Researched information security standard use by organization

Assignment Help Management Information Sys
Reference no: EM131333711

Assignment

Overview - For the first project, you researched the impact of legislation on your selected organization information security program. For the second project, you researched information security standards used by your selected organization. For the third project, you created a sample cyber security profile addressing the security posture of your selected organization. This final project incorporates the results from the first three projects into a final security analysis. For this final project, you will create an executive summary presentation describing your selected organization's security posture and your recommendations for improvement. You will also write a memorandum outlining your findings and your recommendations. Think of this assignment in terms of your own job. Apply the same standards and professionalism you would use for your superiors.

Learning Objective - After completing this project, students will be able to create an executive level presentation, 2) write an executive level memorandum, and 3) combine seven weeks of learning material into a final product.

Media - Students will use the Internet, Microsoft PowerPoint, and Microsoft Word. Students will utilize their first three projects and all learning material from the past seven weeks.

Deliverables - There are two deliverables for this project. Submit your presentation and memorandum to the appropriate assignment area by the due date.

1. Your final presentation should be between 15 - 20 pages. Your executive summary presentation, at a minimum, should 1) cover the impact of legislation on your organization (3-4 slides), describe the information security standards applicable to your organization (3-4 slides), and 3) summarize the key elements of your organization's cyber security profile (findings/recommendations) (3-4 slides). You should also have a cover slide, an agenda slide, a summary/conclusion slide(s), and a reference slide (using proper APA guidelines). Use the notes pages to complete the slides. Your presentation and notes pages should stand alone so that you do not have to "present" the slides for the reader to understand your intent. Every slide should have audio.

2. Your executive summary memorandum should be a least two full pages, double-spaced, 1-inch margins, and New Times Roman 12-Pitch font. Memorandums not meeting the two full-page minimum will lose points. Your memorandum should, at a minimum, include a summary of the three major areas of your executive presentation (see above).

Reference no: EM131333711

Questions Cloud

Increased riskfor heart attacks at a young age : Familial hypercholesterolemia is associated with increased riskfor heart attacks at a young age. What kind of clinical test canyou use to test for this disease? What would be the expectedresult? Explain the biochemical process that is responsible ..
How counterterrorism professionals view terrorism : What are some of differences you see between how scholars view terrorism as a topic to be studied and how counterterrorism professionals (law enforcement, military, intelligence, etc.) view terrorism as a threat to be neutralized
What was the yield to maturity on the bond when you sold : Seven years ago you bought a $1,000 par bond with a 5.5% semi-annual coupon and a 15-year maturity at a price of $975. Today you sold the bond for $825. What was the yield to maturity on the bond when you sold it?
What is your justification selecting your strategy : MN692 Capstone Project Purpose of the assessment How did you do constrain the problem - What alternate strategies did you consider? What is your justification selecting your strategy?
Researched information security standard use by organization : For the first project, you researched the impact of legislation on your selected organization information security program. For the second project, you researched information security standards used by your selected organization.
Perform stack operations with variable length strings : Implement push and pop procedures that manipulate such strings stored on a stack consisting of a fixed length character array.
How use of the enzyme is elisa : ELISA uses an enzyme-linked antibody to detect and antigen. Briefly explain how use of the enzyme is ELISA could amplify the detection of a very small amount of antigen in a sample.
Perform research on women suicide bombers : Perform research on women suicide bombers in the United States. Evaluate how likely Centervale is to experience a female suicide bomber. Discuss where female suicide bombers are common and what other roles females from nations that support terrori..
The effect of low ph on enzyme activity : Design an experiment in which you will test the effect of an acidic fluid on enzymatic activity. (Recall: enzymes are proteins.) To complete this project, it may be useful for you to review the Scientific Method Tutorial (found the Course Content ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd