Discuss technological and financial risks in detail

Assignment Help Computer Engineering
Reference no: EM132054160

Qusetion: Read the following scenario:

Company M designs manufacture and sells electronic door locks for commercial buildings. The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues. Over 5,000 wholesalers and distributors access the Company M business-to-business (B2B) Web site to place orders and track fulfillment.

In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones. In addition, the company dealt with four serious malware events that originated from an unpatched server, an insecure wireless network used in the manufacturing plant, an insecure remote connection used by a sales person, and a headquarters employee who downloaded a game from the Internet to her workstation. Three of the malware incidents resulted in files that were erased from the company's sales database, which had to be restored, and one incident forced the B2B Web site to shut down for 24 hours.

You are tasked to give a presentation to the CEO and other IT management. Please ensure that the presentation addresses the following questions:

• Identify and discuss technological and financial risks that Company M faces.

• Which domains of the IT infrastructure were involved during the four malware events?

• What types of security policies should Company M institute to mitigate those risks?

• Submission Requirements

• Format: Microsoft PowerPoint Presentation or Prezi Presentation

• Ensure the presentation has content, images/graphics, theme and easy-to-read text

• Citation Style: APA format (include at least 2 APA resources)

• Length: 10-20 slides

Reference no: EM132054160

Questions Cloud

Why do organization have information deficiency problem : Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.
Realization of an appropriate curriculum for all children : Identify the importance of the teacher's professional freedom in the realization of an appropriate curriculum for all children?
Cost of equity using capm and dividend growth model : Calculate the cost of equity using the CAPM and the dividend growth model. Comment on the results.
Homeopathy finally gets some respect : Catherine Guthrie, "Homeopathy Finally Gets Some Respect," on how homeopathic remedies that don't contain even one molecule of active ingredient
Discuss technological and financial risks in detail : Company M designs manufacture and sells electronic door locks for commercial buildings. The company has approximately 1,500 employees in three locations.
Calculate terminal value of the tax shield : Calculate the terminal value of the tax shield given the following information. The cost of debt is 9% while the cost of equity is 12%.
Rely on homeopathic remedies : Millions of people across the world use and rely on homeopathic remedies. Today there are a rapidly growing number of conventional medical doctors
International academy classical homeopathy : George Vithoulkas, International Academy Classical Homeopathy (note bene: this one has quite a few fallacies in it, so take your pick).
What is chase manhattan cost of preference shares : Its cost of debt is 9 per cent, before taxes. If the tax rate is 30 per cent, what is the WACC? What is Chase Manhattan's cost of preference shares?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd