Important Information

You will get your content on your Email within 2 hours after successful payment.Kindly Email us for any query at uoptut@gmail.com or admin@uoptut.com

  • CMGT 582 ENTIRE COURSE

CMGT 582 ENTIRE COURSE
 
 
WEEK  1
 
CMGT 582 Week 1 Individual Assignment Information Security Priority

 
Scenario: You recently joined an organization that depends on the use of the web to perform most of its major functions. You notice that the staff performing the work tasks that keep the business running mostly ignore information security and it seems like security is not a priority with management or executive leadership.

Write a 1- to 2-page memo (incorporating/following the appropraite APA guidelines) to the Chief Executive Officer (CEO) of the organization designed to increase awareness and priority of information security. Include a convincing argument of why the survival of the organization may depend on information security. Analyze the current situation, and illustrate examples of how ethics play a role. Be sure to include the following topics: 

   €¢  Confidentiality, integrity, and availability  

  €¢  Threats from malicious software   

€¢  Security challenges of cloud computing  

  €¢  Cyberterrorism and information warfare

Submit your assignment using the Assignment Files tab. 
 
 
 
WEEK 2 


CMGT 582 Week 2 Learning Team Security Audit, Part I


Research and select an organization for the security audit, remembering that the assignment spans five weeks - please make sure that all members of your team will have continuous access to the information needed to complete the weekly assignments. Please do not disclose any sensitive information about the selected organization without permission, you may need to mask the identity of your selected organization. Some alternatives to consider in maintaining an organization's privacy include disguising the identity of your target organization, changing specifics about the organization, modifying the data about the organization, or creating an organization based on a hybrid of several organizations.  Analyze and evaluate the ethical issues of the selected organization, including each of the following points:   

€¢  Security-related legal/regulatory compliance (non-privacy related)   

€¢  Computer crime  

  €¢  Intellectual property   

€¢  Licensing Recommend ways to handle/improve how these ethical issues are handled by your organization.

Prepare the first 1 to 1.5 pages of your security audit paper, including a brief description of your selected organization, as well as your analysis of your organization's ethical issues.  Incorporate the appropriate APA format requirements. Submit your assignment using the Assignment Files tab.

Supporting Material:Learning Team Instructions: Security Audit 
 
CMGT 582 Week 2 Individual Assignment Ethical Considerations
 
Create a 10- to 12-slide presentation (not including the title and reference slides) that assesses ethical considerations for maintaining confidentiality, customer data, and protecting intellectual property. Speaker Notes are required. Address the following points in the analysis:   

€¢  Explain ethics, and describe why it is important  

  €¢  Illustrate the difference between morals, ethics, and law   

€¢  Compare some common forms of employee misconduct   

€¢  Cite some examples of corporate social responsibility   

€¢  Summarize some ways in which organizations can improve corporate ethics Include detailed speaker notes within your presentation, and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.
 

WEEK 3
 
CMGT 582 Week 3 Learning Team Security Audit, Part II
 
Working together as a team, assess and determine those privacy related laws and regulations with which your team's organization needs to comply. Collaborate and recommend ways to handle/improve compliance with each law/regulation assessed, and categorize as either "needs improvement" or "non-compliant." Prepare the next 1 to 1.5 pages of the team's security audit paper, including the identification, assessment, and improvement recommendations for privacy law and regulation compliance.

Submit your assignment using the Assignment Files tab.

Supporting Material:Learning Team: Security Audit (Part I) 
 
CMGT 582 Week 3 Individual Assignment Privacy with Ethics Considerations
 
Create a 10- to 12-slide presentation (not including the title and reference slides) that analyzes the following privacy laws and regulations and examines ethical considerations related to them:   

€¢  Family Educational Rights and Privacy Act (FERPA)  

  €¢  Health Insurance Portability and Accountability Act (HIPAA)   

€¢  European Union (EU) Data Protection Address the following points for each of these laws and regulations:   

€¢  Summarize the law or regulation   

€¢  Analyze the specific privacy compliance requirements   

€¢  Discuss organizational compliance challenges and how ethics play a part in these challenges   

€¢  Summarize the penalties for non-compliance   

€¢  Propose how they can be improved Include detailed speaker notes within your presentation, and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.
 
WEEK 4
 
CMGT 582 Week 4 Learning Team Security Audit, Part III
 
As a team, analyze and evaluate at least 10 security-related risks/threats that the organization faces - at this point, do not consider the controls/mitigation in place (this will be addressed in next week's assignment). Assess the probability and impact to the organization if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk. In addition to the table, include a 1/2- to 1-page rationale for your team's assessment.

Prepare the next 1 to 1.5 pages of your security audit paper, which includes the risk analysis table.

Submit your assignment using the Assignment Files tab.

SupportingMaterial:Learning Team: Security Audit (Part II)

 

 
CMGT 582 Week 4 Individual Assignment Policy Implementation
 
 
Create a 10- to 12-slide presentation (not including the title and reference slides) that discusses how policies and procedures are used to implement a security plan. Describe the following:   

€¢  Topics that should be covered by security policies   

€¢  Role of security awareness training   

€¢  Steps that can be taken to help ensure compliance with policies   

€¢  How human resources security is included in security policies and planning  

  €¢  Risk assessment and mitigation strategies related to security controls and safeguards Include detailed speaker notes within your presentation, and support your presentation with appropriate references. Submit your assignment using the Assignment Files tab.
 
Format your paper consistent with APA guidelines and include your references.
 
 
WEEK 5
 
CMGT 582 Week 5 Learning Team Security Audit, Part IV
 
As a team, analyze and evaluate the security controls that mitigate the risks/threats identified during Week Four. Please provide a rationale for how each of the controls identified mitigates the risk to an acceptable level. Prepare the next 1 to 1.5 pages of your security audit paper, including the security controls identified.

Submit your assignment using the Assignment Files tab.

Supporting Material:Learning Team: Security Audit (Part III)

 

 

CMGT 582 Week 5 Individual Assignment  Technologies and Methodologies Evaluation

 

Consider information security risks, including:  

  €¢  Cybercrime and cyber-related crimes   

€¢  Social engineering   

€¢  Mobile computing   

€¢  BYOD (Bring your own device).

Write a 2.5- to 3-page evaluation (not including the title and reference pages) of security technologies and methodologies that can be used to mitigate each of the above information security risks. Support your paper with appropriate references and follow APA format. You may want to refer to the SANS CIS Critical Security Controls document you downloaded earlier this week. Include the following for each type of risk:   

€¢  Description of the risk   

€¢  Security technologies and methodologies that can be used to mitigate them  

  €¢  Rationale describing how the risks are mitigated to an acceptable level

Submit your assignment using the Assignment Files tab.

 

WEEK 6
 
CMGT 582 Week 6 Learning Team Security Audit, Part V

 

Finalize your team's Security Audit by incorporating all the previous instructor feedback and compiling all the previous weeks' documents into one seamless Audit. Support your paper with appropriate references and follow APA format.

Submit your assignment using the Assignment Files tab.

SupportingMaterial:Learning Team: Security Audit (Part IV)

 

CMGT 582 Week 6 Individual Assignment  Security Audit

 

You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. 

Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

  • Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing    €¢  Compliance with privacy related laws and regulations    €¢  Adequacy of security policies and security awareness training    €¢  Identification of security related risks/threats Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format:

 

  • Area: From the list above        €¢  Example: Security related risks/threats    €¢  Potential Risk to be Reviewed: Describe the risk        €¢  Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data    €¢  Evaluation of Tools and Methods: Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.        €¢  Example: Determine whether anti-virus software is in use        €¢  Example: Determine whether virus signatures are periodically updated        €¢  Example: Determine whether periodic virus scans are performed    €¢  Criteria/Measures to be Used: Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).        €¢  Example: 100% of servers and PCs have virus software installed        €¢  Example: 100% of the virus software installed is set to automatically update, including virus signatures.        €¢  Example: 100% of the virus software installed is set to automatically perform a scan at least weekly Your grade on the assignment will be based on how well you address:

 

  • The identification of potential ethical, legal/regulatory, privacy, and security related issues (20%)    €¢  The evaluation of the tools and methods used to mitigate any ethical, legal/regulatory, and privacy related issues identified, as well as the tools and methods used to perform the review steps (20%)    €¢  The evaluation of the tools and methods used to mitigate any security-related issues identified, as well as the tools and methods used to perform the review steps (25%)    €¢  Criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., how will you determine that the risk has been mitigated to an acceptable level) (20%)    €¢  Quality of written communication    €¢  Use of APA format/style Include a 1/2- to 1-page executive summary and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.

 

CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC)

 

Consider the security systems life cycle. Write a 2- to 3-page evaluation (not including the title and reference pages) of the security systems life cycle. Support your paper with appropriate references and follow APA format. Include the following:  

  €¢  Evaluate the key phases that comprise the security life cycle  

  €¢  Analyze the specific steps that occur in each phase 

 €¢  Classify both management and non-management IT security positions that perform these steps and briefly describe their role. Submit your assignment using the Assignment Files tab.

Write a review

Note: HTML is not translated!
    Bad           Good

CMGT 582 ENTIRE COURSE

  • Product Code: 937
  • Availability: In Stock
  • $50.00


Tags: CMGT 582 ENTIRE COURSE