120 likes | 152 Views
CMGT 582 STUDY course provides students with the opportunity to integrate and apply their learning from the course
E N D
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Assignment Audit of the HR Department FOR MORE CLASSES VISIT www.cmgt582study.com You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas: · Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing · Compliance with privacy related laws and regulations · Adequacy of security policies and security awareness training · Identification of security related risks/threats
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 1 Individual Assignment Getting Involved FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Fostering Collective Responsibility for IT Risk" video. Watch the "Balancing Security with User Convenience" video. Complete "Introduction to Information Security Governance" topic of the Skillsoft® course "CISM 2012: Information Security Governance (Part 1)." Assignment: Situation: You have just joined an organization that depends on the use of
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 2 Individual Assignment Security Within My Organization FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Technology and the Impact on Business and the Environment" Skillsoft video. Complete "Defining law and ethics" point of topic "The Relationship Between Law and Ethics" of the Skillsoft® course "Business Law and Ethics."
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 3 Assignment Privacy with Ethics Considerations FOR MORE CLASSES VISIT www.cmgt582study.com Create a 10- to 12-slide presentation evaluating the three areas of privacy issues specific to FERPA, HIPAA, and EEA. Develop scenarios in all of the three areas that you feel are most important to the recipients protected by these laws and the methodology used in each. Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance. Compare the effectiveness of each industry's efforts to ensure privacy issues are addressed and protected.
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 3 Individual Assignment Risk Assessment FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video. Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS Fundamentals" in the Skillsoft® course "Cisco IINS 2.0: Implementing IPS."
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video. Complete the "Network Security Appliances and Methods" topic of the Skillsoft® course "CompTIA Network+ 2012: Network Security Part 3."
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 5 Assignment Mitigating Information Management Risk FOR MORE CLASSES VISIT www.cmgt582study.com Consider information security risks, including: Cybercrime and cyber-related crimes Social engineering Mobile computing BYOD (Bring your own device). Write a 3 full page evaluation (not including the title and reference pages) of security
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 5 Individual Assignment Policy Implementation Presentation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1." Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies."
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 5 Individual Assignment Policy Implementation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."
CMGT 582 STUDY creative knowledge /cmgt582STUDY.com CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC) FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)."