Describe basic information systems security issues and concerns.

CMGT/442 Information Systems Risk Management Copyright ©2015 by University of Phoenix. All rights reserved. SYLLABUS Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer-based information systems. This course will survey remedies and prevention techniques available to address the risk areas presented. Organizational policies, project management, and procurement considerations will also be examined relative to development, implementation, and use of computer-based information systems. Course Dates Aug 04, 2015 – Sep 07, 2015 Faculty Information • Academic Policies • Instructor Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Academic Resources • Course Software Instructions Check the Course Software link to see if this course requires additional software. We do not recommend trial software versions because they expire. SupportingMaterial Course Software • Virtual Organizations Instructions Access The Virtual Organizations link. SupportingMaterial Virtual Organizations • The College of IS&T Website Instructions Access the College of IS&T Website link. SupportingMaterial The College of IS&T Website Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): Policies Name : CRAIG MC CORMICK (PRIMARY) Email Address : Phone Number : See Policies Get Ready for Class • Familiarize yourself with the textbooks used in this course. Instructions Crouhy, M., Galai, D., & Mark, R. (2014). The essentials of risk management. New York, NY: McGraw-Hill. Laudon, K. C., & Laudon, J. P (2014). Management information systems. Boston, MA: Pearson. Pressman, R., & Maxim, B. (2015). Software engineering: A practitioner’s approach (8th ed.) New York, NY: McGrawHill. Raydugin, Y. (2013). Project risk management. Hoboken, NJ: Wiley. Schwalbe, K (2014). Information management: Project management (7th ed.). Boston, MA: Course Technology/Cengage Learning. • Review the Read Me First Instructions Review the Read Me First. SupportingMaterial Read Me First Course Materials All electronic materials are available on your student website. Week1 Aug, 04 – Aug, 10 Enterprise Information Systems Risk Management 1.1 Recognize the importance of Information Systems Risk Management. 1.2 Identify organizational issues and concerns. 1.3 Describe basic information systems security issues and concerns. Objectives/Competencies Required Learning Activities • Learning Team Instructions: Learning Team Charter Resource: Learning Team Toolkit Complete the Learning Team Charter. Learning Team Charter Support Material Instructions • Learning Team Instructions: Risk Assessment McBride Financial Services, one of the Virtual Organizations, is currently opening offices in Boise, Idaho and Sioux Falls, South Dakota. Select one of the locations and prepare a comprehensive risk assessment (following the “Learning Team Assignment Outline” for McBride’s management team. The risk assessment should identify potential risks that could impact the operation of the business, including its technological operations. The written assessment should be 8 to 10 pages in length and will be submitted to the instructor during Week Five. In addition, the Learning Team will prepare a 10 slide Microsoft® PowerPoint® presentation of the project which will also be submitted to the instructor during Week Five. In preparing the risk assessment, be sure to consider critical assets/services, common information technology risks and the following: • The use of toxic chemicals in the vicinity of the business by manufacturing processes industrial solvents, blue print Instructions machines, etc. • Public transportation facilities that might handle the carriage of dangerous or hazardous substances, which could be involved in major accidents • Potential targets of criminal activity • Potential targets of terrorist activity such as government offices, law enforcement agencies, or politically sensitive businesses or services Virtual Organizations Learning Team Assignment Outline Support Material • Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Access to Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Instructions • Ch. 1, “Risk Management: A Helicopter View”, of The Essentials of Risk Management. Read Ch. 1, “Risk Management: A Helicopter View”, of The Essentials of Risk Management. Instructions • Ch. 2, “Corporate Risk Management: A Primer”, of The Essentials of Risk Management. Read Ch. 2, “Corporate Risk Management: A Primer”, of The Essentials of Risk Management. Instructions • Ch. 8, “Securing Information Systems”, of Management Information Systems. Read Ch. 8, “Securing Information Systems”, of Management Information Systems. Instructions • Supporting Activity: Risks of Undigitized Data What special issues must be considered for corporate data which are not fully digitized? What are the risks associated with the loss of these data? What recovery procedures do you recommend for these situations? Instructions • Supporting Activity: Risk of the Web What special issues must be addressed for a risk management strategy that supports user-facing, web-based systems? What are the risks associated with disruption of these systems? Instructions • Supporting Activity: Risk Mitigation Strategy Craft an email to your CIO making the case for one of the four risk mitigation strategies (avoid, transfer, mitigate, and keep.) Defend your recommendation. Instructions • Supporting Activity: Research Find a current article about outsourcing and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week One Participation Instructions:Participate in class activities. Individual Aug 10, 2015 11:59 PM 4 Outsourcing risks Instructions: Assignment Preparation: Activities include completing the SkillSoft courses, the PowerPoint review, independent student reading, and research. • Complete the Skillsoft course, “CISSP 2012 Domain: Information Security Governance and Risk Management.” • Complete the SkillSoft course, “Managing Software Project Outsourcing: Dealing with Risks.” • Review “How to add narration to a presentation.” Click on the PowerPoint help icon and search. Assignment: Prepare a 6-10 slide narrated PowerPoint presentation that identifies the possible risks to an organization in each of the following outsourcing situations: • The use of an external service provider for your data storage. • The use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking. • The use of a vendor to support your desktop computers. • The use of a vendor to provide network support. The presentation will include a risk mitigation strategy for each situation. One mitigation strategy, because of personnel and facility limitations, cannot be proposed, because it eliminates the outsourcing by bringing the situation in house. SupportingMaterial:Week 1 Individual Assignment Rubric Individual Aug 10, 2015 11:59 PM 10 Learning Team Charter Complete and submit a learning team charter Instructions: Complete and submit a learning team charter. One student from each team to submit the file. Learning team Aug 10, 2015 11:59 PM 1 Week2 Aug, 11 – Aug, 17 Project Management of Risk 2.1 Recognize how Project Management can aid in risk management. 2.2 Compare risk management practices. 2.3 Formulate a risk management and mitigation plan. Objectives/Competencies Required Learning Activities • Ch. 2, “The Project Management and Information Technology Context,” of Information Technology Project Management. Read Ch. 2, “The Project Management and Information Technology Context,” of Information Technology Project Management. Instructions • Ch. 11, “Project Risk Management,” of Information Technology Project Management. Read Ch. 11, “Project Risk Management,” of Information Technology Project Management. Instructions • Ch. 35, “Risk Management,” of Software Engineering: A Practitioner’s Approach. Read Ch. 35, “Risk Management,” of Software Engineering: A Practitioner’s Approach. Instructions • Supporting Activity: Risk Appetite Discuss the possible differences in risk appetite between IT departments in a start-up smartphone app development company and a traditional Fortune 500 firm. Instructions • Supporting Activity: List of Risks Your consulting organization has been hired to develop computer systems for the United Nations in the Middle East. Develop a list of man-made and natural risks that might apply to this particular situation. Explain each risk in detail. Instructions • Supporting Activity: Research Find a current article about risk management and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Two Participation Instructions:Participate in class discussion. Individual Aug 17, 2015 11:59 PM 4 Learning Team: Risk Assessment Task List Instructions: Submit the following items to your facilitator: Create a project task list for your Learning Team that identifies all of the tasks that your Learning Team needs to complete for the project, assignments of appropriate team members to project tasks, and due dates when tasks need to be completed for team review and integration into your Learning Team project. Refer to the assignment description and “Learning Team Assignment Outline” in week 1. Learning team Aug 17, 2015 11:59 PM 2 Risk Information Sheet Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, the Microsoft® PowerPoint® review, independent student reading, and research. • Complete the Skillsoft® course, “Identifying project risks.” • Complete the Skillsoft® course, “Performing risk analysis.” • Complete the Skillsoft® course, “Risk management planning.” • Complete the Skillsoft® course, “Risk response and control.” Assignment: The Stevens Company is converting from the SQL Server database to the Oracle® database. Using the sample shown below, create a Risk Information Sheet for at least five risks that might be encountered during the conversion. Risk Information Sheet Risk id: PO2-4-32 Date: March 4, 2014 Probability: 80% Impact: High Description: Over 70% of the software components scheduled for reuse will be integrated into the application. The remaining functionality will have to be custom developed. Refinement/Context: • Certain reusable components were developed by a third party with no knowledge of internal design standards. • Certain reusable components have been implemented in a language that is not supported on the target environment. Mitigation/Monitoring: • Contact third party to determine conformance to design standards. • Check to see if language support can be acquired. Management/Contingency Plan/Trigger: • Develop a revised schedule assuming that 18 additional components will have to be built. • Trigger: Mitigation steps unproductive as of March 30, 2014 Current Status: In process Originator: Jane Manager SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksToolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint®Week 2 Individual Assignment Rubric Individual Aug 17, 2015 11:59 PM 10 Week3 Aug, 18 – Aug, 24 Risk Model Overview 3.1 Examine the risk control process. 3.2 Compare and contrast various risk control models. 3.3 Create a risk assessment matrix. Objectives/Competencies Required Learning Activities • Ch. 2, “Main Components of a Risk Management System,” of Project Risk Management. Read Ch. 2, “Main Components of a Risk Management System,” of Project Risk Management. Instructions • Ch. 3, “Adequacy of Methods to Assess Project Uncertainties,” of Project Risk Management. Read Ch. 3, “Adequacy of Methods to Assess Project Uncertainties,” of Project Risk Management. Instructions • Supporting Activity: Risk Management Process Might an effective risk management plan be considered a process that may restore all systems, businesses, processes, facilities, and people? What are the major issues to consider? Instructions • Supporting Activity: Security Risks Supporting Activity Preparation: Activities include the Service Request review. • Review Service Request SR-HT-001 for Huffman Trucking Company. Supporting Activity: Discuss the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request. Instructions • Supporting Activity: Research Find a current article about risk assessment and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Three Participation Instructions:Participate in class activities. Individual Aug 24, 2015 11:59 PM 4 Learning Team: Risk Assessment Week 3 Project Report Instructions: Submit the following items to your facilitator: A team progress report to your instructor explaining what your team accomplished during the week, challenges your team faced, and potential approaches to the Final Learning Team Project Learning team Aug 24, 2015 11:59 PM 2 Risk Assessment Matrix Instructions: Assignment Preparation: Activities include watching the Lynda.com videos, the figure reviews, independent student reading, and research. • Watch “Envisioning: Project Selection and Design: Deriving your risk management approach” of the Lynda.com “Agile Project Management” video. • Watch “Exploring: Managing the Building Process: Managing issues and risks” of the Lynda.com “Agile Project Management” video. • Watch “Planning a project: Identifying risks” of the Lynda.com “Project Management Fundamentals” video. • Review Figure 3.2 of Project Risk Management. • Review Figure 35.1 of Software Engineering: A Practitioner’s Approach. Assignment: Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm. – Begin with RAM Template (with example) Exel file attached here to the assignment desription. Populate with at least five risks of your choosing. – Based on a template from the course texts or your research, create a matrix of your own, which lists risks, probability and impact (scores 1 for low through 5 for very high), and then multiple the two numbers for each risk to attain a a risk score. Add a column to your matrix to summarizing mitigations for each of the risks. – Wite an approximately one and one-hlaf to two page summary explaining why your risks were placed where you’ve placed them on the grid and any additional considerations for risk priorities. Submit the Excel file with the RAM grid, your RAM (with scores and overall risk rankings..) and Word document. SupportingMaterial:Access to Lynda.com® – videosWeek 3 Individual Assignment RubricRAM Template Individual Aug 24, 2015 11:59 PM 10 Week4 Aug, 25 – Aug, 31 Deterministic and Probabilistic Methods 4.1 Examine deterministic risk assessment methods. 4.2 Examine probabilistic risk assessment methods. 4.3 Create a Monte Carlo simulation. Objectives/Competencies Required Learning Activities • Ch. 4, “Uncertainty Identification,” of Project Risk Management. Read Ch. 4, “Uncertainty Identification,” of Project Risk Management. Instructions • Ch. 8, “Risk management Tools,” of Project Risk Management. Read Ch. 8, “Risk management Tools,” of Project Risk Management. Instructions • Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Read Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Instructions • Ch. 13, “Preparations for Probabilistic Analysis,” of Project Risk Management. Read Ch. 13, “Preparations for Probabilistic Analysis,” of Project Risk Management. Instructions • Supporting Activity: Decision Tree Use Microsoft® Visio®, PowerPoint®, or Word to create a decision tree diagram for the selection of a cell phone. Address risk in your decision tree. Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Support Material Instructions • Supporting Activity: Risk Breakdown Structure The University of Phoenix has funded a project to revise the online classroom. Develop a list of risk breakdown structure (RBS) categories for this purpose. Justify each category within your RBS. Instructions • Supporting Activity: Unknown Unknowns What defines room for unknown unknowns? Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Four Participation Instructions:Participate in class activities. Individual Aug 31, 2015 11:59 PM 4 Learning Team Assignment: Risk Assessment Week 4 Project Report Instructions: Submit the following items to your facilitator: A team progress report to your instructor explaining what your team accomplished during the week, challenges your team faced, and potential approaches to the Final Learning Team Project Learning team Aug 31, 2015 11:59 PM 2 Monte Carlo Method Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, watching the Lynda.com® videos, independent student reading, and research. • Complete the Skillsoft® course, “Basic Statistics and Graphical Methods for Six Sigma.” • Complete the Skillsoft® course, “Risk Management: Assessing Risk.” • Watch the Lynda.com video, “Up and Running with Excel What-If Analysis.” • Watch the Lynda.com video, “What do you need to know to be an analytics professional?” • Watch “Performing Monte Carlo Simulation” of the Lynda.com “Up and Running with Excel What-If Analysis,” video. Assignment: Recreate the simulation presented in the “Performing Monte Carlo Simulation” video. Submit the Microsoft® Excel® spreadsheet along with a 1- to 2-page explanation on how the Monte Carlo tool can be used in risk assessment. SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksAccess to Lynda.com® – videosWeek 4 Individual Assignment Rubric Individual Aug 31, 2015 11:59 PM 10 Week5 Sep, 01 – Sep, 07 Procurement Risk 5.1 Identify procurement uncertainties. 5.2 Examine methods for managing procurement risks. 5.3 Apply risk management methodologies in situational cases. Objectives/Competencies Required Learning Activities • Ch. 12, “Project Procurement Management,” of Information Technology Project Management. Read Ch. 12, “Project Procurement Management,” of Information Technology Project Management. Instructions • Ch. 10, “Addressing Uncertainties through Procurement,” of Project Risk Management. Read Ch. 10, “Addressing Uncertainties through Procurement,” of Project Risk Management. Instructions • Supporting Activity: Procurement Risks The University of Phoenix has funded a project to revise the online classroom. Use the Microsoft® Visio® Brainstorming Diagram Template to visually depict possible sources of procurement risk. Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Support Material Instructions • Supporting Activity: Procurement Decisions Supporting Activity Preparation: Activities include the figure review. • Review Figure 9.1 of Project Risk Management. Supporting Activity: Design a quantitative bid evaluation template for making a procurement decision for the selection of laptops across four vendors. Use Figure 9.1 as an example. Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Support Material Instructions • Supporting Activity: Research Find a current article about procurement and discuss its relevance to this week’s Learning Team assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Five Participation Instructions:Participate in class activities. Individual Sep 07, 2015 11:59 PM 4 Learning Team: Risk Assessment Project Instructions: Finalize and submit the risk assessment. SupportingMaterial:Learning Team Assignment Rubric Learning team Sep 07, 2015 11:59 PM 18 Learning Team: Risk Assessment Presentation Instructions: Finalize and submit the Microsoft® PowerPoint® presentation. SupportingMaterial:Learning Team Assignment Rubric Learning team Sep 07, 2015 11:59 PM 5 Your Career Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, independent student reading, and research. • Complete the Skillsoft® course, “Planning Project Procurement.” • Complete the Skillsoft® course, “Managing Procurements.” Assignment: Write a 1- to 2-page paper discussing what professional organizations you might join, and websites you might visit, that would provide insight into a career that includes responsibility for risk management? SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksCMGT442 Individual Assignment Rubric Individual Sep 07, 2015 11:59 PM 10 All trademarks are property of their respective owners. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and PowerPoint® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Trademark


 

. WITH nursing writers TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post Describe basic information systems security issues and concerns. appeared first on nursing writers .

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

The post Describe basic information systems security issues and concerns. appeared first on nursing writers.


Describe basic information systems security issues and concerns. was first posted on July 15, 2019 at 4:07 pm.
©2019 "Nursing Paper Tutors". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@nursingassignmenttutor.com

 

“Is this question part of your assignment? We Can Help!”


Describe basic information systems security issues and concerns. was first posted on July 15, 2019 at 4:07 pm.

 

"Are you looking for this answer? We can Help click Order Now"