Presentation that provides a cost-effective security

Assignment Help Management Information Sys
Reference no: EM133438236

Question: Security Bid Proposal presentation that provides a cost-effective security solution for their problems. Your objective is to win the bid over your competition.

The company has 75 employees and is inundated with security issues. Employees use laptops and smartphones that have remote access to office systems. Your Security Bid Proposal must provide ready-to-implement security solutions. 

Here are 12 common security issues for many small businesses for you to address:

  1. Equipment is disappearing
  2. No building or computer room security
  3. No Acceptable User Policy (AUP)
  4. No malware protection and experiencing attacks daily
  5. No intrusion detection and experiencing intrusions daily
  6. Passwords compromised
  7. There is an Internet connection but no protection and content filtering
  8. Sensitive information is being copied from systems
  9. No automated operating system and application patching
  10. Legacy software and systems
  11. No data backup
  12. If a disaster should happen to the building there are no plans to recover

Your Bid Response Proposal MUST provide solutions for each problem listed above. The solutions you propose should include products and services from real vendors. Search the internet to find them. Ensure that your proposal shows their costs.

Reference no: EM133438236

Questions Cloud

How to incorporate use of aromatherapy : How to incorporate the use of aromatherapy into your own life or Nursing career in the future? or will the use of essential oils affect your future?
What is your account of the number of victims involved : In your opinion, what was the breach about, and what is your account of the number of victims involved
How do the layers of cyberspace interact : How do the layers of cyberspace interact to create a global network that we rely on daily for work, entertainment
Discuss password eavesdropping risks : Discuss Password eavesdropping risks and Analyze how authentication protocols are used in distributed computer systems
Presentation that provides a cost-effective security : Proposal presentation that provides a cost-effective security solution for their problems. Your objective is to win the bid over your competition
What is media product trending : In 3 to 4 sentences, let us know what media product is "trending" in your life and post an image or link to your log that represents your media product.
Identify common social norms that should be used in business : Identify common social norms that should be used in business in Italy, as well as hand gestures and body language that should be avoided or that may cause
What type of design layout does walmart store use : What type of design layout does Walmart store use? (Grid, Racetrack, Free Form etc.) Is it effective for customer flow? (Walmart) What type of fixtures do
Creating a new dependence on the pain medication : Why might some practitioners view prescribing pain medication and anxiolytics to a client diagnosed with a substance abuse disorder as inappropriate?

Reviews

Write a Review

Management Information Sys Questions & Answers

  A description of administrative procedures

A description of administrative procedures - human and process changes; any Changes in Organization policies or enhancements to include training requirements.

  Explain significance of information system security policies

Explain the significance of information systems security policies and the challenges and issues associated with ineffective or nonexistent policies.

  The use of networking and social capital to manage

Develop power points. You power points should contain a minimum of 20 slides (excluding the cover page and reference page.

  Information technology - sdlc waterfall approach

Information Technology - SDLC Waterfall Approach - Why is an accurate and complete requirements definition

  Develop a vulnerability assessment plan

For this assignment, you will need to develop a vulnerability assessment plan. The concepts needed to complete this assignment are found in your reading assignment and in the unit lesson.

  Why would you want to build your own software

A list of three reasons why you would want to Build Your Own software. Write out your reasons in at least 3 paragraphs with details supporting your reasons.

  What are issues that researchers face when collecting data

What types of problems would lend themselves to these kinds of studies? What are the issues that researchers face when collecting data using these designs?

  What company costs can be saved using the new app

How will the mobile ordering app interface with the current point of sale system? How can the company avoid developing a website for each retail outlet? What company costs can be saved using the new app

  What are your thoughts on how security will be controlled

What are your thoughts on how security and privacy will be controlled? We are all quite aware of the impact of information technology on business. Will future changes and new solutions be as visibly impactful or will they become more transparent?

  Explain the key elements of the disaster recovery plan

Threats could include weather, fire or chemical, earth movement, structural failure, energy, biological, or human.

  Write a small executive summary as an abstract

Write a small executive summary as an abstract. Come up with a Problem Statement based on your topic, note it down and discuss it with your lecturer.

  Agile methodologies

Agile Methodologies, A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd