Explain the key elements of recovering from lost assets

Assignment Help Management Information Sys
Reference no: EM131653387

Assignment

You have been asked by the CIO to create a Microsoft PowerPoint training presentation along with an accompanying summary guide handout for new employees in the IT, Accounting/Finance, and Engineering departments.

Create a 2-slide Microsoft PowerPoint training presentation which describes each goal, its definition, values, and importance to your company. Include the following:

• Refer to the topics as listed in the linked Week Five Individual assignment and use which topics are appropriate for this assignment
Adequate references to support your findings, information, and opinions

• A minimum of two outside academic references are required
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation
• APA Formatting

• Create a 1-page Microsoft Word Summary Guide on this presentation. Include the following: Goals and objectives of the presentation in summary formAdequate references to support your findings, information, and opinionsA minimum of two outside academic references are requiredAPA Formatting

Your company will hold a National Convention of all of the executive staff members from all 15 locations of the company in the U.S. next week. The CIO has chosen the topic, "IT Security Awareness" and has chosen you to create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO has stressed you use creativity to make the presentation as interesting as possible.

• All of the following topics (you may change the order of the topics):

o Information is a valuable asset to a company
o Risk Management is necessary to reduce losses
o Identifying vulnerabilities is a valuable first step
o What is an organization security policy?
o Who are regulatory organizations?

- List at least 3

o Social networking
o Three potential risks
o Three potential threats
o Is the SDLC involved with reducing threats? How?
o Why is the Cloud so feared?
o Is hacking an ethical issue?
o Four methods for securing information assets
o Key elements if an IT Security Policy
o How does encryption work? Why is it considered a premier tool in IT Security?
o Five different jobs that deals with IT Security
o Three certifications that are very good to have
o Auditing is a tool in preventing risks
o Define information assurance and security
o Employee awareness is necessary for success. Why?
o Describe and explain the key elements of recovering from lost assets
o What are Internet connected systems? Describe five examples
o Two jobs in IT Security that will grow quickly this year

• Do not use research quotes or acronyms. You must use your own words.
• Videos, audio, photos, diagrams, or graphs as appropriate
• Substantial speaker notes to elaborate on the key points of your plan
• Audio narration within your presentation.

Reference no: EM131653387

Questions Cloud

Businesses and individuals are making financial decisions : When businesses and individuals are making financial decisions, most of their decisions are forward-looking,
The supervisor goal when designing the ideal department : Explain the supervisor’s goal when designing the “ideal” department. What is the reengineering process? How does it help improve quality?
Suggest that all employees take a lie detector test : During an investigation, can an employer require or suggest that all employees take a lie detector test?
Distinction between risk response and contingency plan : What is the distinction between a risk response and a contingency plan?
Explain the key elements of recovering from lost assets : Describe and explain the key elements of recovering from lost assets. What are Internet connected systems? Describe five examples.
Explored numerous ethical dilemmas : We have explored numerous ethical dilemmas that are unique to the field of criminal justice.
Define what was jackie robinson elements in life : How should one go about living a meaningful life if one is in circumstances of racism similar to Jackie Robinson
Initial resistance of resistor : Find (a) the initial resistance of each resistor, and (b) the total power delivered to the resistors after one resistor has been heated.
Importance of communication during organizational change : Discuss the importance of communication during organizational change.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd