Ask Management Information System Expert

Assignment: Presentation of Organizational Security Threats and Vulnerabilities

For this assignment, you will read a scenario and then prepare a presentation of approximately 6-8 slides with detailed speaker's notes discussing the potential security threats and vulnerabilities of a fictitious organization, Open Water Diving and Scuba Institute (OWDSI).

Scenario:

OWDSI is a training center located in the United States. The school offers training and certification programs for scuba and deep-sea diving. OWDSI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides, and manuals. The school suspects that competitors have tried to breach the school's computer systems to gain access to these training materials.

The network is composed of two web servers, two file servers, one e-mail server, fifty employee workstations, and a fifty-workstation student computer lab. The school also has public and private WiFi availability throughout the campus.

You have been hired as the Information Technology (IT) security analyst to review, evaluate, and maintain the security of the organization's computer and network systems.

You have been given the responsibility to determine the top five threats that the OWDSI faces. Management has asked your supervisor for support in this task, and the supervisor has given you the following resources that might be useful in your research and analysis:

• Common Vulnerabilities and Exposure. (2014). News & events.

• Help Net Security. (2013). Top 10 security threats for 2011.

• Secunia. (2013).

Your supervisor has also asked you to consider the following questions as you shortlist the threats:

1. What are some new threats this year that might pose a security risk to this organization?
2. What do you believe are the greatest threats to and vulnerabilities of this organization?
3. What threats do you believe will become more critical in the next twelve months? Why?
4. What information is required for a nontechnical audience?

Tasks:

Utilizing scholarly resources, prepare a Microsoft PowerPoint presentation that includes a network diagram of how the network structure should be configured for optimum security. In 6-8 slides (including detailed speaker's notes), include the following for a nontechnical audience:

• A title slide
• A table of contents
• An executive summary

o Provide a project overview for a nontechnical audience
o Describe the role of ethical hacking in a business setting

• Vulnerabilities and threats

o Identify operating system vulnerabilities

o Consider your supervisor's questions listed above and explain which threats and vulnerabilities pose the greatest risk to the organization over the next twelve months

o Develop a series of at least five questions that the management team at OWDSI should consider

• Countermeasures and prevention

o Explain early identification tools to alert the business about potential attacks
o Explain how you would apply security techniques to mitigate computer and network attacks

• A network diagram

o Create a network diagram showing how the network should be reconfigured for optimum security

• A references slide

Note: Utilize at least three scholarly or professional sources (beyond your textbook) in your paper. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92459226
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Question how can company protect the new emerging

Question : How can company protect the new emerging technology ventures from profit pressures of the parent organization (APA format required, Turntin check required . Minimum 250 words essay) How do companies overcome l ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Data resources management questionsq1 the dama dmbok

Data Resources Management QUESTIONS Q1. The DAMA DMBOK textbook describes the following two core activities as part of the Data Architecture management exercise: "Understanding enterprise information needs" and "Develop ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As