Identify all it assets and enter a description of each

Assignment Help Management Information Sys
Reference no: EM131818099

Assignment

1. Refer to the "Case Scenario: Premiere Collegiate School" handout. Based on your discussion of this scenario in class, create an asset list in order of importance of each asset and then write an executive summary report:

1. Identify all IT assets and enter a description of each into an asset identification and classification table, similar to the following.

2. IT Asset DescriptionIT Infrastructure DomainPrivacy Data ImpactAssessment

[Critical-Major-Minor]Quantitative Value ($)

3. Indicate in which of the seven domains of a typical IT infrastructure the asset resides.

4. Indicate if the asset accesses customer privacy data or contains customer privacy data.

5. Classify the IT asset as Critical, Major, or Minor.

o Critical: Generates revenues or represents intellectual property asset of organization
o Major: Contains customer privacy data.
o Minor: Required for normal business functions and operations.

9. Assign a quantitative value ($) to each asset. Consider the measurable characteristics of each asset, such as the original cost and cost of replacement.

10. Prioritize the order of the assets in the table based on their importance to the school. When prioritizing assets, consider why one asset should be protected more than another.

11. Use the information in the table to create an executive summary that explains your list. This executive summary will be presented to the school's board of directors.

12. Required Resources

Text Sheet: Case Scenario: Premiere Collegiate School (ts_premiercollegiateschool)

Submission Requirements

o Format: Microsoft Word
o Font: Arial 12-point size, Double-space
o Citation Style: Follow your school's preferred style guide
o Length: No more than 500 words

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

3. Institution Release Statement.

Reference no: EM131818099

Questions Cloud

Compute inventory turnover for each company : The cost of goods sold computations for Target Company and Caesar Company are shown below. Compute inventory turnover for each company
Types of risk that are relevant in capital budgeting : What are the three types of risk that are relevant in capital budgeting? What is sensitivity analysis?
Identify two social groups or populations : Provide an overview of the similarities and differences between the two groups and how a social worker would engage with them differently.
Pfizer bares belated celebrex study : Pfizer Bares Belated Celebrex Study" reported in 2004 that "Pfizer Inc. revealed it completed a study four years ago that links its painkiller Celebrex
Identify all it assets and enter a description of each : Identify all IT assets and enter a description of each into an asset identification and classification table. Classify the IT asset as Critical, Major or Minor.
Determine the company most profitable sales mix : Selling prices and variable costs per unit to produce the products follow. Determine the company's most profitable sales mix
Defining the client or the community population : The plan must have an introduction defining the client or the community population and a summary that identifies the differences.
Ugly kids get less attention from parents : Ugly Kids Get Less Attention from Parents," reported in the University of Alberta's online medical news site, states that a researcher
Aware of when negotiating exclusive contracts : In two paragraphs explain what should parties to a contract be aware of when negotiating exclusive contracts?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What do the analysts say about each of the major products

ITEC842: Enterprise Management - What do the analysts say about each of the major products or services identified in Question 1.

  Eliminate an operating segment with net loss

Operational Information for investors - what circumstances would it be disadvantageous to eliminate an operating segment with net loss?

  Create a page memo to document your logical design

Discuss the process you went through to select the appropriate data types, primary and foreign keys, and other constraints .

  Discuss some of the ias strategies and technologies

Explain how you would approach a recommendation that attempts to discourage or reject the use of some of these tools.

  Use ip addresses to describe your configuration

Research each of the devices you chose and provide a basic configuration you would use in your network. Use IP addresses to describe your configuration.

  Present and future strategies and business opportunities

Discuss strategies, risks, strengths, weaknesses, opportunities and threats of using IT systems in a specific business at a management level. Consider issues such as short-term and long-term decisions for present and future strategies and business..

  Wal-marts use of technology in logistics and does wal-mart

wal-marts use of technology in logistics and does wal-mart use it effectively in its logistical operations?it discusses

  Discuss about the health information management system

Determine what you believe to be the most critical factor for the successful implementation of a health information management system. Justify your response.

  The challenge for management has transitioned from a simple

over the twentieth century the ability to process information in terms of labor units has improved by a factor in the

  What your business should consider in regard to security

Explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed technology.

  Analyze the term white collar crime

How has the meaning of this phrase developed and changed through the years since it was first introduced by Edwin Sutherland in 1939.

  Describe the step used to log into the strayer oracle server

Use the print screen option on a keyboard or a snipping tool to capture screen shots of your telnet session into the Oracle server. Note: The graphically depicted solution is included in the required page length.Briefly describe the steps used to ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd