Premium Essay

University of Phoenix - Cmgt 430 - Week 2 Individual

In: Computers and Technology

Submitted By NJStylee
Words 1690
Pages 7
Week 2 Individual Assignment
University of Phoenix – CMGT 430

In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles. Roles basically define what level of system access each user and user group will have, and what permissions each person will have on their personal computer, as well as servers and databases (for IT staff). Roles help ensure the concept of “Separation of Duties”, when helps to ensure that users and IT staff are only granted the level of system access that is required, and that no administrative…...

Similar Documents

Premium Essay

Week 2 Individual Reporting

...Reporting Practices and Ethics Your Name University of Phoenix Health Care Financial Accounting HCS/405 Ashonta Tharps May 26, 2012 Reporting Practices and Ethics Revenue’s and expenses of any organization require the four main elements of financial management. These elements are planning, controlling, organizing and directing, as well as decision making. The reporting practices of the financial department has improved over the years with new and improved principles and general financial ethical standards being put into place. This paper will give the reader a better understanding of the four elements of financial management, acceptable accounting principles, and financial ethical standards. Any organization will have a Chief Financial Officer. These management personnel will follow these four basic elements to manage the financial process of the organization they work for. The first step is to plan the objectives of the organization and each step needed to complete their goals. The planning process is important to how the financial manager will keep track of money spent on projects and how they are accomplished. The controlling process is used to manage each step in the planning process to make sure the projects are on target and budget for completion. Managers use past reports to help them figure out what areas of the organization are in need of assistance and what the issues are. They are also used to determine what kind of assistance is needed or if...

Words: 864 - Pages: 4

Free Essay

Cmgt 441 Week 2

...Information Security and Phone Users CMGT/441 Information Security and Phone Users Infosecurity magazine released an article today December 3, 2012 titled “Phone Users Worry About Security, but Won’t Pay for It. Information security is heavy on most people’s minds these days. The running risk of identity theft, hacking, and viruses leaves people feeling uneasy at times, but often they are also considering the risk to the information stored on or used with their cell phones. The people who are considering the information security with their cell phones are more often than not, unwilling to pay for it, and that is what that article addressed. The Statistics The article discusses a survey done of 1026 cell phone users in the UK (United Kingdom), most of them did express a concern about information security within their mobile device . Of those 1026 users, 38% (389.88 users) felt it would be the service providers fault if there was an information security breech. 32% (328.33 users) felt they would most likely blame themselves if their information was stolen, while 18% (184.68 users) would blame the cell phone manufacturer. When questioned further, a startling 68% of users were unwilling to pay for information security, and 24% were unwilling to pay more than £1 (about $1.30) per month to pay for added security, that is a total of 943.92 people. The Attitude This is interesting information, it is curious why people who are clearly concerned about the possibility of...

Words: 475 - Pages: 2

Premium Essay

Cmgt 410 Week 2 Individual

...and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand what social engineering is. This is where training comes into view. The military does not take training related to securing its information seriously enough. Most average users on the military network could not spot an email intentionally created with inaccurate details which would throw up a red flag to trained users. Kevin Mutnik in a presentation given to military leaders said it perfectly, “The military needs to take security training seriously. Anyone who’s currently serving in the military or works for the Department of Defense has probably gone through basic computer security education, often consisting of nothing more than a one......

Words: 1178 - Pages: 5

Premium Essay

Cmgt/554 Week 3 Individual the specifications of ANSI/TIA/EIA-568A (1995). 1000BASE-T also supports 1000 Mbps operation over the newest emerging EIA/TIA cabling specifications Category 5e”. Individual sections of departmental networks such as Radiology use different standards such as 1000 BaseF. According to "1000basef Or 1000base-F" (n.d.), “1000BaseF, also known as 1000Base-F, is a 1000-Mbps baseband specification for Ethernet communications over optical fibers”. All patient data files are being encrypted for storage using AES (Advanced Encryption Standard) and require proper identification and authentication of any user wanting to access the data. The standard for all of the Radiology modalities is DICOM (Digital Imaging and Communication in Medicine) standard and PACS (Picture Archiving and Communication System). This is to keep within the compliance with the HIPAA (Health Insurance Portability and Accountability Act). The backbone network structure for the entire hospital is 1000 BaseT. According to "1000base-T Delivering Gigabit Intelligence" (n.d.), “1000BASE-T specifies Gigabit Ethernet operation over the Category 5 cabling systems installed according to the specifications of ANSI/TIA/EIA-568A (1995). 1000BASE-T also supports 1000 Mbps operation over the newest emerging EIA/TIA cabling specifications Category 5e”. Individual sections of departmental networks such as Radiology use different standards such as 1000 BaseF. According to "1000basef Or 1000base-F" (n.d.), “1000BaseF, also......

Words: 2259 - Pages: 10

Premium Essay

Cmgt/554 Week 3 Individual

...Patton-Fuller Community Hospital Networking Project Week 3 Individual Week 3 individual Week 3 Individual This paper will show an analysis of the Patton-Fuller Community Hospital network system. Based on the findings I will define what may be missing from the current network architecture. In addition I will identify the wireless technology in use, and how it enhances the hospital network. Looking at the Patton-Fuller Community Hospital intranet Web site it shows seven separate network diagrams. In these seven diagrams there are a Top View, logical, administrative, radiology, and radiology information system data center, information technology data center, and includes the ward floors, the operating room and the intensive care unit. In each section there is a complete detailed description of the network diagrams. Starting with the top view diagram representing the hospital structure from an Information Technology network perspective there are two segments of the network which are the clinical functions and the administrative functions. In the clinical areas include the emergency room and operating room, pharmacy, the labs, radiology, intensive care units, the doctor’s personal offices, and the wards. In the administrative areas are the information technology department, admitting and discharge, human resource, finance, the hospital senior management, and the facilities. The backbone network structure for the entire hospital is 1000 BaseT. According to......

Words: 2557 - Pages: 11

Premium Essay

Phoenix Mircoecon Week 2 Individual Essay

...Week 5 – Individual Assignment Fundamentals of Macroeconomics Phillip Alfonso ECO-372 August 5, 2013 Professor: Joshua Long University of Phoenix – Online PART 1 Gross domestic product (GDP) Gross Domestic Product (GDP) is the total amount of goods and services that were produced in an economy and is represented in dollars. In the US, we record what the GDP was for the entire year, however, GDP does not always have to be in the span of one year Real GDP Real GDP is a way calculate the GDP without the inflation included so that it can be easily compared to previous years, and nominal GDP would be with the inflation included. Nominal GDP Nominal GDP is the GDP for any given year that has not been modified to reflect the inflation of the US dollar. Unemployment rate Unemployment rate is the amount of people who do not have a job but are looking for one. Inflation rate This is the speed of which prices increase or decrease over time. Generally it is calculated annually or monthly. Interest rate This is the percentage of a certain amount of money that is charged to a borrower of money. When someone borrows money, they have to pay it back plus the interest. PART 2 Whenever goods or services are purchased or sold, the economy is impacted. Obviously if one person comes into a coffee shop and buys a cup of coffee, the US economy will not change, but what if one million people purchase a cup of coffee every day? Or what if those people who usually purchase......

Words: 914 - Pages: 4

Premium Essay

Cmgt 442 Week 2 Individual

...Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this......

Words: 1192 - Pages: 5

Premium Essay

Cmgt 445 Week 2 Dqs

...document of CMGT 445 Week 2 Discussion Questions shows the solutions to the following problems: DQ 1: Haddad and Ribi?re (2007) explore and expand upon the more formal use of Knowledge Management in the process of software acquisition. Analyze and discuss the use of the Software Acquisition Capability Maturity Model (SACMM) if you were the project manager responsible for a large software acquisition at your company. DQ 2: In what ways can changes in a business affect an application software development project? What are some of the tools a project manager can use to respond to changes that occur? DQ 3: Boehm and Bhuta, (2009) explore the risks associated with integrating an existing software component into a new application implementation project. Regarding the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project. DQ 4: From a project management perspective, at what point in an application implementation project timeline should the mainframe computer or server hardware be specified and/or acquired? Identify two or three considerations for making sure that the right hardware is available at the right time. General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1......

Words: 359 - Pages: 2

Premium Essay

Eco 365 Week 2 Individual

...the smaller picture and focuses on how individuals and firms make decisions based on economic forces. GoodLife Management had to consider how many apartments to supply and the price levels to charge for them to maximize profit (University of Phoenix, 2011, Week Two Simulation). Macroeconomics views the aggregate economy in terms of unemployment, growth, business cycles, and inflation. In the simulation, two macroeconomic concepts considered are the population growth in Atlantis and business cycles. GoodLife Management considered if it should increase the number of two-bedroom apartments based on what the expected demand would be for the units given the economic climate. When the population increased in Atlantis, growth in apartment housing was expected. However, depending on the housing trends at a given time, the business cycles fluctuated causing GoodLife Management to change its housing strategy to increase or reduce its housing supply (University of Phoenix, 2011, Week Two Simulation). Lintech Inc’s move to Atlantis increased the demand of two-bedroom apartments because of higher population levels. As a result of the increased demand, the demand curve shifted right. The increase in apartments demanded exceeded the amount supplied at the equilibrium price. The shortage of apartments in the market places an upward pressure on price so GoodLife Management can rent more apartments at any given rate (University of Phoenix, 2011, Week Two Simulation). As the price......

Words: 1057 - Pages: 5

Premium Essay

Cmgt 554 Week 3-It Infrastructure- Patton-Fuller Community Hospital Networking Project University of Phoenix

...CMGT 554 Week 3-It Infrastructure- Patton-Fuller Community Hospital Networking Project University of Phoenix Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser For More Courses and Exams use this form ( ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar ( ) CMGT 554 Week 3-It Infrastructure- Patton-Fuller Community Hospital Networking Project University of Phoenix Patton-Fuller Community Hospital Networking Project (Week 3) University of Phoenix CMGT 554/IT INFRASTRUCTURE Patton-Fuller Community Hospital Networking Project Today most new building construction is built with new technology and is not as much concerned with the type of budgets that a hospital muse consider in order to redesign a whole new network structure for the purpose of being more optimal and maintaining standards that keep up with advances in new technology. In most cases, a hospital’s network can transition over time with new technology and evolve into meeting the demands it requires to perform effectively. However, upgrading a hospital’s entire network can often be very expensive to implement and sustain. There may be a case where components or parts are no longer being produced to meet current and future demands. In the last several...

Words: 8701 - Pages: 35

Premium Essay

Cmgt 410 Week 2 Individual

...from the same location. If this is not possible, transportation will need to be provided to and from the training. Additional time will also need to be schedule with the venue for setup prior to training, and tear down at the conclusion of the event. Training Training will begin with sign in at the registration tables. Registration tables should be divided into a minimum of 3 tables, equally split by first letter of attendees last name. Once a person has registered, they will be offered a light breakfast and beverages and then will be asked to make their way to their respective meeting location. Breaks will be provided every 90 minutes with a 1-hour lunch in the middle of training. At the end of the training class (end of day 2), all attendees will be asked to complete a short survey about the event. The questions will cover the material covered, the training venue, and the hotel accommodations....

Words: 536 - Pages: 3

Premium Essay

Cmgt 430 Week 4 Learning Team Presentation

...CMGT 430 Week 4 Learning Team Presentation To Buy This material Click below link An enterprise security plan is more than just a list of vulnerabilities and risks. It must present them in a meaningful way along with suggestions for specific steps to mitigate each of the most important vulnerabilities or risk pairs it finds. Your task this week is to produce the basics of that full presentation. Part 1 Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls. Use the introduction and conclusion as an executive summary of the entire paper’s content. Research at least eight sources that validate the choices made in the paper. This must go beyond basic definitions. The sources can be changed in the final week, if needed. Format your paper consistent with APA guidelines. Part 2 Create a Microsoft® PowerPoint® presentation on the findings in the Enterprise Security Plan to present to senior management at your chosen organization. Keep the slides uncluttered and concise. Include well-formatted speaker notes for the presentation. Finalize your presentation for the Enterprise Security Plan. The presentation should target senior leadership at the organization and should effectively cover the material in the paper. ·         No......

Words: 330 - Pages: 2

Premium Essay

Week 2 Ia Cmgt 530

...Personality Assessment University of Phoenix CMGT/530 Personality Assessment Personality is defined as the visible aspect of one’s characters based on a combination of their physical, mental, emotional, social, and other behavioral patterns. Over the last few decades there have been numerous methods and tests that have been developed to assess ones personality. The more commonly known tests include the Meyer-Briggs Type Indicator (MBIT), the Sixteen Personality Factor Questionnaire, the Jung Theory of Psychological Types and The Keirsey Temperament Sorter II. The listed methods are all developed by different individuals; with their very own views and opinions; however; each method is based on the basic theory that a person’s behavior are the results of specific traits that can be measured and it is these measureable traits are what make up a person’s inner habits and tendencies. There are several kinds of assessment methods that have been created to help define and measure ones individual personality and traits. For this assignment; the one used to assess my personality was the Keirsey Temperament Sorter II. The Keirsey Temperament Sorter II personality assessment tool; developed by David Kiersey was first introduced in his book Please Understand Me, which was published in 1978. It is an objective test composed of 70 questions that helps to measure and indicate the personality......

Words: 928 - Pages: 4

Premium Essay

Cmgt 410 Week 4 Individual Assignment

...Week 4 Individual Assignment Michael J. Beard Jr. CMGT/410 June 18, 2012 Beth Shoults Abstract To achieve success in implementing a project, it is essential to evaluate the project thoroughly. Project evaluation is a method to assure that every party involved within the project sticks with the objective until it is completed, and guarantee that precise expectations are met. Being Huffman Trucking’s evaluator, our company concentrates in certain aspects such as work authorization, project control, performance analysis, project cost, scheduling, and budgeting. Week 4 Individual Assignment As projects are completed, evaluations would still be ongoing bi-monthly in order to continuously and appropriately maintain the company’s new system. These bi-monthly evaluations are not done as a precautionary method or early detection but as well as keeping the operation smoothly running (Westat, 2002). Every department or section of Huffman Trucking along with its headquarters would undergo the evaluation process through a bottom to top system. Through this thorough evaluation, a company’s personnel liable for a certain issue would be recognized. For example, managers would be evaluated similarity for their roles and responsibilities just like regular employee would be for each and every employee has a specific tasks and responsibilities to accomplish. Project control is defined as a scheme to permit the company to design, arrange, make financial......

Words: 638 - Pages: 3

Premium Essay

Cmgt Week 2

...Project Task-list 7/1/2012 CMGT/410 Prof Lucas U.S. Immigration Customs Enforcement Stats Database The new database that is being developed and implemented into the U.S. Immigration Customs Enforcements offices will require some training and hands on practical application. This training is intended for each one of the shift supervisors from each one of the hubs around the U.S. and because of the short timeline of this project; the training will need to be conducted over two day span at one centralized location. In order to make something like this happen and for the Managers from each shift to get as must out of the training as they can this will take a lot of preplanning and a well-executed agenda that is backed by a long list of resources. Below is a list of the resources and their responsibilities to this project. * Project Management Team. * Determent the site for the training. * Ensure that there are adequate resources at this location; a training room to hold to amount of people that will be there and rooms for the managers to stay in. * Determine what local resources will need to be on site during the training like IT, HR, etc. * Disperse this information to each one of the HR departments at each ICE Hub. * Prepare a training schedule. * Get the training schedule approved by Head Quarters. * The HR Department: * Put together the list of shift supervisors. * Provide that list to; the Project......

Words: 445 - Pages: 2