We are stars

Assignment Help Computer Network Security
Reference no: EM133397603

Case scenario: We are stars

"We are stars" is Australian-based talent management group.

At "We are stars", they recognize the importance of people, but what makes them blush more is originality and commitment. For this reason, "We are stars", too, is committed to clients and who they represent.

Their website is used to provide information about the company and to keep portfolios of all profiles.

On the portfolio platform, information about potential talents is collected and stored in the database.

The CEO understands the importance of data for the business. The establishment of clear policies and procedures to protect the information collected from customers is imperative to keep the faith of people on the company. Plus, it also prevents future liability issues.

Task 1.

You are required to make an oral/voice over presentation as part of the awareness program.

The following topics should be covered:

Importance of the code of ethics

How to handle ethical issues

How to manage copyright

Privacy policy and legislation compliance

Task 2.

Give a test (Survey) to verify the knowledge of the audience for the awareness session.

Reference no: EM133397603

Questions Cloud

AUP for computer and networking and Email Use Policy : When discussing AUP for computer and networking and Email Use Policy, and Information and Systems Access policy for Univerisities or Organizations
Think about impact that copyright infringement : Think about the impact that copyright infringement has had on information technology by referencing a recent story in the news
Review the entity-level controls : You've recently taken a new role as an internal auditor in your current employer and have been assigned to review the entity-level controls
Description of key components of Disaster Recovery plan : Description of the key components of a Disaster Recovery(DR) plan for common incidents that could disrupt the availability of an organization's network and data
We are stars : We are stars is Australian-based talent management group. You are required to make an oral/voice over presentation as part of the awareness program.
Software configuration is done at the conclusion : Software configuration is done at the conclusion of a software project. Is a popular build tool from the C and UNIX system days of the 1970s and 1980s
Which two stakeholders bear the most responsibility : Which two stakeholders bear the most responsibility for the problems discussed in the case? Explain.
Discussion as opportunity to reflect : Discussion as an opportunity to reflect on and share your experiences
Variety of business analytics and presentation tools : There are a variety of business analytics and presentation tools available. In preparation for your CLA

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss how you would manage security at target differently

Based on the benefit of hindsight, discuss how you would manage security at Target differently in order to prevent the intrusion or quickly detect and isolate the intrusion.

  Blockchain technology and artificial intelligence

What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning

  Explain security measures that you would recommend

Determine and explain security measures, in detail, that you would recommend to enhance security. How cryptography and authentication can support security.

  Context of a systems development project

Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..

  Summary of articular - a notorious iranian hacking crew

Need a summary of articular - A Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems by ANDY GREENBERG

  Explain the reasons why the company needs a security plan

Reasons why the company needs a security plan. Why an assessment should be performed to determine a baseline for the security in the company?

  Explain the intended use for the quoted-printable

Explain the differences between the intended use for the quoted-printable and base 64 encodings.

  Existing enterprise architecture

You have been hired by a medium sized business to upgrade their existing enterprise architecture.

  Identify cloud computing security risks

Identify cloud computing security risks and recommend ways to mitigate those risks. Analyze virtualization and explain how it differs from cloud computing.

  Impact of bullying in childhood and adolescence

The first article is titled "The Impact of Bullying in Childhood and Adolescence" by Andrew Slaby and Robert Koch in journal Child and Adolescent Psychiatric

  Why we need hash function in rsa signature algorithm

For encryption, i.e., M11 (mod n), what is the number of multiplications to calculate M11 by using direct multiplication?

  Do a simulation of the information security audit process

Using any tool, do a simulation of the Information Security Audit Process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd