Complete the IT System Connection Table.
Submit your assignment.

 

Supporting Activity: Enterprise Systems Security Issues

*Includes 3 Full Responses to this question.

What are two important security issues that enterprise systems commonly face? How do these issues threaten information and what high-level steps can a company take to mitigate these threats?

 

 

CMGT430 Enterprise Security Concerns
CMGT430 Enterprise Security Concerns
CMGT430 Enterprise Security Concerns

CMGT/430 Week 2

Individual: Enterprise Security Concerns

Includes Option #1

Includes Option #2

Assignment Content
After reviewing the material your group has prepared so far, the management team has returned with a list of five specific concerns. They include:


• Access control
• Security enterprise
• Impact of implementing a change management system
• Mitigation
• Risk management


Management has asked you to address concerns with a visual presentation. Address concerns by providing the following information:


• An overview of the access control
• Required mitigation steps for each concern
• Prioritize concerns
• Concerns with vendor relations from the enterprise security standpoint
• Description of how the organization can apply risk management p rinciples in its efforts
• Description of iterative maintenance effort. including audits and frequency
Include at least two references formatted according to APA guidelines.


Present the i nformation in one of the following ways:


• A detailed chart along with a brief 1- to 2-page executive summary explaining the

   decisions made
• A 1 2 -to 14-slide multimedia-rich presentation with speaker notes


Submit your assignment.

 

CMGT430 Responding to Threats
CMGT430 Responding to Threats

CMGT430 Responding to Threats

CMGT/430 Week 3

 

Individual: Responding to Threats

Includes Option #1

Includes Option #2

Assignment Content
Refer t o the Week 3 - Required Learning Activity: Core Security Principles.
A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a ransomware attack. You have kept a close eye on this event. You decide to complete a review of current material available regarding ransomware attacks and especially ransomware and hospital enterpr ise systems.
Develop a 1- to 2 -page chart. Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation , as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for small, medium, and large hospital enterprise systems.
Based on your chart, provide a final recommendation on how the hospital can respond

to the threat.

Summarize your chart findings , provide your recommendation, and answer the following questions in a brief, 2 -to 3-page executive summary to the Auburn Regional management team:


• How could changes to authorization, authentication, and roles help mitigate and deal

   with these systems threats?
• How do you verify people and security levels?
• How will your recommendations alleviate the threat?
Include the chart in your executive summary.
Submit your assignment.

 

CMGT430 Cloud Computing
CMGT430 Cloud Computing

CMGT430 Cloud Computing

CMGT/430 Week 4

Individual: Cloud Computing

Includes Option #1

Includes Option #2

Assignment Content
Refer to the Learning lnfographic Design and Cyber Security Awareness: Digital Data Protection.
Your work so far has been well-received and the management team is very interested in quickly bringing the rest of the organization into the process. The management team has expressed interest in incorporating cloud technology as part of the Auburn Regional's IT architecture. To integrate both of these requests. you decide to create an infographic that could, on a single diagram, give the reader an idea of what cloud technology is and how it could be used by Auburn Regional as these enterprise systems updates are in action. As you might imagine, there is a wealth of information on the internet involving the use of cloud computing.


Consider the following information and outline your answers:


• What are the pros and cons of cloud computing?
• Where could cloud computing fit in the organizational structure and operations?
• How do companies that enter cloud technology agreements pass on those issues to

   their customers?
• How do these companies really know where their data and the data of their customers

   is really stored?
• What precautions are being taken?


Using your outline, create an original infographic for a presentation to the Auburn Regional management team that shows:


• The basics of cloud computing
• Overview of pros and cons of cloud computing
• Where cloud computing could possibly fit into the organizational structure and

   operations
• At least two concerns that need to be addressed


Include your outline on a separate document to support your infographic.


CMGT430 WEEK 5 ENTERPRISE SECURITY PLAN
CMGT430 WEEK 5 ENTERPRISE SECURITY PLAN

CMGT430 WEEK 5 ENTERPRISE SECURITY PLAN

CMGT/430 Week 5

Individual: Enterprise Security Plan Paper

Includes Option #1

Includes Option #2

An enterprise security plan is a document that explains the security exposure that an entity would encounter in a specific marketplace. A committee of people typically writes this document over a span of a few months. Many times the drafts begin with developing a high -level overview of strategic objectives that address how to secure the enterprise inside and outside the enterprise.
The CEO asks you to explain the core principles of enterprise security and respond to five strategic objectives as part of the overall enterprise system security plan draft. They are:


• Data loss prevention
• Access controls
• Data management
• Risk management
• Cloud technology


For each of the five strategic objectives, write a response that addresses the following:


• Key initiative: Why is this topic important to Auburn Regional?
• Obj ectives: What is the desired outcome to this effort?
• Description: What is the specific strategic objective? Provide a high-level

    explanation.
• Benefits: What will be the benefits of this effort?
• Outcome: What will be done to meet this objective?


Include any charts, graphics, or infographics created in previous weeks that support your findings.

Compile your response with the following:
• An updated executive summary
• A final recommendation
• At least three new references throughout your plan overview, cited according to APA guidelines.
Incorporate feedback and use previous assignments as a resource. As a guideline, an overview of this nature is typically 3 to 4 pages long.
Submit your assignment.