Page 1

CIS 550 Week 2 Case Study 1: Stratified Custom Manufacturing, Part 2

For more classes visit www.snaptutorial.com Case Study 1: Stratified Custom Manufacturing, Part 2 Due Week 2 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing� located in Part 2 of the textbook. Write a three to four (3-4) page paper in which you: Describe the multicultural and multinational issues surrounding information security. Describe the security challenges presented when an organization has multiple directors leading information technology departments. Develop an alternative organizational structure for Stratified Custom Manufacturing to support its security initiatives. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:


Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe current security challenges facing organizations today. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 3 Case Study 2: Cenartech Security Case, Part 3B

For more classes visit www.snaptutorial.com


Case Study 2: Cenartech Security Case, Part 3B Due Week 3 and worth 70 points Read the case study titled “Cenartech Security Case, Part 3” located in Part 3B of the textbook. Write a three to four (3-4) page paper in which you: Recommend a policy change to further protect Cenartech such as the one the CEO issued regarding the notification of the IT department when employees join or leave the company. Evaluate Brian’s actions in the beginning of the case and determine what he should have done differently in order to prevent the attack. In response to the previous question, speculate the challenges Brian would have encountered in pursuing your suggested changes. Explain what you would have done differently in attempts to help the company succeed, in part by mitigating risks, had you been the CEO of Cenartech. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.


The specific course learning outcomes associated with this assignment are: Recommend proper courses of action to overcome security challenges in an organizational environment. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 3 Case Study 2 Cenartech Security Case, Part 3B

For more classes visit www.snaptutorial.com Case Study 2: Cenartech Security Case, Part 3B Due Week 3 and worth 70 points Read the case study titled “Cenartech Security Case, Part 3� located in Part 3B of the textbook.


Write a three to four (3-4) page paper in which you: Recommend a policy change to further protect Cenartech such as the one the CEO issued regarding the notification of the IT department when employees join or leave the company. Evaluate Brian’s actions in the beginning of the case and determine what he should have done differently in order to prevent the attack. In response to the previous question, speculate the challenges Brian would have encountered in pursuing your suggested changes. Explain what you would have done differently in attempts to help the company succeed, in part by mitigating risks, had you been the CEO of Cenartech. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Recommend proper courses of action to overcome security challenges in an organizational environment. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.


**********************************************************

CIS 550 Week 4 Case Study 3: Stratified Custom Manufacturing, Part 3E

For more classes visit www.snaptutorial.com Case Study 3: Stratified Custom Manufacturing, Part 3E Due Week 4 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing” located in Part 3E of the textbook. Write a three to four (3-4) page paper in which you:

Speculate whether it is a violation of the law for an employee to remove confidential records from the workplace without permission, without special controls, and against policy. Recommend a punishment for a policy violation involving removal of confidential records for a “harmless” reason such as catching up on reading them at home.


Speculate how your recommendation would change if the violator used confidential records for a different purpose, perhaps using them to perform identity theft. Assess the legality of earning a degree from an unaccredited private college that uses “life experience” to grant diplomas. Take a position on the ethical issues behind paying for and receiving such a degree and assess the use of such a degree on an employment application or in a resume. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or schoolspecific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are: Describe current security challenges facing organizations today. Recommend proper courses of action to overcome security challenges in an organizational environment. Use technology and information resources to research issues in information security.


Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 5 Case Study 4: Stratified Custom Manufacturing, Part 4D

For more classes visit www.snaptutorial.com Case Study 4: Stratified Custom Manufacturing, Part 4D Due Week 5 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing� located in Part 4D of the textbook. Write a three to four (3-4) page paper in which you: Take a position based on the facts you have seen regarding this lawsuit on whether you believe SCM is going to face any liability. Defend your position with supporting evidence.


Assess whether you believe SCM has had an ethical lapse in how it created and operated its vendor network, regardless of the legal outcome. Pretend you are listening in on the meeting with Drew Cubbins and Takio Sumi. Identify what you believe would be the main points of the conversation. Describe how you, as an Information Systems Auditor, would mitigate the organization’s risk. Use at least two (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the legislation and regulations concerning the management of information in organizations. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.


**********************************************************

CIS 550 Week 6 Assignment: Digital Signature, Part 5A

For more classes visit www.snaptutorial.com Assignment: Digital Signature, Part 5A Due Week 6 and worth 70 points Write a three to four (3-4) page paper in which you: Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court. Describe the security challenges of using digital signatures. Graphically depict the overall process of creating and assigning a digital signature. Note: The graphically depicted solution is not included in the required page length.


Graphically depict the process in the context of email messaging. Note: The graphically depicted solution is not included in the required page length. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe current security challenges facing organizations today. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************


CIS 550 Week 7 Case Study 5: Stratified Custom Manufacturing, Part 5F

For more classes visit www.snaptutorial.com Case Study 5: Stratified Custom Manufacturing, Part 5F Due Week 7 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing� located in Part 5F of the textbook. Write a three to four (3-4) page paper in which you: Speculate the national and international laws violated by SCM in the investigation. Speculate any international procedures violated by Tom and George. Describe the type of response expected from the chain of events and type of attack from the two (2) employees. Identify the point in time SCM should involve its contractors, vendors, and the government agencies. Describe the approach that should be taken. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.


Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the legislation and regulations concerning the management of information in organizations. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 8 Case Study 6: Stratified Custom Manufacturing, Part 6E


For more classes visit www.snaptutorial.com Case Study 6: Stratified Custom Manufacturing, Part 6E Due Week 8 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing” located in Part 6E of the textbook. Write a three to four (3-4) page paper in which you: Identify the specific policy, ethical rules, and legal rules James violated. Describe what Nubrio should have done when asked to perform a questionable task with a vendor that had not gone through the company’s strict accreditation process for vendors. Discuss whether you believe Nubrio will come to regret having left this contract without a paper trail. Describe the implications of a major stockholder and founding member violating company rules, procedures, and processes. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA


or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe current security challenges facing organizations today. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 9 Case Study 7: Stratified Custom Manufacturing, Part 7D

For more classes visit www.snaptutorial.com


Case Study 7: Stratified Custom Manufacturing, Part 7D Due Week 9 and worth 70 points Read the running case study titled “Stratified Custom Manufacturing” located in Part 7D of the textbook. Write a three to four (3-4) page paper in which you: Select a U.S. state or another national government as a point of reference and determine which laws were violated in this situation. Identify one (1) of the primary problems found during the implementation planning for the e-Discovery project. Explain how a corporation handles situations, like those described in the case, where policy non-enforcement or selective enforcement becomes a greater problem. The information systems involved were administrative and operational and had little to no sensitive information on them. Explain how one goes about protecting data at a level that is commensurate with its sensitivity, value, and criticality when those parameters can change due to circumstances such as a lawsuit. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover


page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Recommend proper courses of action to overcome security challenges in an organizational environment. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

CIS 550 Week 10 Term Paper: DigiNotar, Part 6B

For more classes visit www.snaptutorial.com Term Paper: DigiNotar, Part 6B Due Week 10 and worth 200 points


DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it. Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a company’s existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria. Section 1: Policy Introduction In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items: Document information Audience Purpose Scope Section 2: Policy Criteria


In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items: Objectives Compliances Responsibilities Implementation Controls Use at least four (4) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Develop policies and procedures to provide necessary countermeasures to common security threats and vulnerabilities. Use technology and information resources to research issues in information security.


Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

**********************************************************

Profile for Robinson75

CIS 550 Success Begins / snaptutorial.com  

Case Study 1: Stratified Custom Manufacturing, Part 2 Due Week 2 and worth 70 points

CIS 550 Success Begins / snaptutorial.com  

Case Study 1: Stratified Custom Manufacturing, Part 2 Due Week 2 and worth 70 points

Advertisement