1 / 12

CMGT 582 Inspiring Minds/uophelp.com

For more course tutorials visit<br>www.uophelp.com<br><br>You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department.  <br>Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:<br>·         Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing<br>·         Compliance with privacy related laws and regulations<br>·         Adequacy of security policies and security awareness training<br>·         Identification of security related risks/threats<br>Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format: <br>·         Area: From the list above

MarkTwist
Download Presentation

CMGT 582 Inspiring Minds/uophelp.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CMGT 582 Experience Tradition/uophelp.com For more course tutorials visit www.uophelp.com

  2. CMGT 582 Assignment Audit of the HR Department For more course tutorials visit www.uophelp.com You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas: • Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing • Compliance with privacy related laws and regulations • Adequacy of security policies and security awareness training • Identification of security related risks/threats

  3. CMGT 582 Week 1 Individual Assignment Getting Involved For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Fostering Collective Responsibility for IT Risk" video. Watch the "Balancing Security with User Convenience" video. Complete "Introduction to Information Security Governance" topic of the Skillsoft® course "CISM 2012: Information Security Governance (Part 1)." Assignment: Situation: You have just joined an organization that depends on the use of the web to perform most of its major tasks. You have noticed that information security is mostly ignored by those performing the work tasks and it is not a priority with management or

  4. CMGT 582 Week 2 Individual Assignment Security Within My Organization For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Technology and the Impact on Business and the Environment" Skillsoft video. Complete "Defining law and ethics" point of topic "The Relationship Between Law and Ethics" of the Skillsoft® course "Business Law and Ethics." Complete "Recognize the Effect of Laws and Regulations on Audit

  5. CMGT 582 Week 3 Assignment Privacy with Ethics Considerations For more course tutorials visit www.uophelp.com Create a 10- to 12-slide presentation evaluating the three areas of privacy issues specific to FERPA, HIPAA, and EEA. Develop scenarios in all of the three areas that you feel are most important to the recipients protected by these laws and the methodology used in each. Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance.

  6. CMGT 582 Week 3 Individual Assignment Risk Assessment For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video. Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS Fundamentals" in the Skillsoft® course "Cisco IINS 2.0: Implementing IPS." Complete slides 1 to 3 of the "Risk Response Strategies" topic of the Skillsoft® lesson "Plan Risk Responses" of the course "Risk response and Control (PMBOK® Guide Fifth Edition)."

  7. CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video. Complete the "Network Security Appliances and Methods" topic of the Skillsoft® course "CompTIA Network+ 2012: Network Security Part 3." Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoft®course "CompTIA Network+ 2012: Network Security Part 3." Consider information management risks to include cybercrime and cyber-related crimes.

  8. CMGT 582 Week 5 Assignment Mitigating Information Management Risk For more course tutorials visit www.uophelp.com Consider information security risks, including: • Cybercrime and cyber-related crimes • Social engineering • Mobile computing • BYOD (Bring your own device). Write a 3 full page evaluation (not including the title and reference pages) of security technologies and methodologies that can be used to mitigate each of the above information security risks. Support your paper with appropriate references and follow APA format. Include the following for each type of risk: • Description of the risk

  9. CMGT 582 Week 5 Individual Assignment Policy Implementation Presentation For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1." Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies." Consider security planning policies, procedures, and models to include multilevel and cryptographic processes. Prepare 10-12 Slides Presentation

  10. CMGT 582 Week 5 Individual Assignment Policy Implementation For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1." Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies." Consider security planning policies, procedures, and models to include multilevel and cryptographic processes.

  11. CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC) For more course tutorials visit www.uophelp.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)." Completethe "Auditing and Testing IS Security" topic of the "Auditing Internal and External Security" lesson of the Skillsoft® course "CISA Domain: Protection of Information Assets - Part 2."

  12. CMGT 582 Experience Tradition/uophelp.com For more course tutorials visit www.uophelp.com

More Related