Discuss companys likely future purchases for cybersecurity

Assignment Help Management Information Sys
Reference no: EM131358140

Assignment: Cybersecurity in Business and Industry

For this paper, you will research and construct a corporate profile for a publicly-traded company which operates in cyberspace and therefore has a need for cybersecurity products and services. A list of approved companies appears at the end of this assignment description. If you wish to use a company not on the approved list you must first obtain the approval of your instructor.

Research

1. Review the company's website to learn about the products and services which it sells.

2. Retrieve and review the Hoovers profile for the company. The company profile web pages are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "Print Quick Report" menu item under My Tools.

2358_Company Profile Web Pages.jpg

3. Download and review a copy of the company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

4. Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.

5. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)

6. Using the course readings and other materials, develop a "Buying Forecast" for likely purchases by this company for cybersecurity related products and services.

Write

1. An introduction section which identifies the company being discussed and includes a brief overview of the company including when it was founded and significant events in its history.

2. An overview of the company's operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles.

3. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected?

4. A separate "Buying Forecast" section in which you discuss the company's likely future purchases for cybersecurity products and services. In this section, you should identify and discuss three or more categories of cybersecurity products or services which this company is likely to purchase.

Your three to five page Buyer Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 1 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131358140

Questions Cloud

Write a definition essay post on the term motivation : Identify future writing skill needs and your motivation to improve deficiencies - Discuss importance of completing all assignments on time and incorporating instructor feedback.
Analyze psychological profiling in law enforcement : There is a documented psychology to criminal investigators and investigations. It is important to analyze how our biases and assumptions influence our assessment of individuals and to analyze and understand psychological profiling in law enforceme..
Experience installing the microsoft office suite software : Describe your experience installing the Microsoft Office Suite software. Indicate the version of the software that you installed, and the name and version of the operating system that you used.
Pareto analysis to the chart of top ten commodities : Applying the concept of Pareto analysis to the chart of top ten commodities by descending $ spend, write a ½ - 1 page executive summary of your recommendation for cost savings opportunities
Discuss companys likely future purchases for cybersecurity : CSIA 350 6381 (2172)- A separate "Buying Forecast" section in which you discuss the company's likely future purchases for cybersecurity products and services.
Discuss the advantages to using hierarchical addressing : Discuss the advantages to using hierarchical addressing and its relevance to this week's VLSM topic. How does hierarchical addressing help with routing efficiency?
Compute the transformation matrix for a lamina : Compute the reduced stiffness [Q] and compliance [S] matrices, and the intralaminar shear stiffness [Q∗ ] and compliance [S ∗ ] matrices for a lamina with E1 = 35 GP a, E2 = 3.5 GP a, ν12 = 0.3, G12 = 1.75 GP a, G23 = 0.35 GP a
Explain the major ethical implications of the selected study : Briefly summarize the main details of your chosen social psychology research study. Identify the main research method(s) used in the study (e.g., case study, experiment, observation, etc.) - Discuss whether or not you believe the research methodolo..
How do these ethical policies aid the company : Many companies have incorporated ethic policies to guide their staff. Additionally, almost all professional organizations have ethic policies to guide their professional's behavior.How do these ethical policies aid the company?How do they guide the..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe a recovery that would not be feasible to test

Describe a recovery that would not be feasible to test with a real-world test. Include the reason(s) that the real-world test could not be done. Elaborate on the steps and processes you would have to do to try to insure that your recovery plan wou..

  System and network monitoring solutions

IT Market - I need to know the markets status, the growing in next 5 years. I'm performing a research for the product HealthMonitor that contain all these features.

  What trend in technology

What trend in technology had the most influence on new and creative ways to enhance patient care in 2009 and the years immediately subsequent?

  Explain the interest that stakeholder has development ea

First, explain the interest or concern that the stakeholder has in the development of the EA. Then, identify their "class" or role in the EA as one of the four shown above (Key Player, Keep Satisfied, Keep Informed, or Minimal Effort). Finally, br..

  Supply chain and purchasing processexplain the role of a

supply chain and purchasing processexplain the role of a buyer in an organizations supply chain and purchasing process.

  Draw the decision tree that represents the scenario

Draw the decision tree that represents this scenario. Use proper symbols and label all branches clearly. Calculate the expected value of this game.

  Why the lynx companys functional system has been successful

Identify five reasons why the Lynx Company's functional system has been successful (be sure to expand your discussion on each reason)

  Provide a brief definition of revenue

Revenue, Revenue Recognition and Measurement and In an accrual accounting system, revenues are recognized as goods are delivered or as services are rendered

  Estimate the mean and standard deviation of sir

Using a Gaussian random number generator to represent independent lognormal shadowing about the distance-dependent mean path loss, estimate the mean and standard deviation of SIR at points A, B, and C indicated in Figure.

  Write it in your own words to avoid plagiarism

The assignment should be exactly like the example paper. You just need to change the content in the "column I & J" and write it in your own words to avoid Plagiarism.

  Why do virtual memory systems include a modified bit

Why do virtual memory systems include a modified bit in the page table entry?

  Write research paper on security systems

Write research Paper on Security Systems. The paper must be original (about 2,500 words) based on current information and ongoing research in the field using Library resources

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd