Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Required Deliverables

1.) Project Proposal Outline due

2.) PowerPoint Presentation due

3.) Project Proposal Final report and Revised Presentation

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security.

The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet named "Integrated Distributors Incorporated" (Project.TS1.doc) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries.

Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure-IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for the project-consider hardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.

Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93080318

Have any Question?


Related Questions in Management Information System

Ch 7 control and accounting information systemson the other

Ch. 7: Control and Accounting Information Systems On the other hand, the evidence of fraud here seems strong. If this kind of behavior is not penalized, then the perpetrators may be encouraged to do itagain, with future ...

Assignment 1 write a 175- to 265-word response to the

Assignment 1 Write a 175- to 265-word response to the following: What circumstances should be present (or what considerations should be made) before removing a child from the guardianship of a parent? Assignment 2 Select ...

Given a folder with images in it create an html page named

Given a folder with images in it, create an HTML page named index.html that contains links to each JPEG file in the directory as follows: Write a function that creates a string of the path to a directory Generatea thumbn ...

Question 1 what aspect of display technology is unique and

Question : 1. What aspect of display technology is unique and potentially what drawbacks does this new technology eliminate? 2. Introducing traditional "non-disruptive products to market is facilitated with market studie ...

Question how are authentication and authorization alike and

Question : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Please write minimum of 200 words with 0 % plagiarism.

Choose a youtube video about html5 and css which is

Choose a YouTube video about HTML5 and CSS, which is respectful and abides by Saint Leo University's Core Values. Watch the video and write a paragraph summarizing the video. Describe it and provide the URL. Remember: It ...

Question what is information securityhow does the proper

Question : What is Information Security? How does the proper application of Information Security can reduce risk? Format your assignment consistent with APA guidelines.

The records are ordered by the date of entry into the union

The records are ordered by the date of entry into the union. The first three lines of the file are: Delaware, DE, 12/7/1787, 1954, 941875 Pennsylvania, PA, 12/12/1787, 44817, 12856989 New Jersey, NJ, 12/18/1787, 7417, 89 ...

Discussion question choose one of the two questions listed

Discussion Question: Choose one of the two questions listed below and respond in your main post, following the instructions below. Main posts should be at least 150 words and include at least one APA formatted source. Re ...

Discussion question what do you perceive to be some of the

Discussion Question : What do you perceive to be some of the Modern Network Security Threats? How do today's Threats differ from threats 10 years ago? Post Requirements: Your post must use at least two (2) sources of inf ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As