Preview

CMGT 430 Week 5 Riordan Manufacturing Enterprise Security Plan Presentation

Satisfactory Essays
Open Document
Open Document
651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT 430 Week 5 Riordan Manufacturing Enterprise Security Plan Presentation
This file includes CMGT 430 Week 5 Riordan Manufacturing Enterprise Security Plan Presentation Computer Science - General Computer Science When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.

Refer to the Ferraiolo et al. article (2003), and examine the concepts of role graphs. Develop a similar role graph for the human resource information systems (HRIS) used by Riordan Manufacturing. Refer to Figure 7 of the article as a point of reference Consider there are four primary roles: HR clerk, HR supervisor, HR Manager and IT support staff. Write 3-5 page paper discussing the roles in terms of required access, restrictions, and policies of all types that would need to be implemented. Include your role in graph the paper.

major concern within enterprise environments is trust management. This concern crosses multiple domains: business to business (B2B), think eBay and PayPal; business to consumer (B2C), such as online banking, intra-enterprise applications (HR, finance, manufacturing, purchasing, and accounting). Pick one of these domains and write a 3-5 page paper describing the enabling role and challenges of distributed-trust-based management

The final paper and presentation should represent practical...

To get this material Click this link - https://bitly.com/12Br7qP

Wait until class starts

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Manufacturing is interested in integrating its existing variety of HR tools into a single integrated application. The service request is tasked to define the business requirements for the development of an HR system to support the objective. The requirements of this project will include the description of the application architecture, process design, and security controls recommended for the design of the HR system.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Include a high-level description of the security controls you recommend for the design of this HR system. Apply the tools of systems analysis to describe the information system’s architecture in terms of data, processes, interfaces, and network.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Describe the application architecture and process design. Include a high-level description of the security controls you recommend for the design of this HR system.…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Strategic managers have responsibility to both the employees and stakeholders of the organization. Engaging in strategic management decisions should include ethics and social responsibilities. The expectation of such responsibilities from stakeholders is to fulfill legal and ethical economic decisions.…

    • 2634 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    McBride Financial Services in its effort to control data access must emphasize on the need for all networking administrators to carefully restrict employee’s data access privilege, based on the role each employee is assigned within the organization. It is essential for the company to outline in its Business Requirement Document (BRD) the need for each employee to be assigned specific separating duties, and that a Networking Requirements Document (NRD) is used to capture and define the names, department, privileges and roles to be assigned to each employee (user).…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Krot, K., & Lewicka, D. (2012). The importance of trust in manager-employee relationships. International Journal of Electronic Business Management, 10(3), 224-233.…

    • 3126 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Hi How R U

    • 2214 Words
    • 9 Pages

    This research discusses the possibility of a control system of being attacked by different types of attacks and via different sources. The main questions are, what is the reason that would make the security of control system a very important and interesting topic? Why this problem should be subjected to studying and analyzing? What are the needed requirements for the security of a control system? Fundamental and new requirements are provided in this search. Additionally, new mathematical frameworks are proposed to analyze those attacks. This framework, the way to detect an attack and how to survive it has been out together in this paper (Alvaro A. C´ardenas, 2008).…

    • 2214 Words
    • 9 Pages
    Better Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays

Related Topics