Explain the method of security control and the channel

Assignment Help Management Information Sys
Reference no: EM131436933 , Length: 4

Scenario: The overarching goal of the Information Assurance and Security organization is to protect the company's electronic, physical, intangible, and people assets. You are the IAS analyst for XYZ company and have been tasked to develop and communicate a "defense-in-depth" strategy using various channels. A "defense-in-depth" strategy, according to Wikipedia, can be defined as "multiple layers of security controls (defense)" that are embedded throughout the information technology environment.

Using Figure 2.5, "Comparing Rich and Lean Communication Channels" (page 43 in Essentials of Business Communications), write a 3-4 page summary evaluating each type of the communication channel and the corresponding "defense-in-depth" security control method. For each channel, answer the following questions

Explain the method of security control and the selected channel.

What are the advantages for the selected channel and method?

What are the disadvantages for the selected channel and method?

If applicable, provide in-text citations and references.

Assignment Requirements

Written communication: Written communication is free of errors that detract from the overall message.

APA formatting: Resources and citations are formatted according to APA style and formatting.

Length: Write 3-4 pages, excluding the references page.

Font and font size: Times New Roman, 12 point.

Attachment:- communication_channels.rar

Reference no: EM131436933

Questions Cloud

What is the equilibrium constant for reaction : b.) What is n? c.) What is delta G for this reaction at 25 degrees Celsius? d.)  What is the equilibrium constant for this reaction at 25 degrees Celsius?
What methods could you use to resolve the conflict : What methods could you use to resolve the conflict? Explain the difference between conflict and competition. Describe a situation where competition is healthy. How does that relate to a business environment?
Find the estimated regression line : Complete the ANOVA table (without the p value).- Do you believe that the date headed is a good predictor of yield? Why or why not?
Mechanism for at least one of chosen methods : Give three methods for the reduction of a ketone and provide a mechanism for at least one of your chosen methods.
Explain the method of security control and the channel : The overarching goal of the Information Assurance and Security organization is to protect the company's electronic, physical, intangible, and people assets. You are the IAS analyst for XYZ company and have been tasked to develop and communicate a ..
What is the mechanism of pottasium malate ion theory : What is the mechanism of pottasium malate ion theory for opening and closing of the stomata
What is the concentration of bromide : What is the concentration of bromide, in ppm, if 124.55 g MgBr2 is dissolved in 3.78 L water.
Identify and explain two reasons why plans might fail : Identify and explain two reasons why plans might fail. Explain why it is important to any change plan to monitor progress and to celebrate success. Explain how organization's core beliefs and core values affect change initiatives.
Empirical formula of testosterone : Find the percent composition of Testosterone % C, % H %O separately list percentage of each . 2) Find the empirical formula of testosterone. Please show we step by step how you got the answer so i can understand it, thank you!

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine how you would design the security controls

Determine how you would design the security controls to mitigate the risks involved. Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment an..

  Discuss the specific crime that you found in each category

Search the Internet or the library and find a real-world example of each of the four types of computer crime. Write a 5 page (1800 words) paper using APA Style. Discuss the specific crime that you found in each category, its effects on the target..

  Present state of mis in an organization of the industry

choose an industry of your choice and evaluate the past and present state of MIS in an organization of the industry

  What are some of the ways that it has become pervasive

What are some of the ways that IT has become "pervasive"? What kinds of portable IT help employees work more efficiently and effectively? What may interfere with productivity?

  Calculate the total payment for apples and watermelon

Unlimited Pickers is a group of workers who have joined together to provide harvesting services to farmers who need to have their crops brought in. Create a query to calculate the payment for each picking for grapes and strawberries

  Do you agree with the widely-accepted thought that family

The cause of a patient's health can be very closely related to their individual attributes. For example, a person with a family history of high blood pressure or mental illness is more likely to develop said illness than someone with no family his..

  Identify and suggest some digital innovation

Prepare a strategy report for the Chief Executive Office and Chief Information Officer which analyses the current state of the organisation and existing concerns

  Which parameter is not part of defining network performance

Which parameter is not part of defining network performance? Which parameter is not part of defining network response time

  Compare the parity check matrix

Despite this difference, both waveforms are denoted by g(t), which implies they both have exactly the same total energy, to be demonstrated next.

  What action the organization should take

Mark works for the Wonder Mattress Company in the IS department. He is in charge of looking at new technologies that come on the market and determining if they can be used for the company. An explanation of what the organization's responsibility sh..

  Hierarchical tree

Write a two-and-a-half-page report briefly describing SNMP and its commands and describing MIB-1/MIB-2, including the hierarchical tree, object identifier (OID), groups, and object types

  Discuss managerial challenges this technology will pose

What driving factors are influencing the development of this technological innovation? Provide a rationale for your response. Discuss managerial challenges this technology will pose. What role do you see for yourself in addressing these challenge

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd