Discuss with your team the types of data

Assignment Help Computer Engineering
Reference no: EM132157446

Question: Considering the Week Two Learning Team collaborative discussion, "Data Types and Risks,"(at the bottom of the instructions) you had with your team, create a PowerPoint® presentation for Ben. Its a requirement to use information from the attached chapter as one of the references for the PPT

The 8- to 10-slide media-rich Microsoft® PowerPoint® with speaker notes should include:

• The main uses for an IT system in Ben's business

• The most common risks associated with this system

• A prioritized list of the risks identified

• Mitigations to handle the risks

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation.

Scenario: Learning Team Collaboration: Data Learning Team collaborative discussion, "Data Types and Risks," use this scenario to create the PPT

• You have been contacted by Mr. Ben Rutherman. Ben owns a custom graphics shop with customers from the business community, as well as from schools, non-profits, and individuals. His brother recently had information stolen from his business, and Ben is very concerned about the safety and security of his business, including his e-commerce website.

• For the next few weeks you will be working on an Information Security Policy for Ben and his graphics shop. This week you need to discuss data types with your team. In Week Three, you will look at Disaster Recovery and Business Continuity. In Week Four, you will look at protecting the data using access controls and authentication. The final security piece will be added in Week Five, managing wireless, cloud, and application security, with the completed project submitted as the Week 5 Individual assignment, "Security Policy Presentation: Final Project."

Discuss with your team the types of data that are stored, accessed, and transferred to others at Ben's graphics shop. Assess the risk to this type of data and ways to mitigate the identified risks.

Reference no: EM132157446

Questions Cloud

Assumption that the alternative hypothesis : In a test of hypothesis, the sampling distribution of the test statistic is calculated under the assumption that the alternative hypothesis is true.
Create robust interaction and dialogue : The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students.
Identify several best practices for manging the project : Identify several best practices for manging the project while managing unexpected risks. Which tools would you use to help manage risks?
Explain your purpose in sending the business plan : Introduce yourself and your venture. Explain your purpose in sending the business plan. Detail the next steps and the potential for your business.
Discuss with your team the types of data : Discuss with your team the types of data that are stored, accessed, and transferred to others at Ben's graphics shop. Assess the risk to this type of data.
Examine lenscrafters value chain : Examine LensCrafters' value chain and evaluate its effectiveness to operations in terms of quality, value creation, and customer satisfaction.
Compute the probabilities associated with finding : Compute the probabilities associated with finding exactly one defect.
Prepare an executive summary based on your analysis : MBA 620 Financial Decision Making Project - Accounting for Managers, University of Maryland University College, USA. Prepare an executive summary
Identify and name one open-source cryptographic library : Identify and name one open-source cryptographic library for each of the following programming languages. Provide a web link to the library doc page.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd