Discuss what regulatory benchmark you will be using

Assignment Help Management Information Sys
Reference no: EM131804411

Prompt: For this milestone, write a test plan that details your approach to the security breach analysis and recommendations (final project). You can do research to include any other topics you found relevant, but you should at least discuss the following:

· Introduction

o Introduce your company (Limetree Inc.) and state its capabilities.

o State your goal for the security breach analysis project.

· Scope:

o Define the scope of the project.

· Hardware and Software:

o Create a list of hardware and software present.

· Resources:

o Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).

· Timeline and Benchmarks:

o Discuss your timeline for the project (how long it will take and why).

o Discuss what regulatory benchmark you will be using to make vulnerability determination.

· Approach:

o State your approach (Example: Review interview result, analyze virtual environment, review industry best practices, etc.).

o Define how you will categorize your findings (Example: low, medium, high).

Guidelines for Submission: Your responses must be submitted as SEVEN to NINE (7-9) pages long excluding references and cover page as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least four sources cited in APA format.

Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references.

Reference no: EM131804411

Questions Cloud

Describe new developments in retailing : Describe new developments in retailing. Four major trends are evident in retailing today-interactivity, m-commerce, pop-up shops.
Types of controls that firms can use to evaluate strategy : In your own words discuss the three types of controls that firms can use to evaluate a strategy. Explain examples of each of these controls.
Marketing tools to communicate with children : By combining several of its databases of parental purchasing behavior and the results of its market research, Maxwell, Inc., believes it has the tools
Satisfies and retains valuable customers : A customer-centric company builds long-lasting relationships by focusing on what satisfies and retains valuable customers.
Discuss what regulatory benchmark you will be using : Discuss what regulatory benchmark you will be using to make vulnerability determination.
What will be most important to investigate : In evaluating the department in terms of its increase in sales and expenses, what will be most important to investigate
Review the irs pronouncements : Your client, Ned Bovine purchased a $2 million life insurance. Review the IRS pronouncement(s). Does it raise a need for new information to solve this question?
Contemplating implementing new strategy in firm : In your own words evaluate the part corporate culture can play when contemplating implementing a new strategy in a firm.
How has method identified customer relationships : 1. How has method identified customer relationships with the organization? What does the company do to nurture those relationships?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some it particular strategies for negotiating

As we look at the SDLC, what are some types and some phases that can require a more deft touch when it comes to proper management? What are some IT particular strategies for negotiating with all departments to get the proper resources and budget ..

  Evaluation of the use of the security life cycle

Consider the systems development life cycle (SDLC), security systems life cycle, and information systems security certification and accreditation. Write a 3- to 5-page evaluation of the use of the security life cycle

  How is the separation of the programming accomplished

How is the separation of the programming and operating functions accomplished in a properly functioning IT environment?

  Explore importance of mis in relation to datadriven decision

Explain the importance of MIS in relation to data-driven decisions. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools.

  What steps will you take to answer the questions

Choose a technology to question in your final project in preparation for your presentation at the Online Technology Conference and nswer the following questions

  How you personally conduct business

PowerPoint presentation of technology - how the use of technology figures into how you personally conduct business. As well as how do you think you will be conducting business in the future?

  Evaluation and application of the communication model

Task - Evaluation and application of the communication model. Evaluate an IMC campaign for an Australian organisation you either work for or one for which you would like to work

  Briefly summarize your chosen examples function and design

briefly summarize your chosen example's function and design. Next, determine whether or not you believe the example could function as effectively in a non-distributed architecture as it had in a distributed architecture.

  Research the agile methodology

Research the Agile Methodology, describe its role in system development, and expand on the pros and cons of applying its principalas

  What is data security and how do disaster recovery planning

What is data Security?The relation between disaster recovery planning and Data Security.How do Disaster recovery planning and data Security affect an organization?What are the Causes of Disaster recovery and data Security issue and also recommended..

  Analyze three given apparent security vulnerabilities

Ascertain apparent security vulnerability and analyze at least three such vulnerabilities. Such analysis should entertain possibility of faulty network design.

  Map the arguments about a moral claim

Choose one of the media articles or case studies and use the title of the article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd