Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Information Security Management

You have a course project that conflicts with the Syllabus. You will NOT be creating a project based on your own fictitious company as identified in the Unit 1 IP Assignment. You will complete the assignment based on the scenario in the Course Information page:

Here are the specifics:

Optiotronics Inc. of Seeton, California, started business in 1998. Optiotronics, a private firm, offers a revolutionary product leveraging state-of-the-art microtransmitters and video pixilation technology. Optiotronics' product provides a video display similar to a computer monitor embedded into a transparent contact lens. Optiotronics is a pioneer in the field of wearable computing with practical applications that provide heads-up, dashboard displays to several career fields, including the military.

Optiotronics faces a significant problem in managing the growth and security of its company. The company has spent an extraordinary amount of capital in resources & development; it has amassed volumes of intellectual property (copyrights, patents, and trademarks) that directly contribute to its competitive position. However, to accommodate growth, technology has been acquired and deployed without a great deal of centralized planning. Securing the electronic information system has become a paramount importance to the company's investors.

Responding to this threat, Dr. Melissa Broussard, CEO, has funded the executive position of Chief Security and Compliance Officer (CSCO), and has established the formation of an autonomous department independent of the internal IT structure. It is the mission of the CSCO to implement an information systems security program, manage, and audit the program. Also, the mission includes alleviating risks to the information system. Billions of dollars in potential revenues and the reputation of a world-class wearable computing manufacturer are on the line. Congratulations! You have been hired as the CSCO.

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

The assignments each week build upon the work and knowledge from the weeks beforehand. You will create 1 document that contains all of the weekly assignments-in separate sections-culminating with the final submission being a single document containing all of the weekly assignments.

You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document that will contain a security plan for the organization to be used to protect the organization's assets.

The project deliverables are as follows:

• Security Management Plan

o Use Word
o Title page

- Course number and name
- Project name
- Your name
- Date

o Table of Contents (TOC)

- Use an autogenerated TOC.
- This should be on a separate page.
- This should be a maximum of 3 levels deep.
- Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

o Section Headings (create each heading on a new page with "TBD" as content, except for Section 1)

- Section 1: Information Security Management (Week 1)
- This section will be used to describe the organization and will establish the security model to be used by the organization.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92013514

Have any Question?


Related Questions in Management Information System

Question - this weeks reading included examinations of two

Question - This week's reading included examinations of two state initiatives to improve their health delivery systems. Both were well-intentioned. Both experienced unanticipated developments. Using what you've learned s ...

Distributive bargainingany of the parties involved in the

Distributive Bargaining Any of the parties involved in the negotiation tries to get the maximum advantage by applying the tactics. According to Batra, generally, the negotiation processes are handled by using two approac ...

Legal aspects of healthcare 3-4 sentences for each

Legal Aspects of Healthcare / 3-4 sentences for each question 1. Explain the differences between express and implied consent. Which type is more legally sound? Are express consents given by patients? If so, give an examp ...

Disaster recoverysearch scholar google for a company school

Disaster Recovery: Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were ma ...

Case building shared services at rr Case : Building Shared Services at RR Communications

Case : Building Shared Services at RR Communications Discussion Questions 1. List the advantages of a single customer service center for RR Communications. 2. Devise an implementation strategy that would guarantee the su ...

Word document of 8-10 total pages including empty

Word document of 8-10 total pages, including empty sections Target Organization is Canopy Lawn Care Use MS Word Title page Course number and name Project name Student name Date Table of contents Use autogenerated TOC Sep ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

Question what is information securityhow does the proper

Question : What is Information Security? How does the proper application of Information Security can reduce risk? Format your assignment consistent with APA guidelines.

Respond to the following questions about the security

Respond to the following questions about the security development model, and address the following: Select 1 major component of the model, and describe the key elements. Discuss the importance of this component in the se ...

Questions q1 explain evolution of internet apa format

Questions : Q1. Explain evolution of internet? (APA format required, Turntin check required. Minimum 250 words essay) Q2. Explain patterns of evolution technology? (APA format required, Turntin check required. Minimum 25 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As