Describe various functions within information systems area

Assignment Help Computer Network Security
Reference no: EM131119219

Project Deliverable: Project Plan Inception

This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

You are a newly appointed Chief Information Officer (CIO) of a $25 million dollar data collection and analysis company that has been operating less than two years. It is expected to grow by 60% over the next eighteen months. Your company currently collects data using Web analytics and combines it with operational systems data. Web analytics is an increasingly important part of most business marketing plans. Your company is looking for ways to leverage the collected data but wants to ensure that the information technology infrastructure will support the expected growth that the company is anticipating. The Chief Executive Officer (CEO) has given you sixty days to deliver a comprehensive information systems project plan to address the organizational growth that the company is experiencing. The company will be expanding from one floor to three floors within six months. Since this is a relatively new company, there is currently limited technology infrastructure to support the business. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices and cost-effective solutions in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud computing technologies and Software-as-a-Service (SaaS) but is leery of security issues that may be associated. However, he is sure that you will implement proper security protocols. The company currently consists of twenty employees of which four, including yourself, are dedicated to the IT organization.

Section 1: Project Introduction

1. Write a four to six page project introduction that documents the current state of the organization, expands upon the information given above, and includes the following:

o Background information of the company.
o Details regarding the type of business that the company is engaged in.
o A description of current outsourcing and offshoring activities.
o Identification of current skilled information systems personnel in position and responsibilities.
o The specific types of data that the company collects.
o A description of the information systems that the company currently has to support the business. The description at a minimum should include the following:
o Operational Systems and Databases
o Analytics and Interfaces
o Infrastructure and Security
o The use of at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Project Plan

Use Microsoft Project to:

2. Create a project plan (summary and detailed) using Microsoft Office Project. The project plan should:

o Record all tasks, subtasks, resources, and time related to the project.
o Outline the planning, analysis, design, and implementation phases.
o Develop in accordance with the systems development life cycle (SDLC).

The specific course learning outcomes associated with this assignment are:

• Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM131119219

Questions Cloud

Group responsible for reducing resistance to change : The Organization and Process Change Process creation, revision, and implementation are all predicated on the ability of the organization and its employees and vendors to accept change. The organization may have the will to change yet find its employe..
What goals would you set for the sales staff : What goals would you set for the sales staff, given your answer to number 1?
Use the financial statements effects template to show effect : Compute the December 31, 2010 PBO and FMV of pension assets. Compute 2010 pension expense. Use the financial statements effects template to show the effects on the 2010 financial statements.
Discuss the concept of justice in the film unforgiven : Discuss the concept of justice in the film Unforgiven. What is this film trying to tell us about "justice"
Describe various functions within information systems area : Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.
Differences between scholarly resources and popular resource : Explain the differences between scholarly resources and popular resources. Describe the key things to remember when searching for sources within the Ashford University Library (e.g., databases, FindIt@AU search tool).
Strategic value of personnel training and development : Part  1: Discuss the strategic value of personnel training and development. What are the implications for the MNC?
Describing the main aspects of personality testing : Write 150 to 200 words describing the main aspects of personality testing. can someone help
What is the nature of an installment sale : What is the nature of an installment sale? How do installment sales differ from ordinary credit sales?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How do concepts like secure socket layer

How do concepts like secure socket layer

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Examine the quick finance company network diagram and

above is the quick finance company network diagram. the company is a small business and does not invest much in

  Cloud computing security policy

A small non-profit organization (SNPO-MC) has received a grant which will pay 90% of its cloud computing costs for a five year period. But, before it can take advantage of the monies provided by this grant, it must present an acceptable cloud comp..

  Compare x.509 pki and pgp pki in different aspects

Compare X.509 PKI and PGP PKI in different aspects, e.g. Certs format, user identification, key management, scalability, usage, applications, business models, etc.

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  What would the subnet mask be in dotted decimal notation

Assume the address of a network host is 198.4.81.120/27. If the first address in the subnet range is the address of the network that address would be

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Expose the computers to virus and worms

Some hackers even try to expose the computers to virus and worms. Moreover these persons sometimes specially design worms to distribute in peer-to-peer networks only.

  Security vulnerabilities of authentication scheme

Clinet's MAC address is explicitly excluded in the AP/router configuration. What are the security vulnerabilities of this authentication scheme?

  Formulate the network security plan to be implemented

Review the work you have done and formulate the Network Security Plan to be implemented across the network footprint. What is being done to secure the network at different levels of the OSI model and the organizational structure.

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd