Operation Management Discussion

Relax! Stop worrying about deadlines and let our professional writers help you. Hire an essay writer helper and receive a professional assignment before your deadline. We provide writing services for all types of academic assignments.


Order a Similar Paper Order a Different Paper

Subject: Operations Security

  1. Assignment: Using Security Policies and Controls to Overcome Business Challenges
  2. Learning Objectives and Outcomes
    • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
    • Identify four IT security controls for a given scenario.

    Scenario

    • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
    • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
    • The customer service department is the organization’s most critical business function.
    • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
    • The organization wants to monitor and control use of the Internet by implementing content filtering.
    • The organization wants to eliminate personal use of organization-owned IT assets and systems.
    • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
    • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

    Assignment Requirements
    Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.Required Resources

    • Course textbook
    • Internet

    Submission Requirements

    • Format: Microsoft Word
    • Citation Style: Your school’s preferred style guide
    • Length: 1–2 pages

    Self-Assessment Checklist

    • I listed four IT controls based on the scenario.
    • I provided rationale for my selection of IT security controls.

    Reference:
    Texbook: Security Policies and Implementation Issues, Author: Robert Johnson

Great students hand in great papers. Order our essay service if you want to meet all the deadlines on time and get top grades. Professional custom writing is the choice of goal-focused students. Word on the online streets is... we're simply the best!

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper