Describe strategy provides protection to an organization

Assignment Help Management Information Sys
Reference no: EM133403264

Assignment:

Scenario

For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians' cell phones via the Bluetooth connection.

Prompt

Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your feedback on this assignment into your final, polished project submission in Module Seven.

You must address the critical elements listed below.

I. Personnel or human factor trend

Select a personnel or human factor trend and discuss the following critical elements:

  • Describe how the trend or strategy provides protection to an organization.
  • Defend the trend as a credible solution based on your analysis of the threat model for the scenario.

II. Data protection strategy or technology trend

Select a data protection strategy or technology and discuss the following critical elements:

  • Describe how the strategy or technology provides protection to an organization.
  • Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.

III. System protection trend

Select a technology in one of the following areas:

? Network protection technologies

? Endpoint/server protection technologies

? Software code protection strategies and technologies

For your selected technology, discuss the following critical elements:

1. Describe how the selected technology provides protection to an organization.

2. Defend the technology as a credible solution based on your analysis of the threat model for the scenario.

Reference no: EM133403264

Questions Cloud

Describe the process you would take to investigate alert : If you were responding to Malicious User Agent Strings as a SOC Analyst describe the process you would take to investigate the alert.
How does the diagnosis relate to the payment for facility : What is the IPPS? When did it take affect? What facilities does it cover? What is the MS-DRGs? How does the diagnosis relate to the payment for the facility?
Explain the details of user policy creation in organizations : Make a report detailing user access policies based on research. Explain the details of user policy creation in organizations.
Create a own mobile app ordering system : The CEO decided that he needs as soon as possible a website where people can place their orders through the mobile app.
Describe strategy provides protection to an organization : Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One.
How can the nist cybersecurity framework : How can the NIST cybersecurity framework can be applied to the company Anthem?
What cloud computing technology needs exist : Propose a strategic solution to the problem by leveraging the integration of IaaS, PaaS, SaaS, with an emphasis on networking and storage.
Calculate the annual cost to establish a cloud system : Deliverable 1 will include a share link to calculations displaying the steps you took to calculate the annual cost using the free Azure pricing calculator tool.
Discuss the different categories of security controls : Discuss the different categories of security controls and give examples.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Establishing trust relationships between the two domains

Write a six to eight (6-8) page paper in which you: Explain the key considerations behind establishing trust relationships between the two (2) domains. Suggest a method for consolidating Core Network services

  Write a comparison of the agile tools for scrum

If there are multiple certifications in each organizations, compare the ones that are most relevant to other certifications.

  Describe enterprise architecture

Using the DMV case study provided, determine how an EA could be used to help the DMV accomplish the objectives stated explicitly and implicitly in the case study

  How will use a relational database to store data

Multidimensional Analysis and Data Versus Information - How will use a relational database to store data, be specific.

  Develop information technology systems

Developing Information Technology Systems - Why do organizations develop IT systems?

  How analytics and cloud technology could align with process

Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize.

  What part of the contingency planning process came up

What part of the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming have been prevented?

  What is the function of a door in a physical security system

Where should physical barriers be located in and/or around a facility?What is the function of a door in a physical security system?

  Which methodology would you want adopt for the company

Which methodology would you want adopt for the company you work for? Explain why and justify the choice

  Describe two situations that involve delegating work

Describe two situations that involve delegating work to other people. The first is a positive example that worked well and the other is one that did not. Analyze the reasons for success and failure of the two examples using the information about trus..

  How would organization to prevent these natural disasters

How would you help your organization to prevent these natural disasters from severely impacting your records?

  Describe how the team successfully collaborated

Describe how the team successfully collaborated to develop a cohesive and comprehensive solution. Specify benefits to Verbania resulting from this solution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd