How will your security team use your proposed technology

Assignment Help Management Information Sys
Reference no: EM131719914

Question:

Imagine that you are team leader of a security assessment team who has been hired to conduct a risk assessment for a research and development company with several government contracts. The organization has numerous buildings located across the city. Your team has identified communication and collaboration problems between team members when conducting security assessments. Team members state that the paper-based inspection checklists are hard to keep organized in the field when conducting inspections, and they would like to use an electronic version of the checklists. However, laptops are too bulky for field use. They state that team members are often located in different buildings and possibly different areas of a city when conducting assessments, and they would like to use a mobile technology that will allow them to communicate and collaborate with each other on security assessments. They would also like to have access to inspection reports located at the home office while conducting inspections in the field.

Create a proposal that identifies two types of mobile technologies that utilize the Internet and the World Wide Web to improve the communication and collaboration efforts of the team. You may choose how to create your proposal but must get faculty approval for your method. If you choose a paper it must be 700 to 1,050 words.

Answer the following questions in your proposal:

How will your security team use your proposed mobile technology to communicate between teams, access inspection reports, and improve collaboration?

How could this mobile technology positively and negatively affect the organization''s security?

In what ways might using mobile technology instead of paper-based checklists positively affect the process of completing a security assessment? In what ways might the process be negatively affected?

How might the use of the Internet and the World Wide Web on mobile devices affect information security in this organization?

Format your assignment consistent with APA guidelines.

Verified Expert

The report is a proposal to use mobile technologies as alternative to existing laptop usage for field work requirements. The report discusses the advantages and disadvantages of using the technology. Also there is discussion regarding the information security lapses while using mobile technology. The presentation is provided with an introductory overview of the scenario, the practical problems in the usage of current devices followed by proposed alternatives, Further the report presents with information on specific criteria that discusses in detail the diverse aspects of the proposed technology.

Reference no: EM131719914

Questions Cloud

Estimate the true cost of a gallon of milk : What is the 95% confidence interval to estimate the true cost of a gallon of milk
Determine the public morality : Nobody has ever proved that immoral behavior by elected officials erodes public morality. Therefore, we must conclude that such behavior does not erode public.
Discuss in writing the concept of plate tectonics : Discuss in writing the concept of plate tectonics, and the world's major plates
What may be some long term impacts of the crime : What may be some long term impacts of the crime? Who might hold the victim responsible for his/her victimization and why?
How will your security team use your proposed technology : How will your security team use your proposed mobile technology to communicate between teams, access inspection reports, and improve collaboration
Meet the added electric demand : Suppose that a certain community has power needs for an additional 350 kilowatts of electricity and can anticipate average winds of 15 mph.
Discuss calls to reform the criminal justice system : there have been calls to reform the criminal justice system. Many people blame the police for the current state of affairs
Estimates the average age of the fleets : Based on FAA estimates the average age of the fleets of the 10 largest U.S. commercial passenger carriers is 13.4 years with a standard deviation of 1.7 years.
Define-freedom of speech is guaranteed by first amendment : Freedom of speech is guaranteed by the First Amendment. Therefore, your friend was acting within his rights when he shouted "Fire! Fire!"

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a database schema that supports the companys business

Create a database schema that supports the company's business and processes. Explain and support the database schema with relevant arguments.

  Review the various project management frameworks

Compare the listed activities with the processes described in Figure 3.2 Process - flow of Requirements Engineering in Chapter 3 of the text.

  Determine the observed time for the pre post exam process

Determine the observed time for the pre - post exam process. -  Determine the normal time for the pre - post exam process.

  Compare and contrast a business case and a business plan

For this assignment, I want you to compare and contrast a Business Case and a Business Plan. Include definitions and applications. Also please explore business case templates.

  Technological specifications for implementation

In what other ways might the company use the Internet for its own benefit - Prepare a list of technological specifications for implementation

  How long does the crime occur before it is discovered

What do you think? Is the propensity to engage in unlawful conduct systemic; that is, is it inherent in a competitive, free-enterprise economic system in a society oriented toward the individual Or was criminal behavior caused solely by "bad apple..

  Determine the single most paramount consideration

Propose three actions that IT professionals should undertake. Determine the single most paramount consideration, and justify your selection.

  The system development methodologies

What steps would you take to align the IS functions of an organization with its organizational mission?

  Analyze costs and schedules with regard to deliverables

From the first and second e-Activities, select one (1) tool that you would use in order to analyze costs and schedules with regard to deliverables and / or work packages for a project of your choice

  Describe database backup and planning

Describe Database Backup and Planning.Highlight the importance of the integration of both Database Backups and Disaster Planning and the impact if both are not effectively executed.

  What are the best hardware security options

what are the best hardware, software, networking, and information security options for addressing your client's business needs?

  What is google trends

Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years in the areas of virtualization, security, hardware, network management tools, software defined networking, and w..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd