Establish the existing threats and risks to the security

Assignment Help Computer Engineering
Reference no: EM132085412

Question: Read the scenatio from the attached file and complete teh following tasks:

Tasks: You have been engaged to provide a risk assessment for the planned moves to SaaS application offerings.

You are to write a report that assesses the risks to the charity for just their planned moves in the HR area:

1. Consider the data and information that the charity holds on its employees in the current HR system.

• Establish the existing threats and risks to the security of that data and information contained in the in-house HR database.

• Are there any additional risks and threats to employee data that may arise after migration to an SaaS application?

• Assess the resulting severity of risk and threat to employee data.

2. Consider the privacy of the data for those employees who will move to an SaaS application.

• Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database.

• Are there any additional risks and threats to the privacy of the employee data after migration to an SaaS application?

• Assess the resulting severity of risk and threat to the privacy of employee data.

3. What are the threats and risks to the digital identities of charity employees from the move to SaaS applications?

4. Consider the operational solution and location(s) of the SaaS provider for HR management. Does either the operational solution, or the operational location, or both, increase or mitigate the threats and risks identified for the security and privacy of employee data?

5. Are there any issues of ethics, data sensitivity or jurisdiction that should be considered by the charity?

You are to provide a written report with the following headings:

• Security of Employee Data

• Privacy of Employee Data

• Digital Identity Issues

• Provider Solution Issues

• Data Sensitivity

As a rough guide, the report should not be longer than about 5,000 words

Information related to above question is enclosed below:

Attachment:- Scenario.rar

Reference no: EM132085412

Questions Cloud

What is the accounting rate of return for manhattan store : Judy Blue, CEO of the clothing store All Blue, is planning to open a new store in Manhattan. What is the accounting rate of return for the Manhattan store
Develop proposed improvements to theory and practice : Develop proposed improvements to theory and practice in software management. Apply project management techniques to manage resources and issues in software.
Complex adaptive system at the time of closure : How effective was Freeman-Brown as open system at time of the closure? How effective was Freeman-Brown as a complex adaptive system at the time of closure?
Compute basic and diluted EPS : During 2013, Quattro entered into the following transactions relating to shareholders' equity. Compute basic and diluted EPS for 2013
Establish the existing threats and risks to the security : Establish the existing threats and risks to the security of that data and information contained in the in-house HR database.
Prepare a statement of comprehensive income : The company accounts for its investments in accordance with IAS 39. Prepare a statement of comprehensive income. Ignore income tax and EPS
Past eighteen months due to the recent financial crises : Your employer has been going through many challenges this past eighteen months due to the recent financial crises.
Calculate the reaction order : Calculate the reaction order (solve for a, b, and c in the equation below) for X, Y, and Z based on the following empirical rate equation:
Prepare entries to record the sale of the copiers : Prepare entries to record (1) the sale of the copiers and (2) the related warranty costs, assuming that the accrual method is used

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design algorithm for drawing general trees that generalizes

Design an algorithm for drawing general trees that generalizes the inorder traversal approach for drawing binary trees.

  Compose two announcements advertising the event to be

social media can be a powerful tool to help you get the word out to a wide audience in a relatively short amount of

  Create object called abc by assigning the number three

Create object called "abc" by assigning the number 3. Create different vectors ("a" is numeric, "b" is character and "c" is logical). List all the objects in the current session. Create vector "x" with the values {4, 4, 5, 6, 7, 2, 9}.

  Direct mapped cache

A direct mapped cache comprises of the 4 blocks of 16 words per block. Main memory consists of 32K blocks of 16 words each.

  Describe in detail the benefits of the system

Describe the complex email system located on slide 12 from the slide deck from week 6 titled "Example of a Complex Hybrid System." (It is also attached).

  Optimizing pseudocodesstudy how pseudocodes can be

optimizing pseudocodesstudy how pseudocodes can be optimized to improve their efficiency.in part 1 you will complete

  Define the work performed by a parallel algorithm

Define the work performed by a parallel algorithm. When can we say that a parallel algorithm is work-efficient with respect to another algorithm?

  Programming project comprises writing a program that

programming project involves writing a program that computes the average salary for a collection of employees of

  What are the advantages of using erp

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.

  List and sketch six of the common stock shapes

List and sketch six of the common stock shapes. What is the difference between roughing and finishing machining operations?

  Which state requires greater duties of the tenant

Write a minimum of two (2) pages comparing and contrasting the tenant rights and duties of two states; one state should be your home state and the other is a state of your choosing. Identify which state is your home state and answer the followign q..

  Design assumptions that control electronic circuit systems

The central bank has a vault controlled system for nine (9) vaults in its care. An ant-theft system is put in place to protect the vaults. Show the design assumptions that control all nine (9) VAULT electronic circuit systems as one integrated circu..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd