info tech import plan

 You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library. 

Apply: Executive Brief on Audit Findings

 

Assignment Content

  1. For this assignment, you will continue using the Gail Industries Case Study.

    The audit for SCOPE is complete. As the IT manager, it is your responsibility to respond to the audit findings.

    Read the Gail Industries Case Study.

    Review the preliminary findings you identified in the Week 4 assignment. Assume all of your findings were identified by the auditors, including any identified by your instructor, and are in the final audit report.

    Write a 2- to 4-page executive brief to executive leadership on the results of the audit performed in the Week 4 Apply: Audit Evidence assignment. Include your management response to each finding (how it will be resolved). This may include creating new policies, procedures, and controls. You may consider if you will accept the finding and choose not to act because it is a single incident and not likely to recur. Justify each response in relation to reducing associated risks.

    This week’s readings provide guidance on formatting this information.

    Submit your assignment.

Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0

  

Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0

  

The Metropolitan Zoo tracks its animal data in Excel. The organization decides to use a database to organize the data about the animals, their trainers, and the animal exhibits. In this project, you will open an existing database and create a new table. You will import an Excel file containing information about the animals, and query the database to determine which animals need a checkup. You will also create a query to obtain a listing of the animals in each exhibit.

     

1

Start   Access. Open the downloaded Access file named Exp19_Access_Ch2_Cap_Zoo.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Paper

  

Task: Paper

TOPIC – Information Systems Security and Emerging Technologies

The final paper should be a Word document which includes:

The research paper should be about 4-5 pages, including a cover page and this must be a Word document.

Include at least three references in APA format. This must be at the end of the Word document.

Please note:

SafeAssign/Turnitin is used to check similarity.

For your paper, it’s acceptable to have a similarity rate that is 20% or below. If it is higher than 50%, a score of 0 will be graded for the project. A rate between (20%~50%) will have an impact on the grading.

The reference similarity will not have an impact on the grading.

Onine project 1

 

Students will submit a proposal for a capstone project case study during module 1 for approval by your instructor. The theme of your capstone should be based upon an IT risk assessment and how the various aspects of ERM play a direct or indirect role.  The below format for your proposal is the exact format that you will submit your final capstone. The proposal submission should be limited to 4-5 pages and must include minimum 5 scholarly references. The page requirements listed below apply to the project and not the final capstone. It important that students follow the capstone format/subheadings for both proposal and capstone. Questions concerning APA format, scholarly references, or graduate academic writing, first review the APA Manual (7th ed.) then ask your classmates or me. It may also be useful to contact the University of Fairfax Librarian. It is expected that the student meet or exceed graduate academic writing skills for this course.  

  • Case Study Introduction (include business area i.e. Healthcare, e-Commerce, Banking, Government, etc.) (1/2 page)
  • Overview of the Business Information Technology System selected (e.g., system description, system boundary) (1 page), that also includes:
    • Identification of the assets involved (i.e. hardware, software)
    • Identification of the business impacts (data, information, financial)
  • Existing risks that pertain to the system or application, i.e., threats and vulnerabilities (1/2 page)
  • Existing gaps in reducing risk (1/2 page)
  • Impact of these risks and why remediation or mitigation is needed (1/2 page)
  • Remediation or mitigation approach based on risk management or information security literature, frameworks, methodologies (1/2 pages)
  • Conclusion (1/2 page)
  • Reference list (5 scholarly sources; no Websites or Internet articles)