Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignemnt: Spring 2018 Residency Case Study

Introduction

The growth and explosion of the internet has led to a global market place. Companies can sell products all over the world and never have to leave the bounds of their physically secure location. With this move to a global economy we see an increase in security threats to organizations, individuals and agencies. All these models must have an information system to process, store, and retrieve information for their internal stakeholders, customers, and external users. Information systems have inherent risks and vulnerabilities to attacks from internal users, external customers, hackers and criminals. Organizations must have a robust security program in place to meet these attacks and be proactive in their security stance.

Your group has the responsibility of creating a robust security policy that covers all the needs of the organization. The security policy identifies administrative, physical, and technical controls that must be in place to identify security risks and develop mitigation strategies to minimize the effects of these risks. You will evaluate the IT infrastructure of Solomon Enterprises and its global business model.

Organizational structure

Solomon Enterprises employees 500 people in five different locations throughout the domestic United States. Solomon Enterprises generates $200 million in annual revenue through its business model so they would be a huge target for hackers or criminals. Their business products can be purchased through an online web site. They have one central database/data center located in West Virginia and regional offices in Florida, Texas, Arizona, Montana, and Missouri. Customers, clients, and users have access via the Internet throughout the world. The company has a disaster recovery site located in Billings, Montana. Solomon Enterprises users can work remotely or within one of the regional offices. They have a VPN connection that ensures that their connection is encrypted. The central data center has a firewall and each regional office has a firewall to monitor traffic and keep unauthorized access from the facility. They have company issues devices located within the office and laptops that can be taken for remote access. All these devices are running Windows XP and their server is running Windows 2003.

Objective

The goal of your group is to develop a plan that evaluates the current security posture of the organization of the company and what controls need to be put into place to safeguard their information. You only have the brief synopsis for guidance so if something is not identified either it is not being done or they do not have enough information to provide you. Use your text as the key source when determining what security controls need to be in place for your company. Ensure that you cover each component that we have discussed within our class room videos in order to increase the security posture of your organization.

Deliverables

15-page written paper. Five scholarly sources besides your text. The entire paper must be properly APA formatted with an APA running header, all references properly formatted, and cited within your writing.

Minimum components that must be covered

1. Introduction

Introduce your organization, security posture and business model

2. Administrative controls

i.e., Backgrounding employee's/training employees/any agreements

3. Physical Controls

Physical protection of the facility

4. Technical Controls

i.e., firewall, IDPS, encryption, etc.

5. Security Policies

What security policies will need to be built into your company's overall existing security program to ensure that data is safeguarded.

6. Legislation/Regulations

How do legislation and regulations affect and govern your company. Identify one federal legislative component and one regulation that could impact your company.

7. Network Security Tools

What tools are instrumental in monitoring, detecting, and alerting your company when an someone is trying to gain unauthorized access to your organizations network.

8. Conclusion.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92744989

Have any Question?


Related Questions in Management Information System

Using proper apa formatting write an initial 400-600 word

Using proper APA formatting write an initial 400-600 word discussion paper relating to the following: 1. What are protective barriers and what should they entail? 2. What mitigation procedures can be used to ensure the r ...

Using jython v52 draw a simple house with one door two

Using Jython V5.2 Draw a simple house with one door, two windows, walls, and a roof. Using your house function, draw a town with dozens of houses of different sizes. You will probably want to modify your house function t ...

Assignment creating and communicating a security

Assignment : Creating and Communicating a Security Strategy As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you'll practice this im ...

Question describe and discuss at least two backup

Question : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? Please write minimum of 400 words with 0 % plagiarism and in APA format (Mandatory ).

Assignment wireless technologythere are a number of

Assignment : Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Using an organization of your choicedevelop a complete

Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-reviewed) must be ci ...

Your company is a dynamic organization that depends on

Your company is a dynamic organization that depends on using standard project management techniques as prescribed by PMBOK in managing series of projects to keep its IT infrastructure in alignment with its business goals ...

Linux is the best-known and most-utilized open source

Linux is the best-known and most-utilized open source operating framework. As an operating framework, Linux is programming that sits underneath the greater part of the other programming on a PC, getting demands from thos ...

Case 4 reviews the therac-25 case study and the medical

Case 4 reviews the Therac-25 case study and the medical linear accelerator that occurred between 1985 and 1988. To answer the questions, you should perform additional research, or use your own critical analysis. Please s ...

Need answers to the below questions 12 - 1 page each

Need Answers to the below Questions (1/2 - 1 page each answer) This is of the assigned textbook "Wharton Managing Emerging Technologies" Q1: Clarify any 2 of the variable evaluation approaches for future markets and emer ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As