Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Theories Expert

CSM660 INFORMATION SECURITY MANAGEMENT ASSIGNMENT-

Case 1 - Marcum State University

The personnel department at Marcum State University has recently purchased PCs for individual offices in the various departments so that they can keep their own records. In the past, all records were stored on the university's mainframe computer. By decentralizing this computer function, each department will have better control over its individual records, and the security of these records will be easier to manage. Most of the departments would like to transfer personnel records of faculty, staff, and student employees in their departments to their PCs from the mainframe. Dr. John Gould, Chairperson of the Accounting Department, would like to use the personnel data regarding the people in his department to generate some statistics concerning salaries, vacation days used, and absences. Rather than code the files or use social security numbers, Dr. Gould would like to keep the names of the individuals with the information that is recorded about them.

  • What are some of the security considerations in this conversion?
  • What are some of the ethical and legal ramifications of keeping files with a person's name attached?
  • What might be a better way of extracting (and storing) this information to ensure maximum security and control?

Case 2 - Bishop Enterprises

Bishop Enterprises, located in Seattle, Washington, is a medium-sized business specializing in building concrete structures (storage building, bridges, utility buildings, and various defense-related installations).

Peter Bishop, president of the company, states that security of its computer systems is critical due to the competitiveness of the commercial concrete industry and the need to protect defense-related information. BE's computer system, as is typical of many, grew on an ad hoc basis as the company grew. Security was not an issue in the early days when there were only a few key employees and the day-to-day, hands-on-management style assured constant vigilance. Mr. Bishop now feels that a solid security package should be added to ensure the ongoing protection of the computer operation.

Mr. Bishop has assigned the task of evaluating several security packages to the director of computer operations, James Clarke. The four objectives that Mr. Clarke has defined for the package selected are:

1. Accountability

2. Auditability

3. Integrity

4. Usability

What factors should be included in an official policy statement sent out with the request for proposal to the vendors? Write a clear and concise statement so that the vendor is able to respond correctly.

Case 3 - Read the following scenario and then answer the questions below.

"Stafford, Cripps Stockbrokers, Accounts Dept, Susan Briggs speaking"

"Susan - we need your help. I'm Dave Bloggs, manager of the new audit division. I'm doing a statutory audit of the accounts system and need a password to check access controls. What is your password?"

"Are you from that new division in Manchester controlled by Mr Stafford himself?"

"Yes - that's us"

"I would like to help but I cannot give you my password without authorization from my manager"

"Glad to see you're careful Susan - I'll contact your manager directly - what is his name?"

"Michael Phillips"

"Many thanks - I'll speak to Mike and mention your help"

Later:

"Stafford, Cripps Stockbrokers, Accounts Dept, John Nugent speaking"

"Good morning John. I'm Dave Bloggs, assistant manager to Mr Stafford the CEO in Manchester. We are redesigning the accounts system with your manager Michael Phillips and John, we've decided to include you on our team"

"Really? Thank you"

"It will be a demanding role but it is a high profile project - do well and promotion could be yours. So, John, to get things rolling I need some help from you. We've already approached your colleague Susan Briggs for her password and now need yours."

"Of course - it's o-p-e-n-d-o-o-r"

"Thank you John"

  • In the context of the above scenario, define the term 'social engineering'.
  • In the above scenario, identify FOUR (4) instances where the staff member was subject to a social engineering technique. Identify the technique and say why it was used.
  • Compare different methods of making staff more aware of 'social engineering' techniques.

Case 4 - Bank of Shenandoah Valley

Today, banks are transferring large sums of money electronically and facing enormous exposure in the process. The Bank of Shenandoah Valley, located in Roanoke, Virginia, is actively involved in this process. The possibility of funds transfer fraud is prompting many banks to adopt protective measures. The two most common techniques used in the banking industry are encryption and message authentication. Encryption involves the scrambling of messages sent-for example, from a commercial bank to the Federal Reserve Bank. An authenticated message is sent clear-anyone who intercepts it can read it. Tacked on to the message is a related secret code that only the receiving party is capable of decoding.

Most observers say that authentication offers more security than encryption because a key is involved.

The Bank of Shenandoah Valley is considering both options and needs to address the following questions:

  • Are there major differences between the two techniques?
  • Are all messages critical or would encryption/authentication be applied only to certain transmittals? If so, which ones?
  • Will these processes slow down operations?
  • What other safeguards should be considered? (Provide 3 suggestions).

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M91947546

Have any Question?


Related Questions in Management Theories

Suppose that for a given patient the true ef is 63 consider

Suppose that, for a given patient, the true EF is 63. Consider the population of EF values that can be estimated on that patient using option II above. That population follows a normal distribution with μ= 63. Find the p ...

Assignment -instructions - please follow instructions for

Assignment - Instructions - Please follow instructions for all for Personal Learning Journal. And each personal learning journal should be of 300words. Each student will keep a personal journal to reflect and record thei ...

Developing leaders and organisations assessment - report on

Developing, Leaders and Organisations Assessment - Report on Promoting Individual Informal Workplace Learning Brief - You are the newly-appointed Human Resource Advisor in a medium-sized business that employs approximate ...

Journal empowering your peopleinstructionsama style with

Journal: Empowering Your People Instructions: AMA Style with references! Journal entries are private between you and the instructor. In this course, journals are low stakes opportunities to submit small portions of your ...

Write a paper of 1000-1500 words that addresses the

Write a paper of 1,000-1,500 words that addresses the following: 1. Discuss two or three of the major shifts that have occurred in managerial theories and concepts pertaining to the evolution of human resources. 2. Descr ...

Each of 30 teams in a league has a demand for generic

Each of 30 teams in a league has a demand for generic advertising of Q = 260 - 4P. Price is measured in thousands of dollars. Ads cost $510,000 each. How many ads will the teams want to purchase as a group?

Two goods cloth and wine two countries a and b suppose that

Two goods: cloth and wine; two countries A and B. Suppose that the autarky relative price of cloth in country A is 1.2 and in country B is 2.5. Suppose cloth is on horizontal axis and wine on the vertical. If the relativ ...

Discussion please locate one peer-reviewed journal

Discussion : Please locate one peer-reviewed journal (Scholarly Journal Article) related to the topic: Strategic Communication for Business and the Employee. This assignment must a professionally designed PowerPoint Pres ...

Discussion assignment -the overall design and costs of an

Discussion Assignment - The overall design and costs of an organization's benefits plans are an important part of their people strategy for attracting and retaining a talented workforce. For example, health care costs ar ...

Fully answer the assigned questions in narrative third

Fully answer the assigned questions in narrative, third person format. The paper consist of 1200 WORDS. Also, include at least three (3) scholarly sources in your responses. Paper must be completed in APA format. NO PLAG ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As