Define information assurance and security

Assignment Help Management Information Sys
Reference no: EM131258249

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

Create a 10-slide Microsoft® PowerPoint® presentation. Include the following:

All of the following topics (you may change the order of the topics):

Information is a valuable asset to a company

Risk Management is necessary to reduce losses

Identifying vulnerabilities is a valuable first step

What is an organization security policy?

Who are regulatory organizations?

List at least 3
Social networking
Three potential risks
Three potential threats

Is the SDLC involved with reducing threats? How?

Why is the Cloud so feared?

Is hacking an ethical issue?

Four methods for securing information assets

Key elements if an IT Security Policy

How does encryption work? Why is it considered a premier tool in IT Security?

Five different jobs that deals with IT Security

Three certifications that are very good to have

Auditing is a tool in preventing risks

Define information assurance and security

Employee awareness is necessary for success. Why?

Describe and explain the key elements of recovering from lost assets

What are Internet connected systems? Describe five examples

Two jobs in IT Security that will grow quickly this year

Do not use research quotes or acronyms. You must use your own words.

Videos, audio, photos, diagrams, or graphs as appropriate

Substantial speaker notes to elaborate on the key points of your plan

Audio narration within your presentation

APA Formatting as needed

Create a 1-page Microsoft® Word Executive Summary on this presentation. Include the following:

Goals and objectives of the presentation in summary form

Adequate references to support your findings, information, and opinions

APA Formatting.

Reference no: EM131258249

Questions Cloud

Assumption of constant demand applies : A company orders 925 of its product during each order cycle and the Economic Order Quantity assumption of constant demand applies. The average inventory level for the company is: (round to two decimal places)
What is role of kcc and its relationship to rule of three : What is the role of KCC and its relationship to the rule of three? What are the different criteria that can force replication to occur? How does Active Directory handle simultaneous changes?
Describe three tools that can aid in the replication process : Describe and detail three tools that can aid in the replication process. List and describe some of the best practices for Active Directory Replication.
Find the control resolution of the system for the r-axis : A de servomotor drives the .r-axis of an NC milling machine table, the motor is coupled directly to the table lead screw, whose pitch = 6.25 mm.
Define information assurance and security : Define information assurance and security. Employee awareness is necessary for success. Why? Describe and explain the key elements of recovering from lost assets, What are Internet connected systems? Describe five examples.
Assumption of constant demand applies : A company orders 925 of its product during each order cycle and the Economic Order Quantity assumption of constant demand applies. The average inventory level for the company is: (round to two decimal places)
Manager of a business that cleans airliners : You are the manager of a business that cleans airliners. You are contracted by airlines to perform quick cleanups on planes between flights as well as more extensive cleanings while planes are parked overnight.
Subject-managing information systems : Why was radical design of business processes embraced so quickly and so deeply by senior managers of so many companies? In your opinion, and using hindsight, was its popularity a benefit for businesses? Why or why not? Do you know of a business th..
What is complexity in asymptotic notation of your solution : Write a program in Python to draw the following figure: What is the complexity in asymptotic notation of your solution? Return the "centered" average of an array of ints, which we'll say is the mean average of the values.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Explain the purpose of an it security policy

An introduction or overview of IT Security Policiesfor the executive branch of state governments (covering state agencies andoffices in the executive branch including the governor's office). Explain the purpose of an IT security policy and how it ..

  Explain information architecture diagrams

Kudler Food Fine Foods: Recommendations for software design, hardware, networks - Physical model of the system: Illustrate the recommended decisions in information architecture diagrams.

  Trends shaping the global market for us companieswhat major

trends shaping the global market for u.s. companieswhat major trends technology and economics do you feel are shaping

  Briefly define the term marketing mix

Briefly define the term marketing mix and distinguish it from the term marketing strategy. Explain how the level of complexity of a product can affect a company's choice of communication modes.

  Effect on the security concerns surrounding personal data

The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data

  Explain macro-processes of global supply chain

Please give an example of an assessment of the macro-processes that make up an organization's global supply chain?

  Population have high-speed broadband connections

Other Services Resulting From High Speed Broadband - What other services will change business models when large parts of the population have high-speed broadband connections?

  Discussion of the registered traveler program

Provide a discussion of the Registered Traveler program. Be sure to include a discussion of the technology as well as the impact for airports and airlines. How do Centralized Communication Centers improve airport efficiency

  Created a cube for demo inc

ISIT417/ISIT917 Business Intelligence and Knowledge Management Group Assignment. On the request of the CEO of Demo Inc., the good folks from Jedox have created a cube for Demo Inc. (the Demo database in Jedox). The objective of this case analysis i..

  Explain your rationale behind the design of the e-r diagram

Create a database schema that supports the company's business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure.Note: The minimum requirement for the schema should entail th..

  Important issues facing it project managers

Outsourcing IT Functions - What are the three most important issues facing IT project managers in USA companies that rely heavily on outsourcing IT functions?

  Why is information security so important in healthcare

why is information security so important in healthcare? focus on at least two different types of safeguards for data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd