CMGT 430 ENTIRE COURSE


View larger image
 

CMGT 430 ENTIRE COURSE


Price: $50.00
Status: Product will be sent by Email within 1 hour after successful payment
Quantity:

Please leave this field blank.

Add to Wish List (Log in first.)

CMGT 430 ENTIRE COURSE

CMGT 430 Wk 1 Discussion ? CIA Triad
˙

Post a total of 3 substantive responses over 2 separate days˙for full participation. This˙includes your initial˙post˙and 2 replies˙to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

The CIA triad is widely referenced in today?s information security environments as a basic model for information security. There are three distinct legs to the CIA triad: confidentiality, integrity, and availability.

Select?one of the CIA components and expand on it. Include a baseline review of that specific attribute as well as challenges that might be encountered, including two potential security issues.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

˙

˙
˙

˙

˙
˙

˙

˙

˙

CMGT 430 Wk 2 Discussion ? Risk Appetite
˙

Post a total of 3 substantive responses over 2 separate days˙for full participation. This˙includes your initial˙post˙and 2 replies˙to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Risk appetite is the quantity and nature of risk that organizations are willing to accept as they evaluate trade-offs between ?perfect security? and unlimited accessibility. Often when a risk is examined in detail, the result or the risk appetite can result in a decision to expand their capacity to handle that risk in order to take advantage of the business opportunity, or it might result in a decision not to move forward with that opportunity.

Consider?risks that exist at a typical small business. Provide an example of determining the risk appetite of the small business to a specific risk. How would you determine what to examine, what data to use in that examination, and what the risk appetite is?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

˙

˙

˙

˙

˙

CMGT 430 Wk 3 Discussion ? Biometric Protocols
˙

Post a total of 3 substantive responses over 2 separate days˙for full participation. This˙includes your initial˙post˙and 2 replies˙to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

At many security checkpoints where biometrics are used, only one protocol is employed, such as a fingerprint reader, a hand-scanner, or facial recognition. Other checkpoints use several biometric checkpoint protocols in tandem to add a layer of security.

Complete?an internet search for vendors of biometric products. Find one vendor with a product designed to examine several characteristics [i.e., facial recognition, hand scanner (incorporates hand pattern, fingerprint reader), retina scan, and signature recognition].

Discuss?the vendor you selected along with answers to the following questions:

˙

˙

˙

Which characteristics would be more acceptable to users?
˙

˙

Which would be preferred by security administrators?
˙

˙

˙

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

˙

˙

˙

˙

˙

CMGT 430 Wk 4 Discussion ? Working with Vendors
˙

Post a total of 3 substantive responses over 2 separate days˙for full participation. This˙includes your initial˙post˙and 2 replies˙to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Just a few years ago, all IT processing took place in-house. Payroll processing, human resources and benefits management, real estate management, and investor relations were done by employees within the parent organization. Even in the home environment, families kept information activities in-house, including annual tax returns and banking (through the writing of paper checks) and disagreements or issues with vendors was taken care of personally. Now we have online resources that push some of that overhead to external vendors. Examples include organizations that will process payroll and benefits administration, and stock brokerages that address investor traffic. Working with vendors brings up a few concerns.

Discuss?the following:

˙

˙

˙

Why is due diligence necessary when dealing with external vendors?
˙

˙

What is one suggestion you have regarding securing data as it is in-transit to and from these vendors?
˙

˙

What are two security protocols that should be part of the vendor?s data operations? For example, if the data includes PII/SPII information, is adherence to external regulations and guidelines the responsibility of the vendor or your organization?
˙

˙

˙

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

˙

˙

˙

˙

˙

CMGT 430 Wk 5 Discussion ? Mainframe and Client/Server Environments
˙

Post a total of 3 substantive responses over 2 separate days˙for full participation. This˙includes your initial˙post˙and 2 replies˙to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Consider?the following scenario:

Your manufacturing company has operated with a mainframe IBM computer for more than 20 years. Recent technological advances have brought opportunities to replace that mainframe-based computing environment with a client/server environment. You have been tasked with responding to the senior management group about the security issues involved with replacing the existing mainframe computer environment with a client/server platform. The salespeople you deal with from each vendor believe that the current mainframe environment costs about $500K a year to maintain from a security standpoint, while a client/server environment would cost about $325K a year. But cost is not the only consideration. No PII or SPII data is contained in this manufacturing platform. It is strictly a final product for sale application.

Outline?and review a typical mainframe enterprise security footprint. Do the same for a possible client/server environment. This could include the use of the cloud for distributed computing, but that would also include unique security concerns.

Discuss?the following:

˙

˙

˙

Based on your outline, which of these environments is more secure and why?
˙

˙

Does˙your outline show commonalities that could permit both the mainframe and the client/server environment to coexist from an enterprise security perspective? If so, what are they?
˙

˙

˙

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

˙

CMGT 430 ENTIRE COURSE

Write a Review of CMGT 430 ENTIRE COURSE