Analyze the companys use of information and it

Assignment Help Business Management
Reference no: EM133792391

Homework: Foundations of Information Security & Assurance

For this project, you will develop a company profile for a Fortune 500, publicly traded company which uses Information Technology to conduct it business operations. Fortune 500 companies almost always have a significant presence in cyberspace and therefore have a need to protect their information, information systems, and information infrastructures from threats and attacks which could originate from anywhere in the world.

You will use the same company for Projects so, it may be worth your time to review those project description files AND information about multiple companies before deciding which company you will focus on. Project is an IT-focused Risk Assessment for your selected company. Project is an IT-focused Risk Management Strategy for the company. Project #4 is a Privacy-focused Compliance Analysis.

A list of approved companies (those ranking 1-15 in the CY 2021 Fortune 500) appears at the end of this homework description file (see Table 2). If you wish to use a company not on the approved list, you must first obtain the approval of your instructor. Alternate companies must be in the Fortune 500 and must be publicly traded on one or more of the US-based stock exchanges. The current Fortune 500 List.

Research

A. Chose a company from the table provided at the end of this homework file. Locate its public website and review how the company presents itself to customers and the general public.

B. Review the company's Investor Relations website. Compare how it represents itself to investors and shareholders as compared to how it presents itself on its customer-facing website. The link to the Investor Relations website is provided in the table at the end of this file.

C. Review Section 1 of the company's Form 10-K Annual Report to Investors to learn about how the company presents itself to investors and shareholders. The link to the Form 10-K is provided in the table at the end of this homework file.

a. Enter the company name in the Search bar at the top of the window and then click the search icon.
b. Browse the company profile using the menu on the left.

D. Read and analyze the Company Summary, Company Description, and Company History as presented in the Hoovers profile. Browse through additional sections in the profile to develop an understanding of the company, its products and services, and the geo-political environments in which it operates. Who are its customers? What does it sell (or how does it make money)? What laws and regulatory bodies is it subject to?

Retrieve the Hoovers profile for your selected company. The base URL for Hoovers. You will need to login to the library using your UMGC SSO login credentials.

Analyze the Company's Use of Information and IT.

Note: You do not need to be precise or exacting in your analysis for this section. It will be sufficient that you identify general categories of information and IT that the company relies upon for its business operations.

A. Review Chapter 2 in (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide.

B. Read the following sections in CIPM Certified Information Privacy Manager All-in-One Exam Guide: Appendix A.

a. Factor Analysis of Information Risk
b. Asset Identification
c. Hardware Assets
d. Subsystem & Software Assets
e. Cloud-based Information Assets
f. Virtual Assets
g. Information Assets
h. Asset Classification
i. Data Classification

C. Identify 3 or more additional sources of information about the company and how it uses information and Information Technologies to conduct its business operations. These sources can be news articles, articles in industry or trade journals, data breach reports, etc.

D. Using your readings and research, develop an information usage profile for your company. Your goal is to identify categories of information that need to be protected against losses of confidentiality, integrity, and availability. Your profile should contain 10 (acceptable) - 15 (excellent) distinct categories of information. You may use the example table shown below or create one of your own design. Your profile should address the following:

a. What types of information does this company collect, process, transmit, and store as part of its business operations?

b. What types of Information Technologies does this company use to accomplish its business objectives? What types of information are required to operate these systems?

c. Does this company use Operational Technologies (e.g., robots and control systems used in manufacturing or for other types of device controls)? What types of information are required for these systems?

d. Summarize the company's Information Use & Protection Requirements. What is the sensitivity level of the information? What would be the potential impacts of attacks causing loss of confidentiality, integrity, and/or availability both for single incidents and over time.

Reference no: EM133792391

Questions Cloud

Examine any cost overruns or schedule delays for the project : Identify and explain if different contract types (e.g., fixed-price, cost-type, or labour and material) are used for various aspects of the project
Analyze knowledge management tools that commonly implemented : Identify and analyze the Knowledge Management tools that are commonly implemented in the Kingdom of Saudi Arabia (KSA).
Develop effective marketing strategies to achieve : MKTG1025 Marketing Principles, Royal Melbourne Institute of Technology - Identify and analyse the impact of key trends in the internal and external environment
Why did you select windows or macos as your operating system : Why did you select Windows or macOS as your operating System? What features did you find the most valuable? What features did you find the most valuable?
Analyze the companys use of information and it : Analyze Company's Use of Information and IT. What types of information does this company collect, process, transmit and store as part of its business operation?
How the media responds to your chosen theory : CTCH 203 Introduction to Media and Communication, University of Regina - identifies your chosen media and explains how the media responds to your chosen theory
Which scales would you use to measure each one of them : BUS 698- Enlist your hypotheses describing the assumed relationships between them. Which scales would you use to measure each one of them?
Identify network vulnerability with tool : Identify network vulnerability with tool Use current techniques, skills, and tools to find out different vulnerabilities and the countermeasures for identified
Identify your ethnicity and culture : Identify your ethnicity and culture. Then, list three health promotion strategies that can be taken to address this obesity in your culture/ethnicity.

Reviews

Write a Review

Business Management Questions & Answers

  Caselet on michael porter’s value chain management

The assignment in management is a two part assignment dealing 1.Theory of function of management. 2. Operations and Controlling.

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. Due to increase in the preference for light beer drinkers, Chris Prangel wants to introduce light beer version in Mountain Man. An analysis into the la..

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. An analysis into the launch of Mountain Man Light over the present Mountain Man Lager.

  Analysis of the case using the doing ethics technique

Analysis of the case using the Doing Ethics Technique (DET). Analysis of the ethical issue(s) from the perspective of an ICT professional, using the ACS Code of  Conduct and properly relating clauses from the ACS Code of Conduct to the ethical issue.

  Affiliations and partnerships

Affiliations and partnerships are frequently used to reach a larger local audience? Which options stand to avail for the Hotel manager and what problems do these pose.

  Innovation-friendly regulations

What influence (if any) can organizations exercise to encourage ‘innovation-friendly' regulations?

  Effect of regional and corporate cultural issues

Present your findings as a group powerpoint with an audio file. In addition individually write up your own conclusions as to the effects of regional cultural issues on the corporate organisational culture of this multinational company as it conducts ..

  Structure of business plan

This assignment shows a structure of business plan. The task is to write a business plane about a Diet Shop.

  Identify the purposes of different types of organisations

Identify the purposes of different types of organisations.

  Entrepreneur case study for analysis

Entrepreneur Case Study for Analysis. Analyze Robin Wolaner's suitability to be an entrepreneur

  Forecasting and business analysis

This problem requires you to apply your cross-sectional analysis skills to a real cross-sectional data set with the goal of answering a specific research question.

  Educational instructional leadership

Prepare a major handout on the key principles of instructional leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd