Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Tag Archives: Explain how data breaches can happen and describe challenges modern organizations face in maintaining computer security.

November 27, 2024
November 27, 2024

Systems security

At-Home Final Exam Essay Directions CIS250 – Management of Information Systems SCENARIO-CHIEF SECURITY OFFICER As the Chief Security Officer for a major retailer, you heard the recent headline news that one of your competitors recently experienced a major security breach where all their customer information was hacked and compromised. You have been directed to compose a statement for the Board of Directors explaining the importance of information systems security, how data breaches can happen, the many challenges modern organizations face in maintaining computer security, and how organizations should respond to a data breach. Systems security

 

 

Systems security

 

The CEO is also requiring you to submit a proposal detailing what the company needs to do to prepare for and prevent any similar security breach. It should include what resources, personnel, and actions are required. With security being a hot topic at the “C” level of the organization, the CEO also wants your input and expertise on three other pending initiatives for the company. The first is from the HR Department for a policy on employee use of social media. The other two are from the IT Department, which wants to embrace modern business trends for implementing BYOD and utilize the cloud to replace local IT hardware, software, and applications the company uses to manage and operate its business and operations. REQUIREMENTS For your final essay, you will develop an original response to fully address the topic areas and concepts in detail from the Project Scenario presented above. These should include, at minimum: · Explain the importance of information systems security., Explain how data breaches can happen and describe challenges modern organizations face in maintaining computer security., Explain how organizations should respond to a data breach., Explain what a company needs to do to prepare for and prevent security breaches.,  Explain what resources, personnel, and actions are required to support and respond to security breaches., Describe how and why an HR Department might implement a policy on employee use of social media., Describe considerations for a company implementing BYOD.,  Describe considerations for a company utilizing the cloud to replace local IT hardware, software and applications that the company uses., Your essay response should be based on what you’ve learned throughout the course, correctly utilize appropriate terminology and MIS concepts, and be professionally formatted with a table of contents, section headings (as appropriate), page numbers, and a title page including your name, MEID and course and section numbers. The overall 3- 5-page paper, along with all topic sections, should have a clear introduction, body, and conclusion. You are required to cite all sources used in writing your essay with APA citation formatting. At a minimum, you must use your textbook as a source of information; however, you may include other sources. Systems security Review the Grading Matrix for more information on how essays are graded and the tutorials for information on how to cite sources correctly.