Develop plans to implement corporate-wide information

Assignment Help Management Information Sys
Reference no: EM132092847

Required Deliverables

1.) Project Proposal Outline due

2.) PowerPoint Presentation due

3.) Project Proposal Final report and Revised Presentation

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security.

The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet named "Integrated Distributors Incorporated" (Project.TS1.doc) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries.

Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure-IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for the project-consider hardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.

Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Reference no: EM132092847

Questions Cloud

Examine the processing hardware requirements : Examine the processing hardware requirements for both the HD-DVD and Blu-ray. Compare and contrast the similarities and differences of each.
Evaluate the issues raised from the carlson san mixing : Compare the pros and cons of consolidating data on a SAN central data facility versus the dispersed arrangement it replaces.
Explain why you should always search the free space : Explain why you should always search the free space and slack space if you suspect a person has deliberately deleted files or information.
Advise stefan and melissa on their criminal liability : Advise Stefan and Melissa on their criminal liability, if any. Do NOT discuss liability under the Protection from Harassment Act 1977
Develop plans to implement corporate-wide information : User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security.
Protected speech under the constitution : Do you think that letters like those sent by Shapero should be protected speech under the Constitution? Why or why not?
Has your awareness of physical security increased : What has this course prepared you for? Has your awareness of physical security increased? if so, how.
What is the common theme running : What is the common theme running through all American law-administrative, civil, and criminal?
Determine the impact of testing activities : Explain the necessity of practicing the DR plan. Describe the different kinds of tests that cann be performed. Explain reasons for testing.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Contrast the agile principles with the typical software

Contrast the Agile principles with the typical software development practices found in the traditional Waterfall methodology.

  Create the necessary diagrams through the use of graphics

Select a requirement specification technique that you would use to state the requirements of this software system and explain the reasons for the selection.

  Why are graphs and charts used to represent information

why are graphs and charts used to represent information? whwhy are graphs and charts used to represent information?what

  Description of information systemsgive a specific example

description of information systemsgive a specific example of how a company illustrates the three key principles of good

  Write a job description using the appropriate format

Review course material on Job Descriptions found in this week's PowerPoint titled "Human Resources Management."Skim through sample job descriptions in the packet, "Sample Position Descriptions."Review the Job Description for "HIM Administrative Assi..

  Show the common business practices

Common Business Practices - Human resources needs to be able to track employees from recruitment to retirement, including roles, salary, compensation, benefits selected, annual reviews, competencies, skills and training taken.

  A waterfall approach to portfolio management

Evaluate the differences and similarities between a waterfall approach to portfolio management and an Agile approach to portfolio management.

  Discuss the purpose and goals of the project

Reach consensus about (or impose) a structure, make sure everyone in your group signs on to your decision making process. Get each member's signature on a document that states individual responsibilities to the group and the consequence for not me..

  Objectives and goals about australian hardware

you have to do an introduction, objectives and goals about Australian Hardware according to the template - Analyze qualitative and quantitative data according to the template

  Define threat and vulnerability and safeguard and target

Define threat, vulnerability, safeguard and target. Support you answer with examples.

  Identify routes whereby one can optimize net value creation

Synthesize an improvement on time estimation and management by combining your learning up to this point and by making use of further literature.

  What example of this vulnerability category did you find

Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty).What example of this vulnerability category did you find?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd