ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 10 Weeks Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 22 May 2017 My Price 11.00

current state of Web application security to the Board of Directors

Assignment 3: Outline a New IT Security Policy

Due Week 9 and worth 250 points

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.  RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues.  RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

  1. Briefly explain the current state of Web application security to the Board of Directors. 
  2. Describe the major potential security risks associated with maintaining the organization’s Web presence, protecting its assets, and promoting e-Commerce. 
  3. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.
  4. Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.
  5. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy. 
  6. Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.
  7. Format your assignment according to the following formatting requirements:
    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks. 

The specific course learning outcomes associated with this assignment are:

  • Analyze the impact of the Internet and Web applications on the business world.
  • Analyze the evolution of social media, social networking, and the ethical issues they raise.
  • Compare and contrast Web-based risks. 
  • Analyze common Website attacks, weaknesses, and security best practices.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

 

9/1/16, 11:49 PMPage 1 of 2https://blackboard.strayer.edu/bbcswebdav/institution/CIS/542/1166/Week9/Week%209%20Assignment%203%20Rubric.htmlPoints: 250Assignment 3: TitleCriteriaUnacceptableBelow 70% FFair70-79% CProficient80-89% BExemplary90-100% A1. Briefly explain thecurrent state of Webapplication security tothe Board of Directors.Weight: 15%Did not submit orincompletelyexplained thecurrent state of Webapplication securityto the Board ofDirectors.Partially explainedthe current state ofWeb applicationsecurity to theBoard of Directors.Satisfactorilyexplained thecurrent state of Webapplication securityto the Board ofDirectors.Thoroughlyexplained thecurrent state of Webapplication securityto the Board ofDirectors.2. Describe the majorpotential security risksassociated withmaintaining theorganization’s Webpresence, protecting itsassets, and promotinge-Commerce.Weight: 15%Did not submit orincompletelydescribed the majorpotential securityrisks associated withmaintaining theorganization’s Webpresence, protectingits assets, andpromoting e-Commerce.Partially describedthe major potentialsecurity risksassociated withmaintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.Satisfactorilydescribed the majorpotential securityrisks associatedwith maintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.Thoroughlydescribed the majorpotential securityrisks associatedwith maintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.3. Assess anytechniques andtechnologies that youmay need to use tomitigate those potentialsecurity risks.Weight: 15%Did not submit orincompletelyassessed anytechniques andtechnologies thatyou may need touse to mitigate thosepotential securityrisks.Partially anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.Satisfactorily anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.Thoroughly anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.4. Create an outline ofyour new IT securitypolicies for RollinOn.Be sure to relate yourpolicies to the potentialrisks.Weight: 15%Did not submit orincompletely createdan outline of yournew IT securitypolicies for RollinOn.Did not submit orincompletely relatedyour policies to thepotential risks.Partially created anoutline of your newIT security policiesfor RollinOn.Partially relatedyour policies to thepotential risks.Satisfactorilycreated an outlineof your new ITsecurity policies forRollinOn.Satisfactorilyrelated your policiesto the potentialrisks.Thoroughly createdan outline of yournew IT securitypolicies forRollinOn.Thoroughly relatedyour policies to thepotential risks.5. Speculate on themost common types ofresistance that youmight encounter fromemployees whenimplementing your newIT policy.Weight: 15%Did not submit orincompletelyspeculated on themost common typesof resistance thatyou might encounterfrom employeeswhen implementingyour new IT policy.Partially speculatedon the mostcommon types ofresistance that youmight encounterfrom employeeswhen implementingyour new IT policy.Satisfactorilyspeculated on themost common typesof resistance thatyou mightencounter fromemployees whenimplementing yournew IT policy.Thoroughlyspeculated on themost common typesof resistance thatyou mightencounter fromemployees whenimplementing yournew IT policy.6. Four (4) qualityreferencesWeight: 15%No referencesprovided.Does not meet therequired number ofreferences; some orall references poorquality choices.Meets number ofrequired references;all references highquality choices.Exceeds number ofrequired references;all references highquality choices.7. Clarity, writingMore than 6 errors5-6 errors present3-4 errors present0-2 errors present

Attachments:

Answers

(11)
Status NEW Posted 22 May 2017 06:05 AM My Price 11.00

-----------

Attachments

file 1495433168-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)