Write a plan that approach to the security breach analysis

Assignment Help Management Information Sys
Reference no: EM131795670

Prompt: For this milestone, write a test plan that details your approach to the security breach analysis and recommendations (final project). You can do research to include any other topics you found relevant, but you should at least discuss the following:

· Introduction

o Introduce your company (Limetree Inc.) and state its capabilities.

o State your goal for the security breach analysis project.

· Scope:

o Define the scope of the project.

· Hardware and Software:

o Create a list of hardware and software present.

· Resources:

o Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).

· Timeline and Benchmarks:

o Discuss your timeline for the project (how long it will take and why).

o Discuss what regulatory benchmark you will be using to make vulnerability determination.

· Approach:

o State your approach (Example: Review interview result, analyze virtual environment, review industry best practices, etc.).

o Define how you will categorize your findings (Example: low, medium, high).

Guidelines for Submission: Your responses must be submitted as SEVEN to NINE (7-9) pages long excluding references and cover page as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least four sources cited in APA format.

Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references.

No heavy paraphrasing of others work.

Attachment:- Project Scenario.rar

Reference no: EM131795670

Questions Cloud

What volume of oxygen gas is required to react : What volume of oxygen gas is required to react completely to produce 340 L of hydrogen cyanide? Assume all reactant and product volumes.
Transferring strategic plan into a reality : Transferring strategic plan into a reality can take more than planning.
Calculate the company break-even point in dollars : City Electronix sells television sets and DVD players. Calculate the company's break-even point in dollars
What amount should be debited to bad debts expense : What amount should be debited to Bad Debts Expense when the year-end adjusting entry is prepared
Write a plan that approach to the security breach analysis : Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).
Prepare a CVP income statement : Koufax Company had sales in 2010 of $1,500,000 on 60,000 units. Prepare a CVP income statement for 2010
Analyze governmental activities related to expenditures : Analyze governmental activities related to expenditures and expenses
Prepare a statement of cash flows on the direct method : Prepare an Income Statement. After you are completed, a corrected Income Statement should be completed by your spreadsheet automatically with only a change
Problem on the dumb beta strategy and sharpe ratio : Two mutual funds, fund A has a beta of 1.5, fund B has a beta of 0.5, unchanged regardless of market condition. Assuming expected returns follow the CAPM model.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the referential integrity in your database

Provide an explanation of referential integrity, including how a lack of referential integrity can compromise data in the dataset and provide examples. Identify the referential integrity in your database. Show the affected tables in each dataset a..

  Research the web and identify a case study

Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for a business.

  How information systems can positively impact a change work

Write an essay reflecting on how Information Systems can positively impact a change work processes in healthcare, and review some of the obstacles to implementation.

  Robust information management system strategy

Evaluate the importance of a company having a robust information management system strategy. Recommend two (2) actions that a company may take in order to protect its information assets from potential disruption and loss

  What other people say about their relationship

The focus is on what other people say about their relationship. According to Altschule (2015), the Internet through social media can exert much stress on relationships in the current world.

  Human factor in technologywhat is understand by the human

human factor in technologywhat is understand by the human factor and why is this important in considering the impact of

  Briefly describe the organization that you chose

Briefly describe the organization that you chose. Identify which regulation you would associate with that organization. Explain the purpose of the regulation for that business.

  The use of data miningdata mining what is data mining

the use of data miningdata mining what is data mining? compare data warehouses data marts and data mining. how can they

  Produce a coherent srategic plan for a fictitious

Producing a Coherent Srategic Plan for a fictitious IS business - Drawing from several resources (the work you did in previous modules, material covered in the reading in this course, and additional research),

  Identify three best practices you believe would be useful

Imagine you are working as an IT auditor. Identify the three best practices you believe would be most useful when conducting audits for various businesses. Justify your choices.

  How you would start this incident off correctly by properly

An individual who was just dismissed from the company under unfavorable circumstances, pretend that your own computer is the laptop that has been secured.make the first entry in your log book and describe how you would start this incident off corr..

  Information systems life cycle-time codingapply the

information systems life cycle-time codingapply the information systems life cycle to a business converting from a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd