CMGT/582: Security and Ethics

You may purchase tutorials by the Week below.

CMGT/582 WEEK 1 VAMPIRE LEGENDS
CMGT/582 WEEK 1 VAMPIRE LEGENDS
CMGT/582 WEEK 1 VAMPIRE LEGENDS

CMGT/582 Week 1

 

Wk 1 - Vampire Legends

 

Part A: Ch. 10 Role Playing Sim: Vampire Legends
In this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.

Using the Vampire Legends Access link, complete the interactive before moving to Part B.

 

Part B: Memo to CEO
Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization to:
Analyze the components of information security asit applies to the scenario presented in Vampire Legends, including:
o              A breakdown of the budget report
o              Your allocation strategy based on the risks and expenses involved
o              Your choice for the best advertising campaign
o              The course of action in handling information security threats in the future
o              Illustrate the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics the success of the Vampire Legends organization. Include:
o              The ethical conflict in this scenario
o              The consequences of the conflict
o              The solution to the conflict
o              The impact of ethics on revenue

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to make changes or correct any deficiencies.

Submit your assignment.

 

 

Discussion Question - Information Systems

Includes Discussion Question Response! A+ Work!

As customers, students, patients, taxpayers, and citizens, we are surrounded by information systems that support customer interactions.
Respond to the following in a minimum of 175 words:
Identify and describe two such systems that you have used. Briefly discuss the types of customer interactions you have experienced with these systems. Compare what you found to be important security features of each one.

 

 

 

 

CMGT/582 WEEK 2 CRUSIN FUSION CONTEST
CMGT/582 WEEK 2 CRUSIN FUSION CONTEST
CMGT/582 WEEK 2 CRUSIN FUSION CONTEST

CMGT/582 Week 2

Crusin Fusion Contest

  1. Operation of the Cruisin'  Fusion website. You and your staff are ready to run a contest on the blog, asking clients to develop a modern fusion recipe.
  2. There are subsequent behavioral problems that need to be used to evaluate client records that collect and use aggregated information.
  3. Customer statistics are the property of any agency that needs to be covered to be considered among its customers
  4. Ethical Issues
  5. Customer Data Protection
  6. Protection of Intellectual Property
  7. Customer Satisfaction

 

 

Discussion Question - Digital Rights Management

Includes Discussion Question Response! A+ Work!

Discuss digital rights management. Why do organizations use technology to protect intellectual capital? Describe a typical DRM application that

can be used to manage access to digital content. Discus any disadvantages to using DRM.

 

 

 

 

CMGT/582 WEEK 2 CRUSIN FUSION PART 2
CMGT/582 WEEK 2 CRUSIN FUSION PART 2
CMGT/582 WEEK 2 CRUSIN FUSION PART 2

CMGT/582 Week 3

Wk 3 - Cruisin’ Fusion, Part 2

Refer to Cruisin’ Fusion, Part A in Wk 2.

The Cruisin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. 

Research various shopping cart software to determine the best choice for website.

Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. In addition to introducing the order-ahead option, your blog post should:

    • Analyze how the new shopping cart software upholds ethical trends in consumer privacy.
    • Examine ethical considerations for maintaining confidentiality and consumer data.
    • Describe the various privacy regulations upheld with the shopping cart software.

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to make changes or correct any deficiencies. 

Submit your assignment.

 

 

 

Discussion Question - Privacy v. Convenience

Includes Discussion Question Response! A+ Work!

Access Google’s Privacy Policy by visiting Google.com and selecting the “Privacy” link located at the bottom of that page.
Respond to the following in a minimum of 175 words:
Discuss privacy versus convenience. Consider the following questions as you create your post.

  • Does Google place cookies on your computer or other devices?
  • Why do they use cookies? What are location-enabled services?
  • Does Google have information about your actual location?
  • Under what circumstances does Google share personal information with other companies?
  • How do you describe the information security measures that Google takes to safeguard access to personal information?
  • Is there anything in the privacy policy that makes you uncomfortable?
  • Are you likely to change your Google search habits as a result of reviewing its privacy policy?

 

 

CMGT/582 WEEK 4 DEVIL'S CANYON PART 1
CMGT/582 WEEK 4 DEVIL'S CANYON PART 1
CMGT/582 WEEK 4 DEVIL'S CANYON PART 1
CMGT/582 Week 4

 

Wk 4 - Devil’s Canyon, Part 1

In this simulation, you will evaluate how to design an enterprise architecture for a mountain resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying in budget.

Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B.

Part B: Policies, Plans, and Risks
Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.

In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team:

    • Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
    • Outline the importance of a security plan in relation to security roles and safeguards.
    • Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
    • Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
    • Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be
submitted more than once to make changes or correct any deficiencies. 

Submit your assignment.

 


 

Discussion Question - Safeguarding Against Security

Includes Discussion Question Response! A+ Work!

Individuals and organizations today face a variety of security threats. To protect themselves from these threats, they usually take certain protective measures—commonly known as safeguards.
Respond to the following in a minimum of 175 words:
Discuss some important safeguards, and explain how they function in protecting organizations from security threats. Use a specific example when possible.

 

 

 

CMGT/582 WEEK 4 DEVIL'S CANYON PART 2
CMGT/582 WEEK 4 DEVIL'S CANYON PART 2
CMGT/582 WEEK 4 DEVIL'S CANYON PART 2

CMGT/582 Week 5

Wk 5 - Devil’s Canyon, Part 2

Refer to Devil’s Canyon, Part A in Wk 4.

Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix:

    • Briefly describe each of the identified risks/threats.
    • Analyze and evaluate the security controls that mitigate each of the risks/threats identified.
    • Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
    • Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be
submitted more than once to make changes or correct any deficiencies. 

Submit your assignment.

 


 


Discussion Question - Information Security Risks

Includes Discussion Question Response! A+ Work!

Discuss the steps that an organization takes in order to manage information security risks and build a risk matrix.

What is involved in each step of this process? Use a specific organization in your response.

 

 

CMGT/582 WEEK 6 SECURITY AUDIT HUMAN RECOURSES
CMGT/582 WEEK 6 SECURITY AUDIT HUMAN RECOURSES
CMGT/582 WEEK 6 SECURITY AUDIT HUMAN RECOURSES

CMGT/582 Week 6

Security Audit - Human Recources

 


 


Discussion Question - Security Life Cycle Steps

Includes Discussion Question Response! A+ Work!

Respond to the following in a minimum of 175 words:
Discuss the differences between the systems development life cycle (SDLC) and the security life cycle. Include in your discussion both management and non-management IT security positions that perform security life cycle steps, and briefly describe their role.