Refer a friend and get % off! They'll get % off too.

CMGT 430 All Discussions

CMGT 430 All Discussions

The Latest Version 

 

CMGT 430 Wk 1 Discussion – CIA Triad
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

The CIA triad is widely referenced in today’s information security environments as a basic model for information security. There are three distinct legs to the CIA triad: confidentiality, integrity, and availability.

Select one of the CIA components and expand on it. Include a baseline review of that specific attribute as well as challenges that might be encountered, including two potential security issues.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 
 

 

 
 

 

 

 

CMGT 430 Wk 2 Discussion – Risk Appetite
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Risk appetite is the quantity and nature of risk that organizations are willing to accept as they evaluate trade-offs between “perfect security” and unlimited accessibility. Often when a risk is examined in detail, the result or the risk appetite can result in a decision to expand their capacity to handle that risk in order to take advantage of the business opportunity, or it might result in a decision not to move forward with that opportunity.

Consider risks that exist at a typical small business. Provide an example of determining the risk appetite of the small business to a specific risk. How would you determine what to examine, what data to use in that examination, and what the risk appetite is?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

 

CMGT 430 Wk 3 Discussion – Biometric Protocols
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

At many security checkpoints where biometrics are used, only one protocol is employed, such as a fingerprint reader, a hand-scanner, or facial recognition. Other checkpoints use several biometric checkpoint protocols in tandem to add a layer of security.

Complete an internet search for vendors of biometric products. Find one vendor with a product designed to examine several characteristics [i.e., facial recognition, hand scanner (incorporates hand pattern, fingerprint reader), retina scan, and signature recognition].

Discuss the vendor you selected along with answers to the following questions:

 

 

 

Which characteristics would be more acceptable to users?
 

 

Which would be preferred by security administrators?
 

 

 

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

 

CMGT 430 Wk 4 Discussion – Working with Vendors
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Just a few years ago, all IT processing took place in-house. Payroll processing, human resources and benefits management, real estate management, and investor relations were done by employees within the parent organization. Even in the home environment, families kept information activities in-house, including annual tax returns and banking (through the writing of paper checks) and disagreements or issues with vendors was taken care of personally. Now we have online resources that push some of that overhead to external vendors. Examples include organizations that will process payroll and benefits administration, and stock brokerages that address investor traffic. Working with vendors brings up a few concerns.

Discuss the following:

 

 

 

Why is due diligence necessary when dealing with external vendors?
 

 

What is one suggestion you have regarding securing data as it is in-transit to and from these vendors?
 

 

What are two security protocols that should be part of the vendor’s data operations? For example, if the data includes PII/SPII information, is adherence to external regulations and guidelines the responsibility of the vendor or your organization?
 

 

 

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

 

CMGT 430 Wk 5 Discussion – Mainframe and Client/Server Environments
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Consider the following scenario:

Your manufacturing company has operated with a mainframe IBM computer for more than 20 years. Recent technological advances have brought opportunities to replace that mainframe-based computing environment with a client/server environment. You have been tasked with responding to the senior management group about the security issues involved with replacing the existing mainframe computer environment with a client/server platform. The salespeople you deal with from each vendor believe that the current mainframe environment costs about $500K a year to maintain from a security standpoint, while a client/server environment would cost about $325K a year. But cost is not the only consideration. No PII or SPII data is contained in this manufacturing platform. It is strictly a final product for sale application.

Outline and review a typical mainframe enterprise security footprint. Do the same for a possible client/server environment. This could include the use of the cloud for distributed computing, but that would also include unique security concerns.

Discuss the following:

 

 

 

Based on your outline, which of these environments is more secure and why?
 

 

Does your outline show commonalities that could permit both the mainframe and the client/server environment to coexist from an enterprise security perspective? If so, what are they?
 

 

 

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

You will get a ZIP (60KB) file

$ 12.00

$ 12.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...