Preview

Cmgt 430 Enterprise Security Research Paper

Satisfactory Essays
Open Document
Open Document
2331 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 430 Enterprise Security Research Paper
Syllabus
College of Information Systems & Technology
CMGT/430
Enterprise Security
Copyright © 2010, 2009, 2008, 2006, by University of Phoenix. All rights reserved.

Course Description

This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.

Policies

Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:

University policies: You must be
…show more content…
(2008). IT security audits best practices. Faulkner Information Services.

All electronic materials are available on the student website.

Week One: Enterprise System Architecture—Overview

Details
Due
Points
Objectives
1.1 Understand the unique design, operation, and management conditions associated with an Enterprise System Architecture (ESA).
1.2 Identify core operational priorities associated with the development and management of cross-functional enterprise systems.
1.3 Recognize the major elements of Enterprise Application Architecture (EAA).
1.4 Examine major security issues associated with Enterprise Application Integration (EAI) and Enterprise Collaboration Systems (ECS).

Readings
Read Ch. 1, “Our Digital Planet”, in Tomorrow’s Technology and You.
Read Ch. 2, “Hardware Basics: Inside the Box”, in Tomorrow’s Technology and You.
Read Ch. 3, “Hardware Basics: Peripherals”, in Tomorrow’s Technology and You.
Read Ch. 4, “Software Basics: The Ghost in the Machine”, in Tomorrow’s Technology and You.
Read Ch. 7, “E-Business Systems”, in Management Information Systems.
Read the Week One Read Me First.
Read this week’s Electronic Reserve
…show more content…
This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week

You May Also Find These Documents Helpful

  • Powerful Essays

    Stavrou, A., & Institute for Security Studies (South Africa). (2002). Mission Impossible? : E-Security In South Africa 's Commercial And Financial Sectors. Pretoria, South Africa: Institute for Security StudiesRufi, A. W., & Cisco Networking Academy Program. (2007). Network Security 1 and 2 Companion Guide. Indianapolis, Ind: Cisco Press…

    • 1233 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Sociology and Learning Team

    • 2532 Words
    • 11 Pages

    Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 2532 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ACCOUNTING SYSTEM INSIGHTS

    • 4258 Words
    • 18 Pages

    1. Enterprise system – A system that supports business activities throughout the enterprise, including inputs, processing, and outputs…

    • 4258 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    Syllabus Ethics

    • 2509 Words
    • 11 Pages

    Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 2509 Words
    • 11 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ch10 c

    • 1705 Words
    • 10 Pages

    2. Enterprise systems are integrated ISs that support core business processes and functions. How is integration achieved?…

    • 1705 Words
    • 10 Pages
    Satisfactory Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    It is crucial for any organization to take necessary steps in securing their business’ assets, and customer’s data. Furthermore, it is also important for these security measures to be effective, and thoroughly planned. It is as equally important, in this interconnected and high-tech world, for corporations to also have and enforce an effective corporate security policy, because there are both internal and external threats (Symantec Corporation, 1995-2010).…

    • 1470 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Bs/400

    • 1036 Words
    • 5 Pages

    References: Motiwalla, L.F. (2009). Enterprise systems for management, 1e. Retrieved from The University of Phoenix eBook Collection.…

    • 1036 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch09

    • 11749 Words
    • 60 Pages

    1) Enterprise systems feature a set of integrated software modules and a central database that enables data to be shared by many different business processes and functional areas throughout the enterprise.…

    • 11749 Words
    • 60 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mis Chapter 9 Notes

    • 748 Words
    • 3 Pages

    * Enterprise architect creates a blueprint of an organization’s information systems and the management of these systems…

    • 748 Words
    • 3 Pages
    Satisfactory Essays