assignment and discussion 65
Task1
Assignment
This assignment asks you to examine how different organization structures and employee behaviors may affect security needs.
Imagine you work for a large
health
care
organization with a hierarchichal structure with many departments and clinics. This organization recently acquired a remote medical clinic specializing in one type of service. The remote clinic has a flat structure. You are asked to create a new cell phone use policy for both the large organization and its newly acquired clinic.
Analyzing an organziation to identify business and security needs is an important part of creating long-term secuirty strategies and policies. This assignment will give you insight into how to analyze organization needs for the course project.
1. Research examples of successful cell phone policy implementations. Choose three to include in a report.
2. Write a report explaining how you would analyze the organization and design a cell phone use policy.
3. In your report, include a raionale as to what types of
business challenges
would relate to cell phone use and how your chosen cell phone policies would solve problems and enhance the business.
4. Cite sources used in the body of your report using APA style in-text citations. Include a References page at the end with APA style references.
5. The report should be fairly brief, 2-3 pages.
Task 2
Discussion
1. Read the scenario below and discuss the technological and financial risks the company in the scenario faces and what they could do to mitigate those risks. Include what domains of the IT infrastructure were involved.
Scenario:
This company employees thousands of of people in the manufacture of its products, with many more acting as wholesalers and distributors across the country. These wholesalers use a business-to-business (B2B) Web site to place orders and track fulfillment. In the past year, this company experienced the following security incidents:
-
- more than 10 lost or stolen laptops, tablet PCs, and smartphones
- 4 serious malware events that caused important files to be erased from the sales database or a temporary shutdown of the B2B
website
The company IT department traced these malware events to an unpatched server, an insecure wireless network, an insecure remote connection, and an employee who downloaded a game from the internet to a workstation computer.
2. For AT LEAST 2 other students’ threads, extend the conversation by testing their understanding of the domains involved, their identification of both technical and financial risks, and the reliability of their risk mitigation solutions.
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!
Use Discount Code “Newclient”for a 15% Discount!”


The post assignment and discussion 65 appeared first on Student Homeworks.
