Reference no: EM132158454
Read the following scenario:
Company M designs, manufactures, and sells electronic door locks for commercial buildings. The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues.
Over 5,000 wholesalers and distributors access the Company M business-to-business (B2B) Web site to place orders and track fulfillment.
In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones.
In addition, the company dealt with four serious malware events that originated from an unpatched server, an insecure wireless network used in the manufacturing plant, an insecure remote connection used by a sales person, and a headquarters employee who downloaded a game from the Internet to her workstation.
Three of the malware incidents resulted in files that were erased from the company's sales database, which had to be restored, and one incident forced the B2B Web site to shut down for 24 hours.
You are tasked to give a presentation to the CEO and other IT management. Please ensure that the presentation addresses the following questions:
• Identify and discuss technological and financial risks that Company M faces.
• Which domains of the IT infrastructure were involved during the four malware events?
• What types of security policies should Company M institute to mitigate those risks?
Submission Requirements
• Format: Microsoft PowerPoint Presentation or Prezi Presentation
• Ensure the presentation has content, images/graphics, theme and easy-to-read text
• Citation Style: APA format (include at least 2 APA resources)
• Length: 10-20 slides
|
Interpreted by reasonable minds in one of two ways
: A contract term could be interpreted by reasonable minds in one of two ways - and the rules of construction don't help.
|
|
Develop and comment on an it planning process
: Develop and comment on an IT planning process for ModMeters to accomplish the demands as set out in the ModMeters case study.
|
|
Which domains of the it infrastructure were involved
: In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones.
|
|
What measurements would be needed
: Prepare a short paper (3 to 5 strong paragraphs) in which you explain how researchers could use the TAM model to explore the factors influencing employee.
|
|
Identify and discuss technological and financial risks
: The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues.
|
|
How could you use model to help improve cyber security
: Now, describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.
|
|
Describe the business environment and identify the risk
: As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace.
|
|
Contemporary financial planning investment decision
: You should review compare, contrast and synthesize the points presented within the articles to reach a conclusion on how professionals feel on the issue being
|
|
Develop and comment on an it planning process
: Develop and comment on an IT planning process for ModMeters to accomplish the demands as set out in the ModMeters case study.
|