The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Individual: Â Using Roles
Note: This is the second of three parts to this project. Refer back to your organization used in the Week Two Applying Risk Management Consulting assignment.
A better way to control user access to data is to tie data access to the role a user plays in an organization. Some organizations are still learning this. Your presentation this week persuades the CIO of your target organization of the importance of controlling user access.
Create a 5- to 7-narrated slide presentation discussing the following:
Â
Â
ALEXANDRIA CITY PUBLIC SCHOOLS
Applying Risk Management Consulting
CMGT 430
Walter B Williams Jr
January 17, 2017
Professor Thomas Maricle What is it? Topics of Discussion
Describe how the organization can apply risk management principles
in its efforts to secure their systems.
Outline how protection efforts will vary over time.
Include three different example sets, each with a vulnerability,
related risk, and way to mitigate (control) that item. Principles of Risk Management
Organizational Context
Involvement of Stakeholders
Organizational Objectives
Reporting
Roles and Responsibilities
Support Structure
Early Warning Indicators
Review Cycle
Supportive Culture
Continual Improvement Describe how the organization can apply risk management
principles in its efforts to secure their systems.
Communication within the organization is the biggest factor in order
for the principles of Risk Management to work properly. If you see
something, say something is just as important here as it is everywhere
else. Otherwise, people will continue what they are doing and
eventually personnel files and monies will be lost. Example will be
given in the up coming slides. Outline how protection efforts will vary overtime.
Three of the principles of risk management will come into play;
reporting, early warning indicators and continual improvement in
the organization. Include three different example sets, each with a
vulnerability, related risk, and way to mitigate (control)
that item.
Time Clock Clocking someone else in
reader Use of finger print Time Clock Inputting leave and time off Use of finger print
for someone else
reader
Copier
Using staff members access Use of access card
card
and password References
Principles of Risk Management. (2017). Retrieved from
www.managementstudyguide.com/principles-of-riskmanagement.htm
Alexandria City Public Schools. (2017). Retrieved from
http://www.acps.k12.va.us/ http://
-----------