Describe how the selected technology provides protection

Assignment Help Management Information Sys
Reference no: EM133388049

Scenario

For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians' cell phones via the Bluetooth connection.

Prompt

Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your feedback on this assignment into your final, polished project submission in Module Seven.

You must address the critical elements listed below.

I. Personnel or human factor trend

Select a personnel or human factor trend and discuss the following critical elements:

  • Describe how the trend or strategy provides protection to an organization.
  • Defend the trend as a credible solution based on your analysis of the threat model for the scenario.

II. Data protection strategy or technology trend

Select a data protection strategy or technology and discuss the following critical elements:

  • Describe how the strategy or technology provides protection to an organization.
  • Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.

III. System protection trend

Select a technology in one of the following areas:

?  Network protection technologies

?  Endpoint/server protection technologies

?  Software code protection strategies and technologies

For your selected technology, discuss the following critical elements:

  1. Describe how the selected technology provides protection to an organization.
  2. Defend the technology as a credible solution based on your analysis of the threat model for the scenario.

Reference no: EM133388049

Questions Cloud

What laws currently protect it in united states and europe : What laws currently protect it in the United States and Europe? Be sure to give examples of what laws are covered. Also, be sure to properly cite your sources
How did religious limit ability to contain ebola virus : How did culture and religious beliefs limit the ability to contain the Ebola virus? How did the workers overcome this belief in order to contain the epidemic?
What lessons can we consider about what may cause poverty : What lessons can we consider about what may cause poverty and what can be done to address economic inequality in America?
Explain how you can apply it to your future career : How were your personal biases challenged throughout this course when working on police brutality? What information was new to you, and how will that new
Describe how the selected technology provides protection : Describe how the selected technology provides protection to an organization and Defend the technology as a credible solution based on your analysis
Describe unique contributions of declaration of helsinki : Describe the unique contributions of the Declaration of Helsinki, the Belmont Report, and the Nuremburg code. Provide specific examples for each in detail.
What are the practical problems that the dental practice : What are the practical problems that the dental practice will face in addressing these unfavorable reviews and Can they use tort law to force Yahoo! to take
Describe your personal reasons for applying : Describe your personal reasons for applying. This part of the essay can be written in the first person. Connect your personal reasons to a social problem.
Describe the results in detail and explain how you reached : Describe the results in detail and explain how you reached your conclusions and Estimate costs in people ( It staff and users), hardware and equipment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine the potential reasons why the security risks

Suggest what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the article refers. Propose a plan that the U.S. government could use in order..

  Create a project to use as the basis of your plan

You should have good access to the people and other information related to the organization or system because this will be an important part of the process.

  What are the uses for indexes and registers with health data

What procedures should a healthcare worker do when handling medical records in healthcare facilities? Why is this important?

  Analyze the implication of the affordable care act

Analyze the implication of the Affordable Care Act on your decision to purchase insurance.

  Create presentation about cloud-based productivity suite

Create a 6- to 10-slide presentation about a cloud-based office productivity suite, identifying how each of the above needs can be met.

  Identify and discuss the required technology stack

COIT 20253 Assignment - Creating a Big Data Strategy. Identify, create and discuss Business Strategy for a Big Data use case

  Develop plans for alternate site relocation

Develop plans for alternate site relocation, and develop an estimated monthly budget for the alternate site operations. Detail out the Site Resumption Strategy and the time needed to become fully operational. Provide summary level budget informatio..

  Determine if you think it would be useful to an organization

Using a Web browser, search for "incident response template." Look through the first five results and choose one for further investigation.

  What kinds of coverage were given or shown about the event

What kinds of coverage were given or shown about the event? What legal or ethical issues were apparent in the coverage of the event?

  Analyze the network diagram for pureland wastewater

Analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements.

  Research and evaluate security testing software

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review

  Importance of governance and compliance to employees

Given the need for governance and compliance within the workplace, suggest two (2) methods that an organization could employ to distill the importance of governance and compliance to employees

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd