What must be done to protect the system

Assignment Help Management Information Sys
Reference no: EM131726959

Question:

Imagine that you are a security professional who has been assigned to a Joint Application Development (JAD) team responsible for developing the business requirements for a new Customer Relationship Management (CRM) information system.

You are preparing some notes for the JAD meeting. You know that CRMs can be useful for improving how customers interact with businesses, but CRMs can also be used to collect massive amounts of customer information that may be personal identification information. You want to ensure that the JAD team understands that system requirements drive how the information system and its information must be protected.

Write a 700- to 1,050-word paper explaining to the JAD team how business requirements affect how the system will be used.

Identify two internal threats and two external threats to the new CRM and what must be done to protect the system.

Format your assignment consistent with APA guidelines.

Verified Expert

The work is in 750 words where the focus is on how the jad development works with the customer relation management. The standards are set with properly managing the crm and the threats related to the JAD

Reference no: EM131726959

Questions Cloud

Create a mission and vision statement for your organization : Create a mission and vision statement for your organization. Determine three specific strategic goals that align with the ideals in those two statements.
American entrepreneurs have in the global marketplace : What are multiple specific advantages and disadvantages that American entrepreneurs have in the global marketplace?
Cultural understanding in global business : When East and West Meet: An Essay on the importance of cultural understanding in global Business Patrice and Education
Discuss heard in federal court as opposed to state court : Do you think we need both federal and state courts. What is the difference between the two
What must be done to protect the system : Identify two internal threats and two external threats to the new CRM and what must be done to protect the system - usiness requirements for a new Customer
Define and apply legal terminology to employment issues : Define and apply legal terminology to employment issues. Analyze legal cases and legal concepts in written and oral presentations.
Linear regression and anova models : Demonstrate what Microsoft® Excel® statistical tools are needed to produce a linear regression and ANOVA models?
Type of facilitating agency in market channels : Why do you think 3PLs have e become such an important type of facilitating agency in market channels? Do you expect this trend to continue?
Prepare an income statement for a segment : Prepare an income statement for a segment using the contribution margin format; determine effect of elimination of segment on company income

Reviews

Write a Review

Management Information Sys Questions & Answers

  Methods that can be used to optimize database components

Evaluate at least two methods that can be used to optimize database components such as queries, reports SQL transaction processing, and data consumption.

  Research a cybercrime

Describe what happened in detail. Who was behind it, what happened, was there a resolution? Your thoughts about it.

  Supply chain managementjackson health system is located in

supply chain managementjackson health system is located in miami-dade county a highly populated approximately 2.253

  Data or voice transmission

Which one is Costly and how- Data or Voice Transmission - Based on today's technologies, is data and voice the same thing? Support your answer from your studies and give an example.

  What are some of the areas of risk for your project

How will this affect your company (loss of staff, convincing stakeholders of the impact)?What are some of the areas of risk for your project?

  Explain about end-user development tools

End-user development tools - The pitfalls of the end-user development tools can sometimes outweigh its advantages. Do you agree?

  Explain what specific changes or paradigm shifts

How will technology impact business over the next 10 years - Explain what specific changes or paradigm shifts you expect to see.

  Create business recovery strategies for sangrafix

Develop business recovery strategies for SanGrafix, a video game design company. The strategies should contain detailed guidance and procedures for restoring a damaged system unique to the system's security impact level and recovery requirements.

  Discussion on working together to achieve a common goal

Post a brief introduction of your professional and/or educational background and current grade you teach or would like to teach.

  Privacy and social media

Privacy and Social Media-With the increasing use of social media, many employers are considering new ways in which to screen potential employees

  What is the difference in the way

Interpeting question - What is the difference in the way the web is used today from the 1.0 world

  Write a paper to support your position

Write a paper to support your position. Read at least three articles that are no more than 12 months old. Apply the content from the articles to the evolution of E-commerce.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd