ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 28 Apr 2017 My Price 8.00

potentially cause a security threat

I need help. I need to have this paper done today.  Please follow the case study 2 guidelines attached. This needs to be 3 -4 pages without counting a title and reference page. I have attached the rubrics for this as well as what the security policy should include which is Microsoft corporation. I have set the price for the max because it's urgent this gets done today. Any questions please reach out. Thanks

 

 

IT 241: Case Study Two Guidelines and Rubric
Overview: This case study analysis is the second of two formative tasks that will support your understanding of the key course concepts of human behaviors that
could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.
Prompt: Review the security policy template on the California Department of Technology website. For each of the six sections, summarize the content for the
organization you have selected for the final project.
Specifically, the following critical elements must be addressed: Introduction: Provide a brief description of what this policy will state and why it is needed. State the security stance of your organization.
Roles and Responsibilities: Detail the specific responsibilities of each identifiable user population, including management, employees, and residual
parties.
Policy Directives: Describe the specifics of the security policy.
Enforcement, Auditing, and Reporting: State what is considered a violation and the penalties for noncompliance. The violation of a policy usually implies
an adverse action that needs to be enforced.
References: List all references mentioned in the policy, including organization standards, procedures, and government codes.
Control and Maintenance: State the author and owner of the policy. Describe the conditions and process in which the policy will be reviewed. A policy
review should be performed on at least an annual basis to ensure that the policy is current. Guidelines for Submission: Your case study should be submitted as a three- to four-page Word document (in addition to the title page and references). Use
double spacing, 12-point Times New Roman font, one-inch margins, and APA citation format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements
Introduction
Roles and Responsibilities
Policy Directives
Enforcement, Auditing,
and Reporting
References Proficient (100%)
Accurately describes the policy
Accurately details the specific
responsibilities
Sufficiently describes the specifics of the
security policy
Sufficiently states what is considered a
violation and the penalties for
noncompliance
Sufficiently lists all references Needs Improvement (75%)
Does not sufficiently describe the policy
Does not sufficiently detail the specific
responsibilities
Does not sufficiently describe the
specifics of the security policy
Does not sufficiently state what is
considered a violation and the penalties
for noncompliance
Does not sufficiently list all references Not Evident (0%)
Does not describe the policy
Does not provide the specific
responsibilities
Does not describe the specifics of the
security policy
Does not state what is considered a
violation and the penalties for
noncompliance
Does not list all references Value
10
20
20
20 10 Control and Maintenance Articulation of Response Sufficiently describes the conditions and
process in which the policy will be
reviewed
Submission has no major errors related to
citations, grammar, spelling, syntax, or
organization Does not sufficiently describe the
conditions and process in which the
policy will be reviewed
Submission has major errors related to
citations, grammar, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas Does not describe the conditions and
process in which the policy will be
reviewed
Submission has critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding
of ideas
Earned Total 15 5 100%

Kevin Stevens
IT 241
January 16, 2017 Milestone One Microsoft Corporation is one of the leading developers of personal computers and
software. Throughout the years the company moved into development of gaming systems and
video games as well as publishing books and multimedia titles. Most PC’s that are purchased
come pre stocked with windows software. Microsoft was also responsible for the Xbox system
back in 2001 with the release of Xbox live online features for multiplayer in 2002. Then they
created a much more powerful system the Xbox 360 in 2005 which did very well. Microsoft
strives to bring in new technology, to customers who want to learn, play, and communicate.
Microsoft 2016 annual budget was 85.3 billion in total. This is broken down into sections from
software sales, to video games, systems, and computer and phone sales. The focus of Microsoft
future is to build the best-in-class platforms and productivity services for a mobile-first, cloudfirst world.
Microsoft has 14 senior leaders. They and their role are as follows:
Satya Nadella - Chief Executive Director
Judson Althoff -Executive Vice President/Worldwide Commercial Business
Chris Capossela – Executive Vice President/Chief Marketing Officer Jean-Philippe Courtois – Executive Vice President and President/Microsoft Global Sales,
Marketing and Operations
Kurt DelBene – Executive Vice President/Corporate Strategy and Operations
Scott Guthrie – Executive Vice President/Microsoft Cloud and Enterprise Group
Kathleen Hogan – Executive Vice President/Human Resources
Amy Hood – Executive Vice President/Chief Financial Officer
Rajesh Jha – Executive Vice President/Office Product Group
Peggy Johnson – Executive Vice President/Business Development
Terry Myerson – Executive Vice President/Windows and Devices Group
Harry Shum – Executive Vice President/Artificial Intelligence and Research Groups
Brad Smith – President and Chief Legal Officer
Jeff Weiner – CEO of LinkedIn
Microsoft Corporations is a massive company that is located all over the world. The Head
Quarters of Microsoft is Located in Washington. There are other offices located throughout 214
different countries. As well multiple small Microsoft stores located throughout the world as. In
total as of 2016 there seems to be 114,000 employees within the Microsoft Corporation
Headquarters, this is not including employees from other countries as well as the smaller
Microsoft stores. The titles of the people I plan to invite to the final presentation of this project are as
follows.
Worldwide Commercial Business: Judson Althoff
Microsoft Global Sales, Marketing and Operations: Jean-Philippe Courtois
Chief Financial Officer: Amy Hood
Microsoft Cloud and Enterprise Group: Scott Guthrie
Windows and Devices Group: Terry Myerson
Artificial Intelligence and Research Groups: Harry Shum References:
http://www.referenceforbusiness.com/history2/14/Microsoft-Corporation.html
https://www.microsoft.com/en-us/cpe/
https://www.britannica.com/topic/Microsoft-Corporation
https://www.microsoft.com/investor/reports/ar16/index.html
https://news.microsoft.com/microsoft-senior-leaders
https://www.statista.com/statistics/273475/number-of-employees-at-the-microsoft-corporationsince-2005/
https://www.microsoft.com/en-us/worldwide.aspx

Attachments:

Answers

(11)
Status NEW Posted 28 Apr 2017 07:04 AM My Price 8.00

-----------

Attachments

file 1493366031-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)