Discuss with your team the types of data

Assignment Help Computer Engineering
Reference no: EM132157446

Question: Considering the Week Two Learning Team collaborative discussion, "Data Types and Risks,"(at the bottom of the instructions) you had with your team, create a PowerPoint® presentation for Ben. Its a requirement to use information from the attached chapter as one of the references for the PPT

The 8- to 10-slide media-rich Microsoft® PowerPoint® with speaker notes should include:

• The main uses for an IT system in Ben's business

• The most common risks associated with this system

• A prioritized list of the risks identified

• Mitigations to handle the risks

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation.

Scenario: Learning Team Collaboration: Data Learning Team collaborative discussion, "Data Types and Risks," use this scenario to create the PPT

• You have been contacted by Mr. Ben Rutherman. Ben owns a custom graphics shop with customers from the business community, as well as from schools, non-profits, and individuals. His brother recently had information stolen from his business, and Ben is very concerned about the safety and security of his business, including his e-commerce website.

• For the next few weeks you will be working on an Information Security Policy for Ben and his graphics shop. This week you need to discuss data types with your team. In Week Three, you will look at Disaster Recovery and Business Continuity. In Week Four, you will look at protecting the data using access controls and authentication. The final security piece will be added in Week Five, managing wireless, cloud, and application security, with the completed project submitted as the Week 5 Individual assignment, "Security Policy Presentation: Final Project."

Discuss with your team the types of data that are stored, accessed, and transferred to others at Ben's graphics shop. Assess the risk to this type of data and ways to mitigate the identified risks.

Reference no: EM132157446

Questions Cloud

Assumption that the alternative hypothesis : In a test of hypothesis, the sampling distribution of the test statistic is calculated under the assumption that the alternative hypothesis is true.
Create robust interaction and dialogue : The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students.
Identify several best practices for manging the project : Identify several best practices for manging the project while managing unexpected risks. Which tools would you use to help manage risks?
Explain your purpose in sending the business plan : Introduce yourself and your venture. Explain your purpose in sending the business plan. Detail the next steps and the potential for your business.
Discuss with your team the types of data : Discuss with your team the types of data that are stored, accessed, and transferred to others at Ben's graphics shop. Assess the risk to this type of data.
Examine lenscrafters value chain : Examine LensCrafters' value chain and evaluate its effectiveness to operations in terms of quality, value creation, and customer satisfaction.
Compute the probabilities associated with finding : Compute the probabilities associated with finding exactly one defect.
Prepare an executive summary based on your analysis : MBA 620 Financial Decision Making Project - Accounting for Managers, University of Maryland University College, USA. Prepare an executive summary
Identify and name one open-source cryptographic library : Identify and name one open-source cryptographic library for each of the following programming languages. Provide a web link to the library doc page.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What kind of potential criminal activities suspect may have

A case description. For example, what kind of suspect you have, and what kind of potential criminal activities the suspect may have committed?

  What is the primary goal of the planning phase of sdlc

What is the primary goal of the planning phase of SDLC? What is the primary goal of analysis phase of SDLC? What is the primary goal of design phase of SDLC?

  Write program to print out bi-connected components of graph

What is the minimum number of edges required to make a bi-connected graph with V vertices? Write a program to print out the bi-connected components of a graph.

  Plot the rate as a function of p for different values of m

Plot the rate as a function of p for different values of M, and discuss the trade-offs involved in selecting larger or smaller values of M.

  Name an example of each type of patterns

There are 1) Creational Patterns, 2) Behavioral Patterns. And 3) Structural Patterns HW 19.1 Name an example of each type of patterns.

  What is the pert variance for the given activity

Given an activity's optimistic, most likely, and pessimistic time estimates of 4, 12, and 18 days respectively, what is the PERT variance for this activity?

  Crowdsourcing in the field of interface design takes tasks

crowdsourcing in the field of interface design takes tasks traditionally performed by specific individuals and spreads

  Question 1 a explain the following terms in digital image

question 1 a explain the following terms in digital image processingi. target-to-source mapping in geometric

  What form of intrusion-detection software do they use

Visit the IT department of a company and ascertain what hardware they use in their computer system's defense. Do they use a hardware firewall in addition.

  How many nanoseconds will it take

How many nanoseconds will it take to complete 120.0 instructions with pipelining? Round your answer to the nearest integer

  Design the application that would output payment coupons

Design the application that would output 12 payment coupons for each of the 15 apartments in each of the 20 buildings.

  Cache simulator lab

Find a way to simulate different cache architectures through premade address accessing files and this task includes modifying the associativity

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd