Assess any techniques and technologies that you may need

Assignment Help Management Information Sys
Reference no: EM131988764

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.

RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues.

RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices.

There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company's web presence and lack of access control.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

Briefly explain the current state of Web application security to the Board of Directors.

Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.

Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

Reference no: EM131988764

Questions Cloud

Identify one industry with high fixed costs in the short run : Then, identify an industry with high marginal costs in the short run. Be sure to analyze specific examples of costs to justify your choices.
Explain the overall objectives of the sarbanes-oxley act : Explain the overall objectives of the Sarbanes-Oxley Act (SOX). Describe the legal and institutional context in which SOX is implemented
Discuss various applications of scada systems employed today : Discuss various applications of SCADA systems employed today. Can you find a SCADA system that has been damaged? If so, what were the consequences?
Examine the impact to the it support personnel : Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1.
Assess any techniques and technologies that you may need : Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.
Policy to address the distribution of income : In your opinion, do we need to initiate any policy to address the distribution of income? Make sure you provide references to any conclusions you arrive at.
What is his recognized gain and the basis for the bonds : Taxpayer trades the stock for bonds with a fair market value of $25,000 and $5,000 cash. What is his recognized gain and the basis for the bonds
Discuss some of the applications of gdp : Discuss some of the applications of GDP which may be considered improper use or abuse of the concept.
Explain the major function of the it professional team : What concepts and topics do you think are most important, and how do you see yourself and your team implementing such suggestions when you get on the job?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify and discuss the legal ramifications and violations

Identify and discuss the legal ramifications and violations of any legal subjects and/or decisions related to any constitutional principles.

  Formulate a security planning model

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.

  Question about impact of technology1 i need to find the

question about impact of technology1. i need to find the impact of technology on the four functions of management

  Find a photograph of an antelope

Search the internet and find a photograph of an antelope.Search the internet for a sound file (WAV) associated with an antelope.

  Summary of the hardware and software products

summary of the hardware and software products that would be required for a small system for either an investment or architect firm. You have a budget of $5000

  Analyze the security mechanisms needed to protect dms system

Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.Critique the transition process performed by the DMS in the case study. Then, recommend two (2) alternatives to the ..

  Describe a previous project in which you were involved

Describe a previous project in which you were involved, where scope creep occurred. Explain why it occurred and at least one way it could have been prevented.

  Identify normalization requirements for proposed database

Analyze your five tables and confirm if normalization is needed to avoid data redundancy, and ensure the efficient and reliable management of data.

  Resource planningallocation how many service technicians

resource planningallocation how many service technicians does it take?assumptionsfactors- available working hours 8am -

  How will your plans affect the business

How will they affect the balance between securing the systems, and allowing the business enough breathing room to function effectively?

  How does internet change consumer and supplier relationships

It has been said that there is no such thing as a sustainable strategic advantage. Do you agree? Why or why not? How does the Internet change consumer and supplier relationships

  Discuss the need to maintain the timeliness of the security

Discuss the need to maintain the timeliness of the security policy, and to periodically review and update it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd