Reference no: EM133748059
IT Information Systems
Overview
The purpose of this tutorial is to evaluate the proficiency of students in discussing a subject from the previous week materials. This activity also allows students to improve their verbal communications.
Timelines and Expectations
Students must describe their answer during the webinar session of the class. students will have max one minute to present their answer and discuss the question. Students also allowed to submit their answer in writing through Moodle.
Learning Outcome 1: Demonstrated understanding, application, and evaluation of the fundamentals of Project Management Tools.
Learning Outcome 2: Demonstrated understanding and application of the fundamentals of Project Management Body of Knowledge (PMBOK) and Agile principles.
Learning Outcome 3: Demonstrated ability to apply the theories and concepts of effective communication as a professional and to be able to function effectively as a leader or member of a team.
Learning Outcome 4: Demonstrated expertise in the analysis of the socio-cultural and technical issues that affect project success and the development of potential solutions.
Assessment details
Students will be assessed on the following criteria:
• The accuracy of the answer
• The consistency of the answer
• The level of the communication
Tutorial No4. (Min 300 words - Max 400 words):
Title: Securing Information Systems for Business Value
Objective:
The objective of this practical assignment is to explore the vulnerabilities of information systems, the business value of security and control, organizational frameworks for security, important tools and technologies for safeguarding information resources, and the role of Management Information Systems (MIS) in enhancing career prospects.
Assignment:
You are tasked with preparing a report that addresses the objectives mentioned above. The report should provide insights, explanations, and practical applications related to each objective.
Requirements:
Objective 1: Explain Vulnerabilities in Information Systems
Define and explain the terms "destruction," "error," and "abuse" in the context of information systems.
Explore various factors and scenarios that contribute to the vulnerability of information systems.
Provide real-world examples of incidents that demonstrate the risks and potential consequences of these vulnerabilities.
Objective 2: Business Value of Security and Control
Discuss the significance of security and control in the context of information systems from a business perspective.
Highlight how effective security measures contribute to maintaining business continuity and reputation.
Provide examples of how breaches in security can lead to financial losses and damage to an organization's brand.
Objective 3: Organizational Framework for Security and Control
Define and explain the components of an organizational framework for security and control, including policies, procedures, standards, and guidelines.
Describe how a strong organizational framework helps in setting the tone for security practices within an organization.
Provide an example of a well-established organizational framework for security and control and its impact on the organization's overall security posture.
Objective 4: Tools and Technologies for Safeguarding Information Resources
Identify and describe essential tools and technologies used for safeguarding information resources.
Discuss how firewalls, intrusion detection systems, encryption, and access controls contribute to enhancing information security.
Highlight the importance of employee training and awareness programs in the effective utilization of security tools and technologies.