Explain the current state of web application security

Assignment Help Management Information Sys
Reference no: EM131884547 , Length: 3

Assignment : Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.

RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website.

However, RollinOn has had some internal security issues. RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet.

The Web application development team has increased in size and is also in need of sound security practices.

There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company's web presence and lack of access control.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

Briefly explain the current state of Web application security to the Board of Directors.

Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.

Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:
8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

Analyze the impact of the Internet and Web applications on the business world.

Analyze the evolution of social media, social networking, and the ethical issues they raise.

Compare and contrast Web-based risks.

Analyze common Website attacks, weaknesses, and security best practices.

Reference no: EM131884547

Questions Cloud

How can dangling reference arise during execution : What is a dangling reference? How can it arise during execution? Write a report illustrating how array manipulation facilities are richer in Ada than in Pascal.
Prepare a pension worksheet for the pension plan : The interest (settlement) rate applicable to the plan is 10%. Prepare a pension worksheet for the pension plan for 2013 and 2014
Discuss possible strategies adopted by programming language : Discuss the possible strategies adopted by a programming language to bind a finite mapping to a specific finite domain.
How can you define task types in ada : How can you define task types in Ada? What are the main differences between protected types and task types?
Explain the current state of web application security : Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets.
How to implement p and v on semaphores by using the test : Describe how to implement P and V on semaphores by using the test and set primitive in a busy wait scheme.
Compute the amount of contribution margin : Compute the amount of contribution margin that will be obtained per hour of labor time spent on each product
Explain the major expectations an employer would have of you : Choose any one (1) career within and describe the path you could take. Explain the major expectations an employer would have of you in that career
At what amount should the land be recorded : Donner Company is selling a piece of land adjacent to its business premises. An appraisal reported the market value of the land to be $220,000.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the rapid advancements in technology

Given the rapid advancements in technology in developed countries and fast pace of globalization, it is not possible to bridge the global digital divide.

  How incidents will be handled to support their services

Write a 2- to 3-page paper that addresses the problem with management structure, and explaining the process of handling the incident.

  How globalization affect burtons target distribution system

How does globalization affect Burton's target distribution system?- How does Burton use the Internet to improve the efficiency of its distribution system?

  Provide justification for the proposed solution

You will provide justification for the proposed solution based on the research results. Please see the attachment ip4_ref.doc; for example. You will also include a project plan for the proposed solution with a time line, required resources, and est..

  What is your plan to acquire the additional skills

CompTIA A+: What is your plan to acquire the additional skills or training that you identified? What other skills or training have you identified that will be necessary for advancing your career? Give two examples.

  Efficiencies between operating departments

Would implementing an enterprise resource planning system help streamline operations and achieve efficiencies between operating departments? What major concerns need to be addressed

  Interpeting questionwhy in your opinion did the term web 20

interpeting questionwhy in your opinion did the term web 2.0 emerge? what is the difference in the way the web is used

  Information technology and capital investment

Information Technology and Capital Investment - main difficulty in measuring the return on such an investment falters because of the inability to effectively and accurately quantify the benefits and their related value?

  Write about one specific educational experience from past

Write about one specific educational experience from your past in which you addressed a fear and overcame it and how you succeeded in this process.

  Do you agree that mining physician data should be illegal

Do you agree that mining physician data should be illegal - why or why not? As a patient how do you feel about pharmaceutical companies mining your doctor''s data?

  What are privacy laws related to information technology use

What are the privacy laws related to Information Technology use and how do they impact you personally? The Apple vs. FBI controversy over unlocking the iPhone.

  What are the advantages of having a centralised database

HC1041 IT for Business Assignment. Case study -- Blooming with Technology. What are the advantages of having a centralised database

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd