Defend against unauthorized access and data loss

Assignment Help Management Information Sys
Reference no: EM131161092 , Length: 5

Step 1: Read "SANS Institute: What Every Tech Startup Should Know About Security, Privacy, and Compliance" (https://www.sans.org/reading-room/whitepapers/compliance/tech-startup-about-security-privacy-compliance-35792) white paper designed to help founders for tech startups ask the right questions about information security.

Step 2:Pick one of these tech startups! As a founder/CEO for one of these startups, you must have information security in mind in order to defend against unauthorized access and data loss potentially compromising intellectual assets, sensitive data and the company's reputation in the marketplace.

Acorns

PillPack

Uber

"Acorns is hoping to make saving and investing as simple as possible. After connecting their debit and credit cards, the app gives users the ability round up all purchases to the nearest dollar. The extra amount is then added to a diversified investment portfolio."

"PillPack is a full service pharmacy that delivers a better, simpler experience. Our pharmacists manage all your refills. From phone calls to faxes and follow up, they handle everything for you."

"Uber is a technology platform that is evolving the way the world moves.
By seamlessly connecting riders to drivers through our apps, we make cities more accessible, opening up more possibilities for riders and more business for drivers."

Security Concerns:

  • Credit Card Payments
  • PCI Compliance
  • Securing data in motion

Security Concerns:

  • HIPAA Compliance
  • Privacy/Patient Data
  • Credit Card Payments

Security Concerns:

  • Hiring/pre-screening competent drivers
  • Prevention of unauthorized third-party access to driver or rider information
  • Credit card transactions
  • https://www.crunchbase.com/organization/acorns-grow#/entity
  • https://www.acorns.com/
  • https://angel.co/pillpack
  • https://www.pillpack.com/
  • https://angel.co/uber?utm_source=companies
  • https://www.uber.com/?exp=hp-c

Step 3: Project Requirements

Identify two (2) information security threats that are likely to occur and describe how each threat would result in an adverse effect for the company. (p.106, Table 3-2)

Backup your assertions with a real-world case. Research a similar company (same industry/market/size and/or type) that has been exposed to a similar threat and describe the adverse impact to the organization (e.g. intellectual property theft, data loss, loss of reputation, financial damages, etc.).

Identify two (2) information security controls (p.170, Table 5-1) and discuss how the control would help to reduce, transfer, accept or avoid the risk. (pp. 276-277)

Note: Base your answers on high-level descriptions and security concerns provided. You are not expected to research these tech companies in any depth other than to help you understand the product or service offering in more detail.

Technical Requirements:
Your project report should be formatted professionally in MSWord (.DOC, .DOCX) file format

3-5 pages in length, double-space using 12pt font and normal margin spacing.

Reference no: EM131161092

Questions Cloud

What is sam''s compensating variation for the proposed policy : What is Sam's compensating variation for the proposed policy? Can you compute it without knowing his preferences? Why or why not?
Calculate the change in albert''s consumer surplus : Using the method described in Section 6.2, calculate the change in Albert's consumer surplus.
How politics in health care organization motivates employees : Examine the impact of motivation on quality, safety, and legal risks associated with health care organizations. Assess how politics in a health care organization motivates and demotivates employees and recommend strategies to mitigate the challenge..
How does that revenue compare to her economic losses : How much revenue will the government raise by taxing Beatriz? How does that revenue compare to her economic losses? Does the new tax raise enough revenue for the government to compensate her for her loss?
Defend against unauthorized access and data loss : defend against unauthorized access and data loss potentially compromising intellectual assets, sensitive data and the company's reputation in the marketplace.
Evaluate each decision separately including calculations : Evaluate each decision separately in full detail including calculations, as necessary. The evaluation should be included as part of the memo discussion, not a separate component.
How did his cost of living change according to this measure : Create a Laspeyres price index using June as the base period (that is, use Arnold's consumption bundle for June to create the fixed weights). How did his cost of living change according to this measure?
Describe a fictional healthcare organization : Describe a fictional healthcare organization: type, size of staff, and amount and type of patients it is able to serve. Establish the need for a system.
Describe current industry trend that has significant impact : Identify the current industry trend that has the most significant impact on your chosen organization's financial performance. Indicate the trend's impact on the financial performance of the organization.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop an implementationmanagement plan for a wireless

develop an implementationmanagement plan for a wireless network including defining the organizational problems like

  Impact of that technology on the criminal justice system

Both federal and state prosecutors perform their duties in the midst of an explosion of technology. The impact of that technology on the criminal justice system's roles

  Explain the importance of system architecture

System Architecture and Emerging Technology Benefits - Explain the importance of system architecture

  Analyze the key functions a chief information officer

Analyze the key functions a Chief Information Officer (CIO) performs to define, develop, implement, and support ongoing security countermeasures

  Developing a research manuscript

What do you believe is the most important consideration when developing a research manuscript? Support your response

  Differente types of information systems

Differenciate the differente types of information systems - relationship among the varios business and informaition process in the REA.

  About information systems

In this essay, you will analyze five Google technologies that are current under research and development, including the self-driving automobile and four other technologies of your choice.

  What is the amount sold by each salesperson

Use the PivotTable to calculate and summarize the data. Once you have created a PivotTable, change the order amount to currency. What is the amount sold by each salesperson? What is the total amount sold in each month

  Challenges of enforcing information security policies

Describe the overall objectives of creating information security policy for this institution. Analyze the benefits and challenges of enforcing information security policies within government agencies and organizations.

  How will companies like aol survive

Dail-up Technology and Is dial-up a dying technology? If so, how will companies like AOL survive?

  Compares and contrasts logical and physical models

As you have learned, an enterprise information architect must not only know what data users within a company produce or consume, but also how they do so. Compares and contrasts logical and physical models

  Business technology and communication - describe your choice

Describe and explain your choices - Choose the most effective technology, medium, or combination of media for each of the following messages.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd