Week 1 Signature Assignment: Vampire Legends Due Monday
Wk 1 Signature Assignment Vampire Legends Due Montop Of Formbotto
Wk 1 - Signature Assignment: Vampire Legends [due Mon] Top of Form Bottom of Form Assignment Content 1. Top of Form Part A: Ch. 10 Role Playing Sim: Vampire Legends In this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security. Using the Vampire Legends Access link, complete the interactive before moving to Part B.
Part B: Memo to CEO Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts: · Part 1: Analysis of Components of Information Security that does the following: · Categorizes the components of information security · Analyzes the components of information security as it applies to the scenario presented in Vampire Legends · Contains a breakdown of the budget report · Discusses your allocation strategy based on the risks and expenses involved · Describes your choice for the best advertising campaign · Outlines the course of action in handling information security threats in the future · Part 2: Role of Ethics that does the following: · Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organization · Describes the consequences of the conflict · Discusses the solution to the conflict · Discuses the impact of ethics on revenue CMGT/582: Security & Ethics Wk 2 - Cruisin’ Fusion, Part 1 [due Mon] Top of Form Bottom of Form Assignment Content 1.
Top of Form Part A: Ch. 6 Role Playing Sim: Cruisin' Fusion In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You are not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture.
Using the Cruisin’ Fusion Simulation Access link, complete the interactive before moving to Part B. Part B: Cruisin’ Fusion Contest Now that the Cruisin’ Fusion website is up and running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter their first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card. Kiran supports this idea but has concerns she wants the team to consider before moving forward.
She has asked that you prepare a 6- to 10-slide presentation, with speaker notes, for the next web meeting to address the following: · Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected? · Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require? · Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.
Submit your assignment. Bottom of Form Bottom of Form CMGT/582: Security & Ethics Wk 3 - Signature Assignment: Cruisin’ Fusion, Part 2 [due Mon] Top of Form Bottom of Form Assignment Content 1. Top of Form Refer to Cruisin’ Fusion, Part A in Wk 2. The Cruisin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand.
Research various shopping cart software to determine the best choice for website. Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. Your blog post should do the following: · Introduce the order-ahead option. · Explain the differences between ethics, organizational policies, and laws. · Analyze how the new shopping cart software upholds ethical trends in consumer privacy. · Describe organizational policies that will be implemented to help protect consumer data. · Examine ethical considerations for maintaining confidentiality and consumer data. · Describe the various privacy laws and regulations upheld with the shopping cart software.
CMGT/582: Security & Ethics Wk 4 - Devil’s Canyon, Part 1 [due Mon] Wk 4 - Devil’s Canyon, Part 1 [due Mon] Top of Form Bottom of Form Assignment Content 1. Top of Form Part A: Devil's Canyon Simulation In this simulation, you will evaluate how to design an enterprise architecture for a mountain resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying in budget. Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B. Part B: Policies, Plans, and Risks Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them.
This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments. In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team: · Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure. · Outline the importance of a security plan in relation to security roles and safeguards. · Analyze at least 5 security-related risks/threats that Devil’s Canyon may face. · Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level.
For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk. · Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones. CMGT/582: Security & Ethics Wk 5 - Signature Assignment: Devil’s Canyon, Part 2 [due Mon] Top of Form Bottom of Form Assignment Content 1. Top of Form Refer to Devil’s Canyon, Part A in Wk 4. Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team.
In your matrix, you should: · Describe briefly each of the identified risks/threats. · Evaluate the security controls that mitigate each of the risks/threats identified. · Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level. · Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks. Bottom of Form Bottom of Form Bottom of Form 2 Mohammed Alsaadi Maria Claver Gern /11/2021 Life Review: Proposal/Script In life, every individual goes through unique experiences during the different stages of their lives. It is through these experiences that one is able to develop their personal perspectives, judgments, and also acquire personal strengths and wisdom.
Much of what an individual is a today is determined by the physical, emotional and mental experiences, challenges and hardships that they have gone through in life. Much of what an individual is today is determined by the physical, emotional and mental experiences, challenges and hardships that they have gone through in life. It is through these experiences that one is able to develop their personal perspectives, judgments, and also acquire personal strengths and wisdom.
Much of what an individual is a today is determined by the physical, emotional and mental experiences, challenges and hardships that they have gone through in life. It is through these experiences that one is able to develop their personal perspectives, judgments, and also acquire personal strengths and wisdom.