Professional Documents
Culture Documents
https://www.grades4u.com/cmgt-582-entire-course-p2499.php
WEEK 1
CMGT 582 Week 1 Individual Assignment Information Security
Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.
Assignment: Situation: You have just joined an organization that depends on the use of the web
to perform most of its major tasks. You have noticed that information security is mostly ignored by
those performing the work tasks and it is not a priority with management or executive leadership.
Write a 1- to 2-page memo to the Chief Executive Officer (CEO) that is designed to increase the
priority of information security. Include a convincing argument of why the survival of the
organization may depend on information security. Include these topics:
Authenticity
Accountability
Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.
Watch the "Technology and the Impact on Business and the Environment" Skillsoft video.
Complete "Defining law and ethics" point of topic "The Relationship Between Law and
Ethics" of the Skillsoft course "Business Law and Ethics."
Complete "Recognize the Effect of Laws and Regulations on Audit Planning," point of
topic "Management of an IS Audit Function," of the lesson "Information Systems and the IS
Audit Function" of the Skillsoft course "CISA Domain: The Process of Auditing Information
Systems - Part 1."
Define ethics.
Connect or relate the discussed constituent parts into an overall structure that may relate
to an IT/IS code of conduct or ethics.
Describe the privacy regulations or laws related to the identified ethical issues.
WEEK 3
CMGT 582 Week 3 Learning Team Assignment Riordan Manufacturing Security Audit
Review reading assignments involving the risk formula, information security risk assessment,
security controls, and risk mitigation strategies.
Description of security controls or safeguards that are related to your risk assessment.
Submit the draft for assessment. You will have the opportunity to redraft this information in
following weeks to improve the content for the Week 6 requirement.
Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.
Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of
Competitive Advantage" Skillsoft video.
Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS
Fundamentals" in the Skillsoft course "Cisco IINS 2.0: Implementing IPS."
Complete slides 1 to 3 of the "Risk Response Strategies" topic of the Skillsoft lesson
"Plan Risk Responses" of the course "Risk response and Control (PMBOK Guide Fifth
Edition)."
Prepare a 3- to 5-page risk assessment of your organization or an organization with which you
are familiar.
Include how the formula for risk can be applied to the organization.
Include the following in your assessment that is part of Figure 14.3, Risk Assessment
Methodology, of the Stallings and Brown textbook Computer Security (p. 478):
System characterization
Threat identification
Vulnerability identification
Control analysis
Likelihood determination
Impact analysis
Risk determination
WEEK 4
CMGT 582 Week 4 Learning Team Assignment Security Audit Part III
Review reading assignments involving security technologies and methodologies to include
access control technologies.
Add 2- to 4-pages of information to your previously submitted updated outline, considering any
assessment input, related to any or all of the following that you plan to include in your security
audit:
Application of network security technologies and methodologies
Submit the draft for assessment. You will have the opportunity to redraft this information in
following weeks to improve the content for the Week 6 requirement.
Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.
Complete the "Network Security Appliances and Methods" topic of the Skillsoft course
"CompTIA Network+ 2012: Network Security Part 3."
Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoftcourse
"CompTIA Network+ 2012: Network Security Part 3."
Firewalls
Access control
CMGT 582 Week 5 Learning Team Assignment Learning Team: Security Audit Part IV
Review reading assignments involving security policies, planning, and implementation to include
multilevel security processes.
Add 2- to 4-pages of information to your previously submitted updated outline, considering any
assessment input, related to any or all of the following that you plan to include in your security
audit:
Security policies
Security planning
Submit the draft for assessment. You will have the opportunity to redraft this information in the
following week to improve the content for the Week 6 requirement.
Assignment Preparation: Activities include watching the completing the SkillSoft course,
independent student reading, and research.
Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft course
"SSCP Domain: Security Operations and Administration Part 1."
Complete the "Risk Management and Regulatory Compliance" topic of the "Security
Policies and Life-Cycle Approach" lesson of the Skillsoft course "Cisco IINS 2.0: Security
and Strategies."
Consider security planning policies, procedures, and models to include multilevel and
cryptographic processes.
Write a 4- to 6-page discussion of how policies are used to implement a security plan.
WEEK 6
CMGT 582 Week 6 Individual Assignment SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
Assignment Preparation: Activities include watching the completing the SkillSoft course,
independent student reading, and research.
Complete the "Information Risk Management Overview" topic of the "Information Risk
Management Program" lesson of the Skillsoft course "CISM 2012: Information Risk
Management and Compliance (Part 1)."
Completethe "Auditing and Testing IS Security" topic of the "Auditing Internal and
External Security" lesson of the Skillsoft course "CISA Domain: Protection of Information
Assets - Part 2."
Consider the systems development life cycle (SDLC), security systems life cycle, and information
systems security certification and accreditation.
Write a 3- to 5-page evaluation of the use of the security life cycle. Include the following:
Review of steps unique to the security life cycle, not in common with SDLC
Applicable criteria and standards, such as certification and accreditation, used in your
evaluation
click to buy
https://www.grades4u.com/cmgt-582-entire-course-p2499.php