Identify all it assets and enter a description

Assignment Help Management Information Sys
Reference no: EM131812381

Assignment

1. Refer to the "Case Scenario: Premiere Collegiate School" handout. Based on your discussion of this scenario in class, create an asset list in order of importance of each asset and then write an executive summary report:

1. Identify all IT assets and enter a description of each into an asset identification and classification table, similar to the following.

2. IT Asset DescriptionIT Infrastructure DomainPrivacy Data ImpactAssessment

[Critical-Major-Minor]Quantitative Value ($)

3. Indicate in which of the seven domains of a typical IT infrastructure the asset resides.

4. Indicate if the asset accesses customer privacy data or contains customer privacy data.

5. Classify the IT asset as Critical, Major, or Minor.

o Critical: Generates revenues or represents intellectual property asset of organization
o Major: Contains customer privacy data.
o Minor: Required for normal business functions and operations.

9. Assign a quantitative value ($) to each asset. Consider the measurable characteristics of each asset, such as the original cost and cost of replacement.

10. Prioritize the order of the assets in the table based on their importance to the school. When prioritizing assets, consider why one asset should be protected more than another.

11. Use the information in the table to create an executive summary that explains your list. This executive summary will be presented to the school's board of directors.

12. Required Resources

Text Sheet: Case Scenario: Premiere Collegiate School (ts_premiercollegiateschool)

Submission Requirements

o Format: Microsoft Word
o Font: Arial 12-point size, Double-space
o Citation Style: Follow your school's preferred style guide
o Length: No more than 500 words
o legal_ts_casepremiercollegiate.docx

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Reference no: EM131812381

Questions Cloud

Examine combination of batteries falls within desired range : A certain system we have designed needs to be powered by a 24-V dc supply. Available to us in our lab are each of the following types of batteries.
Cash flow from operating activities : During 2012, the company reported the following items that affected cash. Indicate whether each of these items is a cash flow from operating activities
Compute the firm predetermined overhead rate : a. Compute the firm's predetermined overhead rate. b. How much overhead was applied to 2016 production?
What is the difference between ifrs revenues : What is the difference between IFRS Revenues and United States GAAP Revenues
Identify all it assets and enter a description : Identify all IT assets and enter description of each into an asset identification and classification tabler. Classify the IT asset as Critical, Major or Minor.
Calculate the tax liability of a taxpayer : 1. Suppose the tax schedule is T = - 3000 + 0.3Y, where T is the amount of tax paid when the taxpayer's income is Y.
Explain how the methods for financing support solution : Discuss how your recommended solution will improve population health, and how you will communicate this information to the general populace.
Obtaining probability of a birthday-birthhour match : Considering that only 1/24 of pairs of people born on the same day were born at the same hour, why isn't the answer to (b) approximately 24·23?
Technologies has been analyzing its operating costs : Tyler Technologies has been analyzing its operating costs. The practical capacity of the plant is 50,000 units. At this level of output, costs are as follows

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss possible risk mitigation strategies based on finding

Discuss possible risk mitigation strategies based on your findings for it security risk management and discussions in case study 1 & 2.ensure your references page contains at least 6 sources. Make sure you are using at least two (2) ADDITIONAL academ..

  Using tips in creating an effective powerpoint

using tips in creating an effective powerpoint presentationcollin macgibson president of on-time technology products

  Use of the internet and collaborative tools

Discuss with your team how the bookstores use the Internet and if they use collaboration technology. The use of databases and data communication technologies and The use of the internet and collaborative tools

  Analysis and evaluation of a users message

Analysis and evaluation of a user's message is likely to occur during which type of listening

  Explain about end-user development tools

End-user development tools - The pitfalls of the end-user development tools can sometimes outweigh its advantages. Do you agree?

  Impact of cloud computing on business

Management Information System and Business Decision Making - The impact of Cloud Computing on business - defines a topic with some factual information

  Analyze types of organizational and computer architectures

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..

  Supply chain management - private vs public

supply chain management - private vs. public sectordifferentiate between the principles and practices of purchasing and

  Discuss about the critical fundamental skills from the it

Create a presentation containing eight to ten presentation slides including Introduction, Conclusion, and Reference slides.Include speaker notes with each slide.Note. Be sure to include supportive graphics and appropriate backgrounds and styles. Al..

  Integrated software application for patient records mgmt

Assume that you have been asked to procure a new integrated software application for patient records management.

  What was it about the second example that did not work

Provide an example of a situation in which a leader used one of these theories to successfully motivate you.

  Dail-up technologyis dial-up a dying technology if so how

dail-up technologyis dial-up a dying technology? if so how will companies like aol survive? if not what do you envision

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd