Xplain what is meant by security policy and describe the


Course eTextbook Kroenke, D. (2015). Using MIS 2014 [VitalSource Bookshelf version] (7th ed.).

Discussion VII need asap late 200 words min

Outsourcing can appear too good to be true, and some of the benefits of outsourcing can be outweighed by its long-term costs. Conduct some research on the advantages and disadvantages of outsourcing. Using what you learned from your research, discuss an example of how the benefits of outsourcing are outweighed by its long-term costs.

Reply to below 200 words min

The benefits of outsourcing are outweighed by its long-term costs. An example of how benefits of outsourcing are outweighed by its long-term costs is the outsourcing of iPhone to South Asian countries. The main benefit was a lower cost of manufacturing but the long-term cost was that the technology of iPhone was exposed to foreign manufacturers.

These companies made similar products that were comparable to the iPhone. A large part of the market for smartphones was appropriated by foreign companies. Further, when a product manufacturing is outsourced, hidden costs creep in. In the case of iPhone, the result is.

Unit VII Assessment late need asap

Question 1 : In an IS department, the ____________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

operations

technology

development

manufacturing

Question 2 : Every IS user has a right to a secure computing environment. This means that:

The organization should protect his/her computer and its files

The user should solely be in charge of protecting the organization's computers and files

The user should inform the IS about software upgrades

The user will never face a network problem

Question 3 : The responsibilities of a ____________ include advising the chief information officer, executive group, and project managers on emerging technologies.

technical writer

chief financial officer

system analyst

chief technology officer

Question 4 :  A ____________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

system analyst

business analyst

user support representative

systems auditor

Question 5 : The purpose of the ____________ group is to protect data and information assets by establishing data standards and data management practices and policies.

data administration

data warehousing

data mining

data communication

Question 6 : Describe the major functions of the IS department.

Your response should be at least 200 words in length.

Question 7 : Describe any four rights of users of information systems.

Your response should be at least 200 words in length.

Unit VIII Discussion Board

Reply with min 200 words

Identify an assignment in this course that had a positive impact on you. How will you be able to apply the skills you learned from it to gain life and/or career success?

Respond to below min 200 words

An assignment in this course that had a positive impact on me would be the last assessments regarding safety policies and security incidents. Being in human resources and being responsible for creating and implementing policies, having a better understanding on how to protect the information system as well as give direction to users is very useful.

Also, having knowledge of how information systems work and would could affect them, I can create policies and procedures to help the organization. In addition, having a better understanding of how implementing a new system works, I can assist with the staffing to help make it successful.

Unit VIII Assessment

Question 1 : A ____________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

target

vulnerability

threat

key escrow

Question 2 : ____________ is the term used to denote viruses, worms, and Trojan horses.

Malware

Cookie

Firewall

Spam

Question 3 : Which of the following is an example of a sniffing technique?

IP spoofing

Caches

Denial of service

Adware

Question 4 : A(n) ____________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

intrusion detection system

keylogger

botnet

access control system

Question 5 : When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ____________ .

unauthorized data disclosure

incorrect data modification

faulty services

loss of infrastructure

Question 6 : Define threat, vulnerability, safeguard, and target. Support your answer with examples.

Your response should be at least 200 words in length.

Question 7 : Explain what is meant by security policy and describe the basic information that a security policy must stipulate.

Your response should be at least 200 words in length.

Unit VIII Research Paper

Utilizing the unit lessons, textbook, Online Library, and other outside sources, write a two-page (not including title and reference pages) Research Paper identifying the key components of information systems management discussed throughout this course.

Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute.

Then, select three out of the six questions below, and provide detailed answers, supporting those answers by referencing any sources used. Be sure to use examples from your research to strengthen your argument as needed.

• What personal knowledge management tools does this organization utilize?

• What steps has this organization taken in securing their information and knowledge?

• What has this organization done to gain and sustain an advantage over their competitors?

• Describe in detail how this organization manages the components of its IT infrastructure.

• In what ways does the organization demonstrate successful collaboration?

• Identify at least two types of hardware and two types of software used by this organization.

APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Xplain what is meant by security policy and describe the
Reference No:- TGS02299480

Now Priced at $60 (50% Discount)

Recommended (98%)

Rated (4.3/5)