Title: CMGT 582 STUDY creative knowledge /cmgt582study.com
1CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
2CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Assignment Audit of the HR Department
FOR MORE CLASSES VISIT www.cmgt582study.com
You are part of a team has been selected by the
Chief Information Officer (CIO) to perform an
audit of the HR Department. Create a 10- to
12-slide presentation (not including the title
and reference slides) that examines the specific
audit steps that should be performed to evaluate
the following areas Handling of
ethical issues, including security-related
legal/regulatory compliance (non-privacy
related), intellectual property and licensing
Compliance with privacy related laws and
regulations Adequacy of security
policies and security awareness training
Identification of security related risks/threats
3CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 1 Individual Assignment Getting
Involved FOR MORE CLASSES VISIT
www.cmgt582study.com Assignment Preparation
Activities include watching the SkillSoft
videos, completing the SkillSoft course,
independent student reading, and research. Watch
the "Fostering Collective Responsibility for IT
Risk" video. Watch the "Balancing Security with
User Convenience" video. Complete "Introduction
to Information Security Governance" topic of the
Skillsoft course "CISM 2012 Information
Security Governance (Part 1)." Assignment
Situation You have just joined an organization
that depends on the use of
4CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 2 Individual Assignment Security
Within My Organization FOR MORE CLASSES VISIT
www.cmgt582study.com Assignment Preparation
Activities include watching the SkillSoft
videos, completing the SkillSoft course,
independent student reading, and research. Watch
the "Technology and the Impact on Business and
the Environment" Skillsoft video. Complete
"Defining law and ethics" point of topic "The
Relationship Between Law and Ethics" of the
Skillsoft course "Business Law and Ethics."
5CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 3 Assignment Privacy with Ethics
Considerations FOR MORE CLASSES VISIT
www.cmgt582study.com Create a 10- to 12-slide
presentation evaluating the three areas of
privacy issues specific to FERPA, HIPAA, and EEA.
Develop scenarios in all of the three areas that
you feel are most important to the recipients
protected by these laws and the methodology used
in each. Include how each of these laws affects
the requirements of companies or colleges and how
each manages their security strategy to enforce
compliance. Compare the effectiveness of each
industry's efforts to ensure privacy issues are
addressed and protected.
6CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 3 Individual Assignment Risk
Assessment FOR MORE CLASSES VISIT
www.cmgt582study.com Assignment Preparation
Activities include watching the SkillSoft
videos, completing the SkillSoft course,
independent student reading, and research. Watch
the "QuickTalks David Bach Nonmarket Strategy
The Next Frontier of Competitive Advantage"
Skillsoft video. Complete the "Intrusion
Prevention Technologies" topic of the lesson
"Understanding IPS Fundamentals" in the
Skillsoft course "Cisco IINS 2.0 Implementing
IPS."
7CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 4 Individual Assignment
Technologies and Methodologies Evaluation FOR
MORE CLASSES VISIT www.cmgt582study.com
Assignment Preparation Activities include
watching the SkillSoft videos, completing the
SkillSoft course, independent student reading,
and research. Watch the "Creating an Actionable
Risk Management Strategy" SkillSoft
video. Complete the "Network Security Appliances
and Methods" topic of the Skillsoft course
"CompTIA Network 2012 Network Security Part 3."
8CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 5 Assignment Mitigating Information
Management Risk FOR MORE CLASSES VISIT
www.cmgt582study.com Consider information
security risks, including Cybercrime and
cyber-related crimes Social engineering Mobile
computing BYOD (Bring your own device). Write a 3
full page evaluation (not including the title and
reference pages) of security
9CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 5 Individual Assignment Policy
Implementation Presentation FOR MORE CLASSES
VISIT www.cmgt582study.com Assignment
Preparation Activities include watching the
completing the SkillSoftcourse, independent
student reading, and research. Complete the
"Security Policy Documents and Life Cycle" topic
of the Skillsoft course "SSCP Domain Security
Operations and Administration Part 1." Complete
the "Risk Management and Regulatory Compliance"
topic of the "Security Policies and Life-Cycle
Approach" lesson of the Skillsoft course "Cisco
IINS 2.0 Security and Strategies."
10CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 5 Individual Assignment Policy
Implementation FOR MORE CLASSES VISIT
www.cmgt582study.com Assignment Preparation
Activities include watching the completing the
SkillSoftcourse, independent student reading,
and research. Complete the "Security Policy
Documents and Life Cycle" topic of the Skillsoft
course "SSCP Domain Security Operations and
Administration Part 1."
11CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com
CMGT 582 Week 6 Individual Assignment Systems
Development Life Cycle (SDLC) FOR MORE CLASSES
VISIT www.cmgt582study.com Assignment
Preparation Activities include watching the
completing the SkillSoftcourse, independent
student reading, and research. Complete the
"Information Risk Management Overview" topic of
the "Information Risk Management Program" lesson
of the Skillsoft course "CISM 2012 Information
Risk Management and Compliance (Part 1)."
12CMGT 582 STUDY creative knowledge
/cmgt582STUDY.com