Reference no: EM132545723
You determined there is a market Gap in Cyber Security. Research and gather the following information for the company you determined.
1. Identify opportunities in the market. Where is the gap in the current industry and how will your product or service fill that gap?
2. How will you obtain funds for the project? (Are you asking for funds or obtaining from another source?)
3. How much funding is required to start your proposed company?
4. What resources are required?
o Hardware
o Software
o Other support IT to get the systems up and running (networking, database, etc....)
o People
o Equipment
o Office Space
o Etc....
5. What organizational learning concepts and theories that will be used?
6. How will your company integrate IT Resources?
7. What type of teams will be required? (Virtual, local Teams?) Why?
8. What ethical and legal implications will need to be addressed?
9. What cyber security and privacy of information will need to be managed?
10. Identify some of the best practices that your team will implement in the organization and why
11. What is the time frame to launch?
Hypothetical situation in which legitimate organization
: Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
|
Technology is advancing at pace
: We are living at a time when technology is advancing at a pace that some believe is too fast for humans to truly understand the implications these advances
|
ERM Approach
: Explains the City of Edmonton's ERM process. Chapter 18 explained ERM and Bluewood Chocolates.
|
AES And DES
: Compare AES and DES. For each of the following elements of DES, indicate the comparable element in AES or explain why it is not needed in AES.
|
Market Gap in Cyber Security
: Identify opportunities in the market. Where is the gap in the current industry and how will your product or service fill that gap?
|
How to design-organize-implement and maintain it security
: Describe one security principle in which YOU think policy writers should keep in mind when developing security policies.
|
Analytics software
: In the Group Discussion board for Analytics Software, discuss the following software (do an Internet search for information about these products
|
The correctional sergeant dilemma
: Was Sergeant Rick wrong in referring the correctional officer for discipline? How could he have handled it differently?
|
Challenges facing the juvenile justice system
: Discuss the challenges facing the juvenile justice system as it seeks to respond to a perceived need to pursue "adultification" of juvenile criminal behavior
|