Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.

RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues. RollinOnhs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet.

The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company's web presence and lack of access control.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

Briefly explain the current state of Web application security to the Board of Directors.

Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.

Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

Analyze the impact of the Internet and Web applications on the business world.

Analyze the evolution of social media, social networking, and the ethical issues they raise.

Compare and contrast Web-based risks.

Analyze common Website attacks, weaknesses, and security best practices.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92554240
  • Price:- $85

Priced at Now at $85, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignmentyou are a member of the human resources

Assignment You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employees, customers, and suppliers. Your manager has r ...

Answer the following questions1 the official definition

Answer the following Questions: 1. The official definition used by the US Government, as defined in the Federal Information Security Act (FISA), is "protecting information and information systems from unauthorized access ...

The format of your paper will need to follow the following

The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page): INTRODUCTION State the topic you are attempting to cover State the ...

Question suppose that you enhance an architecture by

Question : Suppose that you enhance an architecture by replacing its floating-point divider with a new hardware divider on which division is 15 times faster. For your application code running on the original hardware, 2% ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

In this assignment please use your own words to explain

In this assignment, please use your own words to explain what is net neutrality? Analyzing what are pro and con on this issue? Where are pressures and ethical issues related to net neutrality? What is your conclusions. P ...

Question how does a sequential control process differ from

Question : How does a sequential control process differ from a combination control process? Give one example each of a sequential control process and of a combination control process in which a PLC is used.

A crucial starting point to develop an effective disaster

A crucial starting point to develop an effective disaster recovery plan is to cultivate an efficient Business Impact Analysis (BIA). The BIA evaluates the potential effect of interruptions to an organization's critical b ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) discusses the following working with data steps: Data acquisition, data examination, data transformat ...

Questions q1 explain evolution of internet apa format

Questions : Q1. Explain evolution of internet? (APA format required, Turntin check required. Minimum 250 words essay) Q2. Explain patterns of evolution technology? (APA format required, Turntin check required. Minimum 25 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As