Defend against unauthorized access and data loss

Assignment Help Management Information Sys
Reference no: EM131161092 , Length: 5

Step 1: Read "SANS Institute: What Every Tech Startup Should Know About Security, Privacy, and Compliance" (https://www.sans.org/reading-room/whitepapers/compliance/tech-startup-about-security-privacy-compliance-35792) white paper designed to help founders for tech startups ask the right questions about information security.

Step 2:Pick one of these tech startups! As a founder/CEO for one of these startups, you must have information security in mind in order to defend against unauthorized access and data loss potentially compromising intellectual assets, sensitive data and the company's reputation in the marketplace.

Acorns

PillPack

Uber

"Acorns is hoping to make saving and investing as simple as possible. After connecting their debit and credit cards, the app gives users the ability round up all purchases to the nearest dollar. The extra amount is then added to a diversified investment portfolio."

"PillPack is a full service pharmacy that delivers a better, simpler experience. Our pharmacists manage all your refills. From phone calls to faxes and follow up, they handle everything for you."

"Uber is a technology platform that is evolving the way the world moves.
By seamlessly connecting riders to drivers through our apps, we make cities more accessible, opening up more possibilities for riders and more business for drivers."

Security Concerns:

  • Credit Card Payments
  • PCI Compliance
  • Securing data in motion

Security Concerns:

  • HIPAA Compliance
  • Privacy/Patient Data
  • Credit Card Payments

Security Concerns:

  • Hiring/pre-screening competent drivers
  • Prevention of unauthorized third-party access to driver or rider information
  • Credit card transactions
  • https://www.crunchbase.com/organization/acorns-grow#/entity
  • https://www.acorns.com/
  • https://angel.co/pillpack
  • https://www.pillpack.com/
  • https://angel.co/uber?utm_source=companies
  • https://www.uber.com/?exp=hp-c

Step 3: Project Requirements

Identify two (2) information security threats that are likely to occur and describe how each threat would result in an adverse effect for the company. (p.106, Table 3-2)

Backup your assertions with a real-world case. Research a similar company (same industry/market/size and/or type) that has been exposed to a similar threat and describe the adverse impact to the organization (e.g. intellectual property theft, data loss, loss of reputation, financial damages, etc.).

Identify two (2) information security controls (p.170, Table 5-1) and discuss how the control would help to reduce, transfer, accept or avoid the risk. (pp. 276-277)

Note: Base your answers on high-level descriptions and security concerns provided. You are not expected to research these tech companies in any depth other than to help you understand the product or service offering in more detail.

Technical Requirements:
Your project report should be formatted professionally in MSWord (.DOC, .DOCX) file format

3-5 pages in length, double-space using 12pt font and normal margin spacing.

Reference no: EM131161092

Questions Cloud

What is sam''s compensating variation for the proposed policy : What is Sam's compensating variation for the proposed policy? Can you compute it without knowing his preferences? Why or why not?
Calculate the change in albert''s consumer surplus : Using the method described in Section 6.2, calculate the change in Albert's consumer surplus.
How politics in health care organization motivates employees : Examine the impact of motivation on quality, safety, and legal risks associated with health care organizations. Assess how politics in a health care organization motivates and demotivates employees and recommend strategies to mitigate the challenge..
How does that revenue compare to her economic losses : How much revenue will the government raise by taxing Beatriz? How does that revenue compare to her economic losses? Does the new tax raise enough revenue for the government to compensate her for her loss?
Defend against unauthorized access and data loss : defend against unauthorized access and data loss potentially compromising intellectual assets, sensitive data and the company's reputation in the marketplace.
Evaluate each decision separately including calculations : Evaluate each decision separately in full detail including calculations, as necessary. The evaluation should be included as part of the memo discussion, not a separate component.
How did his cost of living change according to this measure : Create a Laspeyres price index using June as the base period (that is, use Arnold's consumption bundle for June to create the fixed weights). How did his cost of living change according to this measure?
Describe a fictional healthcare organization : Describe a fictional healthcare organization: type, size of staff, and amount and type of patients it is able to serve. Establish the need for a system.
Describe current industry trend that has significant impact : Identify the current industry trend that has the most significant impact on your chosen organization's financial performance. Indicate the trend's impact on the financial performance of the organization.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd