Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

You have been asked by the CIO to create a Microsoft PowerPoint training presentation along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.

Create a 2-slide Microsoft PowerPoint training presentation which describes each goal, its definition, values, and importance to your company. Include the following:

• Refer to the topics as listed in the linked Week Five Individual assignment and use which topics are appropriate for this assignment
Adequate references to support your findings, information, and opinions

• A minimum of two outside academic references are required
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting

• Create a 1-page Microsoft Word Summary Guide on this presentation. Include the following: Goals and objectives of the presentation in summary formAdequate references to support your findings, information, and opinionsA minimum of two outside academic references are requiredAPA Formatting

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

• All of the following topics (you may change the order of the topics):

o Information is a valuable asset to a company
o Risk Management is necessary to reduce losses
o Identifying vulnerabilities is a valuable first step
o What is an organization security policy?
o Who are regulatory organizations?

- List at least 3

o Social networking
o Three potential risks
o Three potential threats
o Is the SDLC involved with reducing threats? How?
o Why is the Cloud so feared?
o Is hacking an ethical issue?
o Four methods for securing information assets
o Key elements if an IT Security Policy
o How does encryption work? Why is it considered a premier tool in IT Security?
o Five different jobs that deals with IT Security
o Three certifications that are very good to have
o Auditing is a tool in preventing risks
o Define information assurance and security
o Employee awareness is necessary for success. Why?
o Describe and explain the key elements of recovering from lost assets
o What are Internet connected systems? Describe five examples
o Two jobs in IT Security that will grow quickly this year

• Do not use research quotes or acronyms. You must use your own words.
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92462089

Have any Question?


Related Questions in Management Information System

Research projecton march 11th 2011 stackoverflow made a

Research Project On March 11th, 2011, StackOverflow made a significant change to their leaderboard. They now show users with top reputation gained in the past week, rather than all-time high reputation users. The rationa ...

The main project in this project you are either work on the

The main project: In this project, you are either work on the hypothetical company or an existing company. In either case, you are supposed to develop a Business Intelligence Development Plan for a local corporation. In ...

Disaster recoverysearch scholar google for a company school

Disaster Recovery: Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were ma ...

Since osi model is a virtual model based on your reading

Since OSI model is a virtual model; based on your reading this week, why do you think the data communication industry would use the layered OSI reference model? What does modeling mean to you? How would you model somethi ...

Discussion read new trends in cybersecurity by chang from

Discussion : Read "New Trends in Cybersecurity," by Chang, from IT Professional (2013). Review "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014). Compare and contrast t ...

Assignmentorganizational risk management policy does not

Assignment Organizational risk management policy does not occur in a vacuum; rather it is the result of perception, experiences, and governmental mandates, which all comprise the risk environment of the organization. Thu ...

Develop a work breakdown structure for a online retailer to

Develop a work breakdown structure for a Online retailer to include a paragraph about your structure. Include at least three levels in your diagram. Project: Primarily online retailer. The project will require the accoun ...

Make a power point presentation on conflict resolutionthese

Make a Power Point Presentation on Conflict Resolution. These conflicts can be work related or personal conflicts. Prepare 5 slides and make sure each slide has one academic reference. For each slide, you are only to use ...

Transformation at bank of america an enterprise systems

Transformation at Bank of America: An Enterprise Systems Analysis: MIT SDM Systems Thinking Webinar Serieswallance By Daniel Wallance, SDM ’11 Please watch the webinar and write a two pages report to include the backgrou ...

1discussion 1your state has a forthcoming referendum

1. Discussion 1: Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. 2. Discussion 2: I. Understanding ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As