Capabilities and weaknesses of the candidate

Assignment Help Management Information Sys
Reference no: EM13750072

A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. The client recently read a front-page story about a negligence lawsuit arising out of a data leak that exposed confidential client information. The source of the data leak was a peer-to-peer file sharing application that had been installed on an employee's desktop computer. An initial quick-look security assessment found that your client's concerns were well founded. At least one department (Marketing) was using a similar peer-to-peer file-sharing application to distribute promotional videos and audio podcasts to potential customers. Your team leader has asked you to prepare a short technology evaluation paper (deliverable) in which you address one of the problem areas (a or b) identified in the quick-look assessment:

Data: Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

Software: Identify and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops (loss of system integrity).

Use the provided matrix to categorize and assess the risks associated with your chosen option (a or b). Then research and evaluate three or more technology-based solutions that could provide effective protection measures. Use one row per technology solution.

Your technology evaluation paper must begin with an executive summary followed by your technology evaluation matrix. The executive summary should provide an overview of your risk assessment and evaluation. It should also provide additional information to help the client understand your recommended solution. Your summary should be concise-approximately three pages long-and include the following elements:

An explanation of the information security threats (risks) and vulnerabilities (in plain English) associated with your selected option (a or b)

A comparison (compare/contrast) of the capabilities and weaknesses of the candidate technology-based solutions

A recommendation of the best fit technology-based solution to solve/mitigate the problem(s) associated with your selected option

Remember to present your findings and cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.

Reference no: EM13750072

Questions Cloud

Types of investments : You need to present to your client, Alice Cartwright, the pros and cons of 3 different investments that are available to the average investor. The 3 types of investments that you chose for her first investment are as follows:
Manufacturers income statement expenses are separated : On a manufacturer's income statement expenses are separated into the following three categories:
Find a mentor or colleague and ask them to review : Find a mentor or colleague and ask them to review and provide feedback on the resume you created in Week 4.
What is the return on investment : Florida Inc. has revenues of $750,000 resulting in an operating income of $67,500. Average invested assets total $375,000; the cost of capital is 19%. vocado Company has an operating income of $118,360 on revenues of $1,001,000. Average invested asse..
Capabilities and weaknesses of the candidate : A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. A comparison (compare/contrast) of the capabilities and weaknesses of the candidat..
What is the amount of average invested assets : Howard has an ROI of 26% based on revenues of $408,000. The investment turnover is 2. What is the residual income if the cost of capital is 15%? Crawford Corp. has an ROI of 25% and a residual income of $10,500. If operating income equals $50,000, wh..
Mission vision and value statements : How does a corporation determine what direction they will take in the marketplace? The first three elements of setting this direction are Mission Vision and Value Statements.
Gross margin is expressed : Gross margin is expressed as…
Compute the number of units sold : Naylor Company had $154,800 of net income in 2013 when the selling price per unit was $164, the variable costs per unit were $104, and the fixed costs were $570,600. Management expects per unit data and total fixed costs to remain the same in 2014. C..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Computer applications- clipartthe clipart directory

computer applications- clipartthe clipart directory microsoft provides an abundance of clip art images icons

  What is the difference between the front-end and back-end

what is the difference between the front-end and back-end processes of office automation?what types of tasks would

  Grammack et al claimed the software development life cycle

grammack et al. claimed the software development life cycle is a design cycle in any project where an information

  Strategies for successful deployment of digital dashboards

Successful Deployment of Digital Dashboards - explain three strategies for successful deployment of digital dashboards.

  Improve patient outcomes and billing accuracy

Improve Patient Outcomes and Billing Accuracy at Marshfield Clinic - Lessons to be learned from the Clinic and Resort cases about creating, implementing, and using business intelligence Remember, BI is a complex socio-technical innovation, so think..

  Important information about computer applications

Important information about Computer Applications and What is the difference between custom animation and transition effects? When are they appropriate?

  Do you think that artificial intelligence ai scientists

do you think that artificial intelligence ai scientists will ever be able to design systems that apply common sense in

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Which entity should have the most influence on the design

which entity should have the most influence on the design of a database system management or the workers?give an

  What type of fraud do you consider to be most damaging to

what type of fraud do you consider to be most damaging to an organization and of the analysis of control procedures

  Important information about it and we know that the

important information about it and we know that the acquisition of software is not a simple process whether we build it

  Prepare a paper describing the telecommunication systems

Workplace Telecommunications systems - Prepare a paper describing the telecommunication systems used at your workplace.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd