Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Written Assignment : Executive Summary on Veteran's Affairs (VA) and Loss of Private Information

Learning Objectives and Outcomes

Review the case on loss of personal information and be able to make conclusions based on your findings on the VA case and loss of private information.

Assignment Requirements

Refer to the case scenario provided in this unit's lab. By now, you have analyzed the case study and have suggested possible mitigating remedies to prevent loss of private information. Write an executive summary that supports your list of suggested remedies.

Much of the information you have analyzed will be technical in nature. First, without creating a full executive summary of the operation, summarize your findings in a simple bullet-point list. This will help to prioritize the remedies suggested. Once you have the summary ready, compile your findings in the form of an executive summary. The main points you need to cover are:

- Analyze the mistakes committed by both the employees and the Veteran's Affairs Administration that lead to data loss.

- Ensure that the remedies you suggest mitigate or eliminate the mistakes you analyzed, from reoccurring in the future. You can think of using encryption as one of the possible remedies. In this case, describe how encryption can be used.

- Explain methods that will ensure proper monitoring and enforcement of the existing security policies.

Paper must be at least 500 words but the main objectives shown above must be indicated in the paper. APA style with references and citation.

Attachment:- case_study.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91971535

Have any Question?


Related Questions in Management Information System

Case study 1 apple merging technology business and

Case Study 1: Apple Merging Technology, Business, and Entertainment 1) Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. 2) Explain ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

The main project in this project you are either work on the

The main project: In this project, you are either work on the hypothetical company or an existing company. In either case, you are supposed to develop a Business Intelligence Development Plan for a local corporation. In ...

Differentiate between the browser object model and the

Differentiate between the browser object model and the document object (DOM) model. Recommend three (3) DOM methods that you believe are essential to an effective and efficient Website. List and describe three (3) DOM ob ...

Write a 700- to 750 word paper on the protocols used in the

Write a 700- to 750 word paper on the protocols used in the OSI model. Address the following points: 1. How protocols are used to allow data communication to take place 2. How these protocols apply to health care organiz ...

Question onea identify six major components of a computer

QUESTION ONE a) Identify six major components of a computer system. b) Describe the following with reference to systems development. 1. Structured analysis 2. Structured design c) The current trend in database systems de ...

Discussion thinking about experience and goalswhat prior

Discussion : Thinking About Experience and Goals What prior experiences do you have that inform how you approach this class? This could be, for example, writing experience that you think will either help or hurt you as y ...

You need an assignment about business continuity plan and

You need an assignment about Business continuity plan and disaster recovery plan: Topics covered are : - 1)- An Overview of Information Security and Risk Management 2) - Planning for Organizational Readiness 3) - Conting ...

By now you should have a good understanding what it takes

By now, you should have a good understanding what it takes to engineer complete and correct requirements, secure design and secure code. You are also exposed to process improvement techniques. Now you are in a good posit ...

Prepare a short talking points paper in which you discuss

Prepare a short "talking points" paper in which you discuss the following: 1. What role does innovation play in the cybersecurity industry? 2. Who are the major developers of cybersecurity related inventions? 3. How can ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As