Explanation of the benefits of actions

Assignment Help Basic Computer Science
Reference no: EM131524479

Scenario

You just became the lead security person at a small company. Assume normal setup, e-mail, company Web site, internal servers, and so forth. Although your title is not chief security officer (CSO), you report directly to the chief information officer (CIO). The person who was previously in your position moved out of state and does not respond to calls or e-mails. The CIO tells you, "You have 90 days to get that area together! I want to see your high-level approach by Monday morning." You have three inexperienced but energetic people on your team, and it is Friday afternoon.

Discuss the following:

  • What are the 4 key actions you need to take within the first 90 days (or sooner)?
  • Who will be involved?
  • Include an explanation of the benefits of these actions  

Remember, this is high level, so write two or three paragraphs with the 4 action items highlighted. The majority (90%) of your report will outline what has to be done, and the remainder (10%) should include how this will be done.

Reference no: EM131524479

Questions Cloud

Describe relationship : When it comes to classes and objects I have heard and used many different ways to describe their relationship.
Identify the internal and external influence on organization : Identify the internal and external influences on the organization that may have caused the shift in leadership style. Be sure to explain your choices.
Knowledge in the past : How have you applied this knowledge in the past, or how do you think you will apply it in the future. Answer in a few sentences.
Should pierre be willing to increase the option offers : Pierre, a book broker, is about to sign a contract to buy the rights to a book about twin teenage computer-security sleuths titled Nan and Dan vs. the Monika.
Explanation of the benefits of actions : You just became the lead security person at a small company. Assume normal setup, e-mail, company Web site, internal servers, and so forth.
What is the expected monetary value of the option : Shu Mei Wang is going to start a new business to provide a geographical-information system (GIS) to be used by small businesses in selecting promotions.
What approach would you use to value the asset : The lead time for delivery of the largest offshore platforms for oil and gas drilling and collecting is now 2 years. ConExoco Petroleum is thinking about.
Discuss common communication architectures : Discuss Common communication architectures and standards in health care and the implications and significance they have in the health care setting.
Should hopfer take the pioneer option : A biopharma project being pursued by Hopfer Pharmaceutical has a negative NPV of -$28 million Still, Hopfer may participate in this project as a "pioneer".

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  The main tenets of measurement theory

write a brief paper that outlines the main tenets of measurement theory. Individual project: Develop a presentation on the subject and present it to your class.

  Collection of authors

Modify the attached Book class to accommodate multiple authors using one of the components from the Java Collection Framework. Requires one book with an isbn and a Collection of authors. Use generics.  Modify the JUnit test to accomidate the chang..

  In what ways is network design an iterative process

When responding to an RFP, why is it important to pay attention to the business style of the organization that is requesting the proposal?

  Decomposition dependency preserving

4. Let R(ABCDEFGH) be a relation and F= {ABE, CD, DE, FGA}. Decompose R in BCNF. Is your decomposition dependency preserving?

  Advantages of using wireless communication in business

Wireless technology can offer businesses more flexible and inexpensive ways to send and receive data. List the advantages of using wireless communication in business.

  What is the difference between veri?cation and validation

What are the advantages of allowing software users to identify and report bugs? What are the disadvantages?

  What observations tell you that this is true

The moon is poorly approximated by diffuse or Phong shading. What observations tell you that this is true?

  Inadvertently broadcast at the link layer

In the absence of this requirement, what would happen if a packet addressed to IP address A were inadvertently broadcast at the link layer? What other justifications for this requirement can you think of? Must have a minimum of 150 words.

  Highest and lowest temperatures

Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. The program should output the average high, average low, and highest and lowest temperatures of the year. Your program must ..

  How many fragments are generated in link that has mtu

How many fragments are generated? What are values in the various fields in IP datagrams generated realted to fragmentaion?

  Terms of the actual details

What does it means to your friend in terms of the actual details of how the house would be built.

  State and explain storage management strategies

What are the operations of page replacement algorithm?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd