subject: Enterprises systems and archietecture
Assessment Individual case study assignment (1,500 words) on implementing change with an enterprise system
subject: Enterprises systems and archietecture
Assessment Individual case study assignment (1,500 words) on implementing change with an enterprise system
Part 1: Research Security Awareness Policies (0/1 completed)
Note: In this part of the lab, you will review an example of a security awareness training policy in order to form a basis for their purpose and usage. Understanding the reason behind a security awareness training policy is key to understanding the component policies and procedures. Please take time to review the research thoroughly and think through the concepts of the policy itself.
1. Review the security awareness training policy at the following website:
2. For the sample security awareness training policy that you reviewed in the step above, discuss the policy’s main components. You should focus on the need for a security awareness program and its key elements.
Part 2: Create a Security Awareness Policy (0/6 completed)
Note: A strong security awareness policy is a key component of a strong organizational security posture. The effectiveness of a security awareness training policy and program will directly influence how well employees will value and protect the organization’s security position. When writing a security awareness training policy, consider the following questions:
After the policy has been approved, its success relies on proper delivery and understanding. To simply give a new employee 5 minutes to read and sign a policy during orientation is not enough. Focused and interactive “policy understanding” sessions should guarantee every employee understands the policy’s reasoning and necessity. Customizing these sessions according to department or function can drastically increase how much employees retain of and apply the training during their work. Repeat sessions reinforce the policies and keep material fresh in their minds.
1. Review the following scenario for the fictional Bankwise Credit Union:
2. Create a security management policy with defined separation of duties for the Bankwise Credit Union.
Policy Statement
Define your policy verbiage.
Purpose/Objectives
Define the policy’s purpose as well as its objectives.
Scope
Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?
Standards
Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards.
Procedures
Explain how you intend to implement this policy for the entire organization.
Guidelines
Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.
Challenge Exercise (0/2 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
There are many vendors that provide security awareness training software to organizations that do not have the time nor the resources to create their own. When selecting a software vendor, many organizations will issue a Request for Information (RFI) to potential vendors, outlining the details of what the organization would like to learn about the vendor’s solution. You can read more about RFIs here: https://www.smartsheet.com/free-request-for-information-templates.
As a security manager at eChef, an online marketplace for high-end kitchenware, you have been tasked with selecting a security awareness training software provider.
Use the internet to research real security awareness training software providers.
1.Identify three security awareness training software providers.
2.Identify 10 questions that you would include in your RFI.
Please see attached file
What kind of information do you think a small business or organization would organize into a database?
Respond to the following in a minimum of 175 words:
An important part of managing security in connections and communications between a secured network and the Internet at-large is to have a benchmark for what normal traffic looks like. Many applications exist for the purpose of monitoring, probing, or scanning traffic-related events to catch irregularities that can inform a deeper investigation.
Chapter 16 topics:
Chapter 17 topics:
Chapter 18 topics:
Chapter 19 topics:
Chapter 20 topics:
You have been in your role as the CIO for Premier University for almost six months. In that time, you have managed to create a small information security team, and incident response is one of the team’s strengths. Unfortunately, the repercussions for the data breach that occurred almost a year ago continue to plague you.Premier University recently received a letter from the Department of Education, asking the university to explain the circumstances of the data breach and how the institution handled the breach. The letter also referenced the Gramm-Leach-Bliley Act (GLBA). You know that the institution must follow GLBA provisions to ensure the security and confidentiality of student financial aid information. That requirement is part of the contract for administering federal student financial aid that Premier University has signed. You also know that the Department of Education Office of Federal Student Aid issued an informational memo about these requirements in February 2020.
The Premier University president has asked you to outline GLBA data safeguarding requirements and why they are important to implement to protect student financial aid data. The president has also asked for your opinion on the ease with which Premier University can implement the safeguarding requirements.For this part of the project:
Why is computing technology important?
Background: Read the article at the link below by Nicole Fallon “Destination Dream Job”. Pay close attention to the roadmap outlined in the article about career progression. Fallon outlines 4 steps that one needs to take to reach their career goal (see link below). Career experts have also shared their advice for mapping out a path to one’s ultimate dream job. Those steps include: (1) Know where you want to go, (2) Focus on the tools you need, (3) Find a guide, and (4) Be open to changing your route.www.businessnewsdaily.com/6432-create-career-roadmap.htmlYour assignment : Plot your career direction based on each step in this roadmap. For step #1 you should look at where you are now (what industry, job, position, etc.). Also answer where you want to go (industry, job, position, salary, etc.) from here. For step #2, I would like you to go online and explore various job announcements and position descriptions to see what you need (what experience, degree, certification, interest, passion, etc.). In this context, I also would like you to state how pursuing this degree, and this course specifically, is a tool for the career direction in which you are going. Then for step #3, do you know anyone who might be a mentor; are you pursuing opportunities to network with like-mined professionals, etc. Finally, for step #4, is there some short-term deviation from your goal that you would accept – what is it?It should take just a short paragraph that address each of the four steps mentioned above. The background and online research for this assignment can be done collectively in your group. However, the findings must be specific for you individually and so your post must be individual. As I have always mentioned, do not cut and paste information from other sources – I want your view and in your words. As your reader, I want to be able to follow whatever sources you use, so support your views (and findings) with at least two in-text citations . This means you will also need a reference list. For this assignment (only), a url reference is acceptable (not usually acceptable for APA). This is an individual assignment which must be accomplished by you alone. Please post your paper to iLearn NLT 6/11 – 8pm EST.When you are ready to post, click the Res Wknd Practical Connection assignment link, then Either click the “Write Submission” link and directly paste your document into this assignment box OR Browse your Computer and add the entire Microsoft Word document as an attachment (Mac users, please remember to append the “.docx” extension to the filename).
In this three-part assignment, you will apply the various concepts you have learned throughout this course to the design of the single most secure network possible, capable of supporting three IT services: e-mail, file transfer (centralized), and VPN. After you have fully designed your network, you will need to provide three data flow diagrams explaining how your designed network handles three different transactions:
The specific course learning outcome associated with this assignment is:
Use Microsoft Visio or an open-source alternative to:
Use Microsoft Visio or an open-source alternative to:
Write a 6–10 page paper in which you: