What types of information are exchanged and with whom

Assignment Help Computer Engineering
Reference no: EM133337748

Rotation assignment takes you to the Office of the Chief Financial Officer (CFO).

An external audit of the company's financial operations has just been completed. Last week, an "early look" copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO's staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise -- Shadow IT -- the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:

1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card's account via a credit card charge. Guest services also credits some of these payment card accounts with "reward dollars" for guests who belong to the hotel's affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.

2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider's cell phone. The payment accounts which receive the guests' payments are connected to the hotel's merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.

The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a "cease and desist" directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.

Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)

Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a concise (approximately 300 word) summary of the important points from your readings. You have also been asked to help identify and describe / explain 3 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO's effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Provide in-text citations and a reference list at the end of your summary paper (APA format recommended).

Reference no: EM133337748

Questions Cloud

Does action solve the issue of the unapplied device : CIST 2411 Central Georgia Technical College device profile and notice that the Include list has the profile assigned to All Users. You change the assignment
How should cybersecurity act of 2015 be updated to reflect : How should the Cybersecurity Act of 2015 be updated to reflect better and more value-added for the public-private partnership regarding Cybersecurity?
Discuss the deontology and utilitarianism moral stances : Did the HR staff that should have reported to the hiring manager the candidate's conviction and parole commit an ethical lapse, or was it just a clerical error?
Cybersecurity life cycle and cybersecurity framework : Explain how you would apply the cybersecurity life cycle, cybersecurity framework, and methodologies to establish a cybersecurity program
What types of information are exchanged and with whom : CSIA 300 University of Maryland Rotation assignment takes you to the Office of the Chief Financial Officer (CFO) - Provide in-text citations and a reference
Experience of forensics-incident response in organization : Based on your experience of forensics and incident response in an organization
Explain a rootkit hides : Explain how a rootkit "hides" and what can be done to find and remove them. Share one breach that was the result of a rootkit.
Recommends the use of wireless controllers : detailed description for the WAN connections to the distribution centers that includes backup connectivity or an alternate access method if the main connection
Easiest items to extract during investigation : What are some of the easiest items to extract during an investigation?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Express e as a function of n-r-l-h-and-c

Assume each processor is multithreaded to handle N contexts simultaneously. Assume context-switching overhead of C. Express E as a function of N, R, L, h and C.

  How to generate the computer code

I have not seen them yet, but the wave appears to be toward a complete English ability to write down computer programs.

  Difference in tools and personnel into a network environment

Discuss some of the differences in tools, techniques, skills and personnel that are needed between an intrusion into a network environment and a response to a.

  Write a heap method named incrementpriority

Write a Heap method named incrementPriority that, given the position of an element in the array just described, adds 1 to its value and reorganizes the heap.

  Discuss the ideal method of evaluation products

The ideal method of evaluation products involves volunteers. However, sometimes this is not feasible (i.e., product time constraint, too expensive, etc).

  What is the greatest magnitude negative number

What is the largest positive number one can represent in an 8-bits 2's complement code? Write your result in binary and decimal.

  Write down the largest and the smallest numbers to screen

Write down a Java program that will search a text file of strings representing numbers of type int and will write the largest and the smallest numbers to the screen.

  Explain success factors for information governance

Name 5 or more success factors for Information Governance. In line with the differences in terminologies and definitions between Information Governance (IG).

  What operating system and edition do the computers

What operating system and edition do the computers in this classroom run? Is the operating system used in the classroom considered to be a network operating

  What is the problem in choosing two as the public key e

In RSA Why can't Bob choose 1 as the public key e? What is the problem in choosing 2 as the public key e?

  What in your own words is it enterprise architecture

What, in your own words, is System Technical Architecture? How does it relate to what has been taught in this course?

  Which command could you type to see your current user

You log in as different users from time to time. Which command could you type to see your current user identity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd