Define information assurance and security

Assignment Help Management Information Sys
Reference no: EM131258249

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

Create a 10-slide Microsoft® PowerPoint® presentation. Include the following:

All of the following topics (you may change the order of the topics):

Information is a valuable asset to a company

Risk Management is necessary to reduce losses

Identifying vulnerabilities is a valuable first step

What is an organization security policy?

Who are regulatory organizations?

List at least 3
Social networking
Three potential risks
Three potential threats

Is the SDLC involved with reducing threats? How?

Why is the Cloud so feared?

Is hacking an ethical issue?

Four methods for securing information assets

Key elements if an IT Security Policy

How does encryption work? Why is it considered a premier tool in IT Security?

Five different jobs that deals with IT Security

Three certifications that are very good to have

Auditing is a tool in preventing risks

Define information assurance and security

Employee awareness is necessary for success. Why?

Describe and explain the key elements of recovering from lost assets

What are Internet connected systems? Describe five examples

Two jobs in IT Security that will grow quickly this year

Do not use research quotes or acronyms. You must use your own words.

Videos, audio, photos, diagrams, or graphs as appropriate

Substantial speaker notes to elaborate on the key points of your plan

Audio narration within your presentation

APA Formatting as needed

Create a 1-page Microsoft® Word Executive Summary on this presentation. Include the following:

Goals and objectives of the presentation in summary form

Adequate references to support your findings, information, and opinions

APA Formatting.

Reference no: EM131258249

Questions Cloud

Assumption of constant demand applies : A company orders 925 of its product during each order cycle and the Economic Order Quantity assumption of constant demand applies. The average inventory level for the company is: (round to two decimal places)
What is role of kcc and its relationship to rule of three : What is the role of KCC and its relationship to the rule of three? What are the different criteria that can force replication to occur? How does Active Directory handle simultaneous changes?
Describe three tools that can aid in the replication process : Describe and detail three tools that can aid in the replication process. List and describe some of the best practices for Active Directory Replication.
Find the control resolution of the system for the r-axis : A de servomotor drives the .r-axis of an NC milling machine table, the motor is coupled directly to the table lead screw, whose pitch = 6.25 mm.
Define information assurance and security : Define information assurance and security. Employee awareness is necessary for success. Why? Describe and explain the key elements of recovering from lost assets, What are Internet connected systems? Describe five examples.
Assumption of constant demand applies : A company orders 925 of its product during each order cycle and the Economic Order Quantity assumption of constant demand applies. The average inventory level for the company is: (round to two decimal places)
Manager of a business that cleans airliners : You are the manager of a business that cleans airliners. You are contracted by airlines to perform quick cleanups on planes between flights as well as more extensive cleanings while planes are parked overnight.
Subject-managing information systems : Why was radical design of business processes embraced so quickly and so deeply by senior managers of so many companies? In your opinion, and using hindsight, was its popularity a benefit for businesses? Why or why not? Do you know of a business th..
What is complexity in asymptotic notation of your solution : Write a program in Python to draw the following figure: What is the complexity in asymptotic notation of your solution? Return the "centered" average of an array of ints, which we'll say is the mean average of the values.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Differences between a lan and a wan

Identify the primary differences between a LAN and a WAN. Are the differences between a LAN and a WAN significant? Are the differences increasing over time? Explain.

  Explain how it might be applied in the work environment

Explain how it might be applied in the work environment. Discuss the potential benefits of adding this new technology. Discuss the potential drawbacks of adding this new technology.

  Explain in detail why you believe the risk management

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

  A leader amp manager at the same time1 can you be a leader

a leader amp manager at the same time?1. can you be a leader and a manager at the same time?2. you believe it is

  Question about informaticswhat is the most challenging

question about informaticswhat is the most challenging issue often encountered when implementing more effective

  What is advantage of buying a solution from another company

What is an advantage of buying a solution from another company? IT personnel who understand both the technical IT infrastructure and management of the business fill which role?

  Explain where this project fits into it portfolio roadmap

Briefly explain where this project fits into the IT Portfolio roadmap you included in Part 2 of your ITSP. What functional area does it support? Where should it be included in the timeline - i.e., should it take priority or be done before another ..

  Does cause and effect diagram conflict with flowchart

Does your cause-and-effect diagram conflict with your flowchart? If so, how? - Does the cause-and-effect diagram reveal any process steps that were not previously documented?

  Explain functional areas of operations

What are integrated information systems? Describe the difference between functional areas of operations and business processes. Give examples of a business process.

  Supply chain issues and trendsneed to 2 articles on supply

supply chain issues and trendsneed to 2 articles on supply chain issues and trends. then write two articles and topics

  Calculate a percentage score for each student

MIS301 - Fall 2016 - You have been offered an internship in the School of Management and the Dean has asked you to fix problems with inconsistent data and grading criteria among the different sections of a GMU class over a period of several years.

  Create a business impact analysis on sangrafix

Create a business impact analysis on SanGrafix a video game design company. The BIA should include a descriptive list of the organization's key business areas. The BIA helps to identify and prioritize critical IT systems and components. A template..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd