Assignment 1 Project Deliverable 1: Project Plan Inception This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. You are a newly appointed Chief Information Officer (CIO) of a $25 million dollar data collection and analysis company that has been operating less than two (2) years. It is expected to grow by 60% over the next eighteen (18) months. Your company currently collects data using Web analytics and combines it with operational systems data. Web analytics is an increasingly important part of most business marketing plans. Your company is looking for ways to leverage the collected data but wants to ensure that the information technology infrastructure will support the expected growth that the company is anticipating. The Chief Executive Officer (CEO) has given you sixty (60) days to deliver a comprehensive information systems project plan to address the organizational growth that the company is experiencing. The company will be expanding from one (1) floor to three (3) floors within six (6) months. Since this is a relatively new company, there is currently limited technology infrastructure to support the business. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices and cost-effective solutions in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud computing technologies and Software-as-a-Service (SaaS) but is leery of security issues that may be associated. However, he is sure that you will implement proper security protocols. The company currently consists of twenty (20) employees of which four (4), including yourself, are dedicated to the IT organization. Section 1: Project Introduction Write a four or more page project introduction that documents the current state of the organization, expands upon the information given above, and includes the following: Background information of the company. Details regarding the type of business that the company is engaged in. A description of current outsourcing and offshoring activities. Identification of current skilled information systems personnel in position and responsibilities. The specific types of data that the company collects. A description of the information systems that the company currently has to support the business. The description at a minimum should include the following: Operational Systems and Databases Analytics and Interfaces Infrastructure and Security The use of at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Section 2: Project Plan Use Microsoft Project to: Create a project plan (summary and detailed) using Microsoft Office Project. The project plan should: Record all tasks, subtasks, resources, and time related to the project. Outline the planning, analysis, design, and implementation phases. Develop in accordance with the systems development life cycle (SDLC). The specific course learning outcomes associated with this assignment are: Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm. Use technology and information resources to research issues in information systems. Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions. ———————————————————————————————Assignment 2: Case Study 1: Acceptable Use Policy An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study. Write a three or more page paper in which you: Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization. Critique the AUP you selected and provide recommendations for improving the AUP. Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability. Describe how your selected AUP accomplishes these goals. Describe methods for increasing the awareness of the AUP, and other policies, within the organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. The specific course learning outcomes associated with this assignment are: Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure. Describe the different ISS policies associated with the user domain. Describe different issues related to implementing and enforcing ISS policies. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions. ————————————————————————————————-Assignment 3: Write an essay with no less than five pages in which you lay out the need for cybersecurity awareness. You may use a case study as an example or a hypothetical small business in which you identify the need, potential threats and vulnerabilities and how they were addressed or how you would address them. Find no less than three quality sources to support your work, or case. It is encouraged to find additional sources for corroboration, or fresh ideas. I suggest no less than three additional sources. If you use sources, they must support ideas, not replace your words or ideas. Review the documents I provide in the Instructor Insight under the Professor tab on the left screen. Note: The above and what follows are guidelines. That is they are not to be answered, necessarily linearly, nor like short exam answers that must be answered. This is an essay, meaning you decide what needs to be covered and why, based on the overall lessons you want the reader to take away. *Have a clear introduction based on what you present and document in the body, and drafted/revised last to reflect the actual paper. A conclusion that provides a clear and concise summary of what your security plan and organization will be, and a strong closing statement. The specific course learning outcomes associated with this assignment are: Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills.
3 Assignments
Order a plagiarism free paper now. We do not use AI. Use the code SAVE15 to get a 15% Discount
Looking for help with your ASSIGNMENT? Our paper writing service can help you achieve higher grades and meet your deadlines.
Why order from us
We offer plagiarism-free content
We don’t use AI
Confidentiality is guaranteed
We guarantee A+ quality
We offer unlimited revisions