CMGT 582 Entire Course

0 items
CMGT 582 Entire Course
CMGT 582 Entire Course
$39.00
  • Description

CMGT/582

Security & Ethics

The Latest Version A+ Study Guide

 

**********************************************

CMGT 582 Entire Course Link

https://hwsell.com/category/cmgt-582/

**********************************************

 

CMGT 582 Wk 1 – Knowledge Check

Complete the weekly Knowledge Check. You can complete this week’s Knowledge Check at the beginning and end of the week to pre-assess your knowledge. You have unlimited attempts available to complete Knowledge Checks.

CMGT 582 Wk 1 – Vampire Legends

Part A: Ch. 10 Role Playing Sim: Vampire Legends

In this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.

 

Using the Vampire Legends Access link, complete the interactive before moving to Part B.

 

Part B: Memo to CEO

Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization to:

  • Analyze the components of information security asit applies to the scenario presented in Vampire Legends, including:
  • A breakdown of the budget report
  • Your allocation strategy based on the risks and expenses involved
  • Your choice for the best advertising campaign
  • The course of action in handling information security threats in the future
  • Illustrate the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics the success of the Vampire Legends organization. Include:
  • The ethical conflict in this scenario
  • The consequences of the conflict
  • The solution to the conflict
  • The impact of ethics on revenue

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to make changes or correct any deficiencies.

 

Submit your assignment.

 

 

CMGT 582 Wk 2 – Cruisin’ Fusion, Part 1

Part A: Ch. 6 Role Playing Sim: Cruisin’ Fusion

In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You are not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture.

 

Using the Cruisin’ Fusion Simulation Access link, complete the interactive before moving to Part B.

 

Part B: Cruisin’ Fusion Contest

Now that the Cruisin’ Fusion website is up and running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter their first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

 

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation, with speaker notes, for the next web meeting to address the following:

  • Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
  • Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?
  • Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Note: The assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to make changes or correct any deficiencies.

 

Submit your assignment.

 

 

CMGT 582 Wk 3 Team – Privacy Challenges

Using the Case Study #1 Facebook and Instagram: Privacy Challenges Access link, review the information presented in the Case Study: Facebook and Instagram: Privacy Challenges.

 

Working together as a team, prepare an e-mail analyzing ethical privacy trends, confidentiality, and privacy regulations based on the information in the case study for the employees in the Vampire Legends organization from Wk 1. Consider the following questions as you create your e-mail:

  • How might privacy and user considerations differ for an application such as Facebook, which is used primarily by individual users, compared with an application such as an ERP system that is used primarily by corporations?
  • How does the default selection of sharing versus not sharing information affect the subsequent choices of individual users?
  • What is the likely perspective of marketers on privacy issues at Facebook?
  • How do app developers fit into the social media industry?

 

Note: All team members should participate. Include participating team member’s names on the assignment title page. Each team member should submit a Learning Team Evaluation form to the faculty as a PRIVATE message.

 

 

Submit your assignment.

 

 

CMGT 582 Wk 4 – Devil’s Canyon, Part 1

In this simulation, you will evaluate how to design an enterprise architecture for a mountain resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying in budget.

 

Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B.

 

Part B: Policies, Plans, and Risks

Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.

 

In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team:

  • Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
  • Outline the importance of a security plan in relation to security roles and safeguards.
  • Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
  • Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
  • Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

 

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be

submitted more than once to make changes or correct any deficiencies.

 

Submit your assignment.

 

 

CMGT 582 Wk 5 – Devil’s Canyon, Part 2

Refer to Devil’s Canyon, Part A in Wk 4.

 

Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix:

  • Briefly describe each of the identified risks/threats.
  • Analyze and evaluate the security controls that mitigate each of the risks/threats identified.
  • Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
  • Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.

 

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be

submitted more than once to make changes or correct any deficiencies.

 

Submit your assignment.

 

CMGT 582 Wk 5 COVID-19 Cyber Risks

In addition to the healthcare risk posed by the current COVID-19 pandemic, significant cyber security threats are increasing. These global threats impact organizations and individuals. Identify a healthcare organization for the focus of the assignment. Use a real health care organization. Research the current COVID-19 pandemic cyber security threats and attack methods targeted at the healthcare organizations, employees, and patients.

 

Working together as a team, prepare a 4 to 5 paper for executive management identifying the top five organization security threats and attack methods related to COVID-19. Include at least five recommendations to reduce the risk of these threats to the organization. Identify relevant security controls, security technologies, and relevant security controls to reduce the risk and impact of these threats on the organization. The goal of the paper is to raise executive awareness resulting in improved executive decision making, implementation of recommendations, allocation of budget, and allocation of resources. A table will support ease of readability. Include at least two professional references in the assignment.

 

Assignment should consider:

 

The potential impact of the identified threats to the organization, employees, and patients.

The relevant security technologies

The relevant processes such as risk assessment and security audit

The ethical and regulatory implications of the potential attacks

 

Use APA format.

 

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment where applicable. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to make changes or correct any deficiencies.

 

All team members should participate. Include participating team member’s names on the assignment title page. Each team member should submit a Learning Team Evaluation form to the faculty as a PRIVATE message.

 

Submit your assignment.

 

 

CMGT 582 Wk 6 – Signature Assignment: Security Audit

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Wk 1)

  • Cruisin’ Fusion (Wks 2–3)
  • Devil’s Canyon (Wks 4–5)

 

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

  • Potential Risk to be Reviewed: Describe the risk.
  • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.

 

  • Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization.
  • Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.

 

  • Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically there will be more than one control that should be reviewed for a potential risk.
  • Example: Determine whether anti-virus software is in use.
  • Example: Determine whether virus signatures are periodically updated.
  • Example: Determine whether periodic virus scans are performed.
  • Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.

 

  • IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.
  • Review the various options available to address those processes and methods previously explained, and which ones might be feasible.

 

  • IT Security – Measures: Analyze the various security measures that could be taken within the organization.
  • Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.
  • Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
  • Example: 100% of servers and PCs have virus software installed.
  • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
  • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

 

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

 

Submit your assignment.