Create outline of your new it security policies for rollinon

Assignment Help Management Information Sys
Reference no: EM131214236

Assignment: Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards. RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues. RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one occasion.

Your main objective is to create an outline of a new IT security policy regarding the company's web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five page paper in which you:

1. Briefly explain the current state of Web application security to the Board of Directors.

2. Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.

3. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

4. Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

5. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.

6. Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

7. Format your assignment according to the following formatting requirements:

a. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

b. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

c. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten slide PowerPoint presentation for the Board of Directors in which you:

8. Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

• Analyze the impact of the Internet and Web applications on the business world.
• Analyze the evolution of social media, social networking, and the ethical issues they raise.
• Compare and contrast Web-based risks.
• Analyze common Website attacks, weaknesses, and security best practices.

Reference no: EM131214236

Questions Cloud

Is the energy delivered to the device or taken from device : Suppose that the terminals of an electrical device are labeled a and b. If vab=-15V, how much energy is exchanged when a positive charge of 4C moves through the device from a to b? Is the energy delivered to the device or taken from device?
Explain overall impact of utilizing information technologies : Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
What are some questions that you might want to ask in return : A management application vendor boasts about the scale of its management system, claiming that it can support 10 million managed objects. What are some questions that you might want to ask in return
Find vector equations for the lines : Convert the vector equations from the previous question into their parametric and cartesian forms - Find vector equations for the lines:
Create outline of your new it security policies for rollinon : Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
Identify chocoholic tour key market or customer segments : MKTG1053 Service Quality Group Assessment - INDUSTRY PROJECT. Chocoholic Tour's Market/Customer Analysis: What type of customers make up the market in which Chocoholic Tour operates?  Identify Chocoholic Tour's key market/customer segments
Review the risk section of the companys sec form ten-k : Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors.
Number of on-line purchases of footwear : Q1. An on-line retailing firm conducts a study into the number of on-line purchases of footwear made during all of last year. The study wants to determine the proportion of Australians over the age of 25 who purchase footwear on-line. The managi..
What programs exist that help prevent bullying : Are school counseling programs that prevent bullying effective in decreasing antisocial behavior? What programs exist that help prevent bullying? How effective are those programs? How can we use current research to come up with a new research que..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Important information about computer applicationswhat is

important information about computer applicationswhat is the difference between custom animation and transition

  Information technology - analog and digital signalsidentify

information technology - analog and digital signalsidentify the difference between analog and digital signals. provide

  Organizations respond to social networking problems

1) How should organizations respond to social networking problems? Which one of them is a dangerous approach, and why?

  The needs of digital content providers to protect

Write a 4 page paper that compares and contrasts the needs of digital content providers to protect their rights to a fair compensation for the use of their work with the various restrictions possible using DRM technology. Include discussions of the c..

  Define procedures and configuration management tools

Imagine that you are a network engineer for a mid-sized company, specify your main responsibilities and suggest strategies to fulfill the responsibilities that you have specified. Provide a rationale to support your suggestion.

  Contemporary information systemthe database administrator

contemporary information systemthe database administrator dba is not necessarily a single individual. in a large

  Logistics - alignmentdiscuss the concept of alignment in

logistics - alignmentdiscuss the concept of alignment in the supply chain process. when transporting a product is the

  Cost benefits analysis for new systems

Cost Benefits Analysis for New Systems - One of the benefits made in some government IT projects

  Determine the fundamental challenges that organizations face

Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to w..

  Show employee development plans

Employee Development Plans: Go Live System, Inc - The new team of developers has been hired, and part of their New Employee Orientation is to meet with you and review their employee development plans. The problem is, you don't have one!

  Calculate information about each staff member weekly billing

This worksheet is more complicated and uses a variety of formulas to calculate information about each staff member's weekly billing and to generate client bills from the staff hours

  Assignment on key considerations

Evaluate how the video has strengthened or otherwise changed your views about differentiated instruction? Do you have a deeper understanding and appreciation for differentiated instruction now? Why/ Why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd