assignment and discussion 65

computerized operating systems os are almost everywhere we encounter them when we use our laptop or desktop computer we use them when we use our phone or tablet find articles that describe the different types of operating systems linux unix andro
March 31, 2023
powerpoint about patient safety
March 31, 2023

assignment and discussion 65

Task1

Assignment

This assignment asks you to examine how different organization structures and employee behaviors may affect security needs.

Imagine you work for a large

health


care
organization with a hierarchichal structure with many departments and clinics. This organization recently acquired a remote medical clinic specializing in one type of service. The remote clinic has a flat structure. You are asked to create a new cell phone use policy for both the large organization and its newly acquired clinic.

Analyzing an organziation to identify business and security needs is an important part of creating long-term secuirty strategies and policies. This assignment will give you insight into how to analyze organization needs for the course project.

1. Research examples of successful cell phone policy implementations. Choose three to include in a report.

2. Write a report explaining how you would analyze the organization and design a cell phone use policy.

3. In your report, include a raionale as to what types of

business challenges
would relate to cell phone use and how your chosen cell phone policies would solve problems and enhance the business.

4. Cite sources used in the body of your report using APA style in-text citations. Include a References page at the end with APA style references.

5. The report should be fairly brief, 2-3 pages.

Task 2

Discussion

1. Read the scenario below and discuss the technological and financial risks the company in the scenario faces and what they could do to mitigate those risks. Include what domains of the IT infrastructure were involved.

Scenario:

This company employees thousands of of people in the manufacture of its products, with many more acting as wholesalers and distributors across the country. These wholesalers use a business-to-business (B2B) Web site to place orders and track fulfillment. In the past year, this company experienced the following security incidents:

    • more than 10 lost or stolen laptops, tablet PCs, and smartphones
    • 4 serious malware events that caused important files to be erased from the sales database or a temporary shutdown of the B2B

      website

The company IT department traced these malware events to an unpatched server, an insecure wireless network, an insecure remote connection, and an employee who downloaded a game from the internet to a workstation computer.

2. For AT LEAST 2 other students’ threads, extend the conversation by testing their understanding of the domains involved, their identification of both technical and financial risks, and the reliability of their risk mitigation solutions.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.