Write your mini-security policy

Assignment Help Management Information Sys
Reference no: EM132166716

This is the first case study for the course and it will be based upon the case study text: Public Sector Case Study - Edward Snowden - pg. 226

In reading the excerpt from the textbook on what happened and how Snowden was able to access the data that he did, write a mini-security policy following the security template in Chapter 7 (pg. 185).

Highlight at least three policies that you feel were violated in this case and address the policies that need to be in place to prevent those violations from occurring in the future.

Make sure to incluce enough detail that it could be amended to an existing policy and clear enough that any/all employees know what the new policy addresses.

Part 1:

Write 2-3 paragraphs at the beginning of your paper explaining the three issues you want to address and why. Follow APA guidelines for paper format and make sure to check spelling/grammar prior to submitting.

Part 2:

Write your mini-security policy following the template in textbook addressing the three issues you identified.

Reference no: EM132166716

Questions Cloud

What is the probability that the next car passing : What is the probability that the next car passing will be exceeding 51 miles per hour?
Assess the strategic implications of deciding to implement : Assess the strategic implications of deciding to implement wireless and mobile technologies into the selected industry environment.
What do you see as common themes throughout these two cases : Rose v. Council for Better Education was a very important case in Kentucky in 1989. What do you see as common themes throughout these two cases
Determining the value of k : Let the random variable Z follow a standard normal distribution. Find the value k, such that P(-0.62
Write your mini-security policy : Write 2-3 paragraphs at the beginning of your paper explaining the three issues you want to address and why.
Compare the direct and indirect compensation requests : The first candidate is asking for competitive base salary plus one week of extra vacation as part of the benefits package. The second candidate is asking.
Discuss three conflict resolution strategies learned : For each of the strategies, provide an example where you can apply them in a personal or work situation.
Issue regarding a general healthcare issue : Analyze an economic issue regarding a general healthcare issue that was recently discussed in the news and provide policy suggestions to solve the issue?
What suggestions would you make in the given problem : Choose one classmate's own response to the interviewer's question. If you are a job coach, what suggestions would you make to maximize your classmate's answer.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How to judge whether it is worth processing an order

How to judge whether it is worth processing an order of $ 1,000 at a gross margin of $ 200?

  Explain the concepts of systems analysis and design

The major concepts of systems analysis and design are reinforced in the Final Project. The student will learn how to provide management for projects.

  Explain at least one way you could use word processing tools

Also, explain at least one way you could use word processing tools and social media sites in your own life. Find one and share it with your peers here.

  Which station is the bottleneck station

A production line at V. J. Sugumaran's machine shop has three stations. - Which station is the bottleneck station?

  Create a spreadsheet to capture the financial components

Phase: Budget forecasts - you need to create a Spreadsheet to capture the financial components involved in the plan.

  Describe the major pc and server operating systems

Distinguish between application software and system software and expand the role the operating system of a computer plays.

  Create naming conventions for each entity and attributes

Conclude your data model design with an Entity Relationship Model (ERM) that will visually represent the relationships between the tables. You may make use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. N..

  Propose some methods for data protection

Asks you to suggest ways that the data center could have prevented the intruders from being able to enter the building.

  What are the challenges of conducting virtual training

What are the challenges of conducting virtual training and how can a virtual manager make it Intero to Operation Management What are the five inputs and two outputs of an operations transformation process?

  Explain any information that may help alliance reduce costs

Explain any information that may help Alliance reduce costs while providing better service. Assess ethical and privacy considerations of information gathered.

  Predict the first form of technology to be phased out

Predict first form of technology to be phased out by a newer and improved technology. Explain limitations of technology and reason for its speculated obsolesce.

  The use of encryption can have adverse effects

The use of encryption can have adverse effects on incident response and incident investigations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd