CMGT 430 ENTIRE COURSE


Ask a Question

CMGT 430 ENTIRE COURSE

Sale price $50.00 Regular price $100.00

CMGT 430 ENTIRE COURSE

 

CMGT 430 Week 1 IT Systems Connection Table
 

Refer to the course scenario.

IT systems do not operate alone in the modern enterprise, so securing them will involve securing their interfaces with other systems, as well as the system itself. It is important to know the different interconnections each system may have.

During your review of the hospital’s current documents and files, you run across an IT systems connection table that was never completed by your predecessors. This document has a table that shows the relationship between multiple IT systems.

Complete the IT System Connection Table.

Submit your assignment.

 

 
 

 

 
 

 

CMGT 430 Week 2 Enterprise Security Concerns
 

After reviewing the material your group has prepared so far, the management team has returned with a list of five specific concerns. They include:

 

 

 

Access control
 

 

Security enterprise
 

 

Impact of implementing a change management system
 

 

Mitigation
 

 

Risk management
 

 

 

Management has asked you to address concerns with a visual presentation. Address concerns by providing the following information:

 

 

 

An overview of the access control
 

 

Required mitigation steps for each concern
 

 

Prioritize concerns
 

 

Concerns with vendor relations from the enterprise security standpoint
 

 

Description of how the organization can apply risk management principles in its efforts
 

 

Description of iterative maintenance effort, including audits and frequency
 

 

 

Include at least two references formatted according to APA guidelines.

Present the information in one of the following ways:

 

 

 

A detailed chart along with a brief 1- to 2-page executive summary explaining the decisions made
 

 

A 12- to 14-slide multimedia-rich presentation with speaker notes
 

 

 

Submit your assignment.

 

 

CMGT 430 Week 3 Responding to Threats
 

Refer to the Week 3 – Required Learning Activity: Core Security Principles.

 

A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a ransomware attack. You have kept a close eye on this event. You decide to complete a review of current material available regarding ransomware attacks and especially ransomware and hospital enterprise systems.

Develop a 1- to 2-page chart. Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation, as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for small, medium, and large hospital enterprise systems.

Based on your chart, provide a final recommendation on how the hospital can respond to the threat. Summarize your chart findings, provide your recommendation, and answer the following questions in a brief, 2- to 3-page executive summary to the Auburn Regional management team:

 

 

 

How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?
 

 

How do you verify people and security levels?
 

 

How will your recommendations alleviate the threat?
 

 

 

Include the chart in your executive summary.

Submit your assignment.

 

 

CMGT 430 Week 4 Cloud Computing
 

Refer to the Learning Infographic Design and Cyber Security Awareness: Digital Data Protection.

 

Your work so far has been well-received and the management team is very interested in quickly bringing the rest of the organization into the process. The management team has expressed interest in incorporating cloud technology as part of the Auburn Regional’s IT architecture. To integrate both of these requests, you decide to create an infographic that could, on a single diagram, give the reader an idea of what cloud technology is and how it could be used by Auburn Regional as these enterprise systems updates are in action. As you might imagine, there is a wealth of information on the internet involving the use of cloud computing.

Consider the following information and outline your answers:

 

 

 

What are the pros and cons of cloud computing?
 

 

Where could cloud computing fit in the organizational structure and operations?
 

 

How do companies that enter cloud technology agreements pass on those issues to their customers?
 

 

How do these companies really know where their data and the data of their customers is really stored?
 

 

What precautions are being taken?
 

 

 

Using your outline, create an original infographic for a presentation to the Auburn Regional management team that shows:

 

 

 

The basics of cloud computing
 

 

Overview of pros and cons of cloud computing
 

 

Where cloud computing could possibly fit into the organizational structure and operations
 

 

At least two concerns that need to be addressed
 

 

 

Include your outline on a separate document to support your infographic.

Submit your assignment.

 

 

CMGT 430 Week 5 Enterprise Security Plan Strategic Objectives
 

An enterprise security plan is a document that explains the security exposure that an entity would encounter in a specific marketplace. A committee of people typically writes this document over a span of a few months. Many times the drafts begin with developing a high-level overview of strategic objectives that address how to secure the enterprise inside and outside the enterprise.

The CEO asks you to explain the core principles of enterprise security and respond to five strategic objectives as part of the overall enterprise system security plan draft. They are:

 

 

 

Data loss prevention
 

 

Access controls
 

 

Data management
 

 

Risk management
 

 

Cloud technology
 

 

 

For each of the five strategic objectives, write a response that addresses the following:

 

 

 

Key initiative: Why is this topic important to Auburn Regional?
 

 

Objectives: What is the desired outcome to this effort?
 

 

Description: What is the specific strategic objective? Provide a high-level explanation.
 

 

Benefits: What will be the benefits of this effort?
 

 

Outcome: What will be done to meet this objective?
 

 

 

Include any charts, graphics, or infographics created in previous weeks that support your findings.

Compile your response with the following:

 

 

 

An updated executive summary
 

 

A final recommendation
 

 

At least three new references throughout your plan overview, cited according to APA guidelines.
 

 

 

Incorporate feedback and use previous assignments as a resource. As a guideline, an overview of this nature is typically 3 to 4 pages long.

Submit your assignment.

 

CMGT 430 ENTIRE COURSE

Questions & Answers

Have a Question?

Be the first to ask a question about this.

Ask a Question