Preview

Cmgt 430 Week 2

Best Essays
Open Document
Open Document
1585 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 430 Week 2
Huffman Trucking: Benefits Election System
CMGT442: Information Systems Risk Management
February 14, 2011
TABLE OF CONTENTS

INTRODUCTION..................................................................................................................... 3

SECURITY REQUIREMENTS............................................................................................... 3 Firewall Protection................................................................................................................ 4 Password Protection.............................................................................................................. 4 Password Renewal................................................................................................................. 4

POTENTIAL RISKS................................................................................................................. 5 Database Hacking.................................................................................................................. 5 Database Corruption............................................................................................................. 6 Espionage............................................................................................................................... 6

CONCLUSION.......................................................................................................................... 6

APPENDIXES........................................................................................................................... 8 Appendix A: Firewall Concept and Responsibility (Figure 1).............................................. 8 Appendix B: SWOT Analysis Example (Figure 2)................................................................. 9



References: Apollo Group (2003). Huffman Trucking Homepage. Retrieved February 08, 2011, from https:// ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Huffman/HuffmanHome002.htm. Bill Gates (n.d.). BrainyQuotes.com. Retrieved February 14, 2011, from BrainyQuotes.com Web site: http://www.brainyquotes.com/quotes/quotes/b/billgates191262.html. Business Dictionary (2011). Risk. Retrieved February 11, 2011, from http://www. Daly, P. G. (2006). Preventing Internal Security Breaches. Retrieved February 11, 2011, from http://www.intranetjournal.com/articles/200607/pij_07_13_06a.html. Greenfile Developments, Ltd. (1997). The SWOT Analysis. Retrieved February 09, 2011, from http://www.greenfile.net/resources/Periscope/swot.htm. HowStuffWorks (2011). How Computer Viruses Work. Retrieved February 14, 2011, from http://www.howstuffworks.com/virus.htm. Solution One Network (2003). Network Protection/Recovery and Security. Retrieved February 11, 2011, from http://www.solution-one.net/protec.htm. TopBits (n.d.). How Firewall Protection Works. Retrieved February 13, 2011, from http://www.tech-faq.com/working-of-firewall-protections.html. University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/ libraries/Service%20Requests/HuffmanSR/huffmanSR001.htm. WiseGeek (2011). What is Computer Hacking? Retrieved February 12, 2011, from http://www.wisegeek.com/what-is-computer-hacking.htm.

You May Also Find These Documents Helpful

  • Better Essays

    Week 5 Qnt351

    • 1843 Words
    • 8 Pages

    The instrument used to collect data from all 449 employees at DMC except upper management was an employee survey (UOPX Library, para 11). The survey was administered anonymously and at-will to 449 employees, and distributed with employee bimonthly paychecks within a six-week time frame. Only 78 responses out of 449 were returned to HR, which is a 17.3% response rate by the employees.…

    • 1843 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The objective is to successfully convert the United States Army Medical Department from EMR to AHLTA. There are trainers that are set in place to ensure that the staff receives their full attention and that they also feel comfortable with the software. The outcome of this would be to have the ability to easily communicate electronically regarding patients and is up to date with today’s advanced technology which will allow the compliance with government standards as well as high reimbursement for every office. . While being trained the staff should feel very comfortable when working with the software and to ensure that this happens a questionnaire is given for feedback.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    References: Apollo Group, Inc. (2013). Patton-Fuller Community Hospital. Information Systems Overview. Retrieved from CMGT/554 – IT Infrastructure…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    CMGT 410 Week 4 Resources

    • 508 Words
    • 3 Pages

    When it comes to succeeding in college, there are many influential factors. In fact, even your choice of seat can make a difference. Try to score a seat near the front of the lecture hall rather than one right next to the exit. You are more likely to stay engaged and can ask your professor questions easily.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Mgt 521 Week 4

    • 935 Words
    • 4 Pages

    Ryan and Aaron are an amazing example of modern entrepreneurs. They grew their business from the ground up and did so with little capital. One key lesson apparent from the video is that they had an innovative product that there was a market need for. Email news letters is an excellent tool for a number of reasons and an obvious go to model for the future. Having a product that was an internet based product also gave them easy access to the international market.…

    • 935 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Mgt 521 Week 1

    • 457 Words
    • 2 Pages

    To communicate the information effectively from the Vice President of Communications to the team, an appropriate channel would be a face-to-face conversation. The client is new to the company and in a meeting the team will be able to discuss the parameters, deadlines, and the client. The meeting ensures the team is aware of the client’s criteria. “Face to face conversation scores the highest in channel richness because it transmits the most information” (Robbins & Judge, 2011). The appropriate channel to communicate back to the vice president can be an electronic email. The e-mail can use bullet points to sum up the team meeting, direction and goals. The vice president will be able to send check in emails at different points during the follow-up on the strategy. “E-mail messages can be quickly written, edited and stored” (Robbins & Judge, 2011). Due to a one week timeline, time spent arranging a face to face meeting would take precious time out of the short deadline.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    mgmt 520 week 3

    • 1210 Words
    • 5 Pages

    State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interest you (briefly).…

    • 1210 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Mgt311 Week 4

    • 796 Words
    • 4 Pages

    The strength is when both parties involved in the issue propose to solve the problem by discussing the differences rather than by accommodating, therefore they benefit from the results.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hcs 475 Week 2

    • 1182 Words
    • 5 Pages

    References: McConnell, C. R. (2010). Managing Change. In Management Skills for the New Health Care Supervisor (pp. 401-422). Sudbury, Massachusetts: Jones and Bartlett.…

    • 1182 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Hcs 465 Week 3

    • 1208 Words
    • 5 Pages

    The purpose of this paper is to further analyze the study done on elderly and the amount the Internet is used to search for information related to health. The items of discussion include data collection methods, data analysis procedures, findings of the study, and the strengths and limitations of the study.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cmgt 441 Week 2

    • 262 Words
    • 2 Pages

    The article on Facebook apps leaked users’ information, security. Lawmakers says that hundreds of thousands apps may have gotten access tokens to user personal information into the hands of unauthorized parties. Supposedly the company has corrected the issue. This article will be evaluated on its usefulness and validity or appropriateness. After carefully reviewing the article critics will be able to evaluate the paper accordingly.…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In the field of policing there are a couple different paths for an individual to choose from and they include private security and public policing. State government, city government, and towns normally provide the community with a public police force to enforce the laws and protect the citizens. Police officers are very important within a community but sometimes a private security can come in and help out and this frees up time for the public policing. Private security personnel generally work for a private company that handles their own dispatching, training and recruiting. Private security functions include loss-prevention duties or protective services that would not be handled by public policing. Private security also specializes in closed circuit monitoring services, secret level clearance, drive by patrol. Private security does not have the authority to arrest anyone either; however they can detain until law enforcement get there. Public policing officers are a function of the executive branch of government. Public officers are paid entirely from public funds that generate from grants, public sources, and revenues from taxes. Most private security organizations are paid from collecting a fee from their client. It is not uncommon for private security to go undercover like public police also, so that they can blend in the environment and be used as asset protection. The goals and training of private security and public policing are similar to each other. Private security and public policing are unique and successful in their own ways. The way that the private security and public policing organizations function and interact within each other is different; however they both function with leadership. The differences in public policing and private security would include the duties of the job. Police officers duties include responding to emergency calls, patrol public streets and monitor the…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    United States. National Highway Traffic Safety Administration. Federal Highway Administration. Highway Safety Program Standards. GPO, 1973. Print.…

    • 1626 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cja 314 Week 2

    • 1016 Words
    • 5 Pages

    Armed robbery is considered to be a serious offense in the United States and I would imagine that being robbed at gunpoint or with a big sharp knife would be a terrible experience for anyone to have to endure. In an effort to reduce the amount of armed robberies each year it is important to research different methods that would aid in the reduction of violent crimes that take place each year. As a criminologist advisor to a member of the state legislation, it is important that any recommendation be extremely solid. In my opinion, an extremely solid recommendation is not based solely on popularity; it is based primarily on statistics. Armed robbery is a violent offense that can have a devastating effect on a person’s life. These crimes are detrimental to the growth of society, which means that society needs to do as much as possible to decrease these acts of violence. It would be nearly impossible to eliminate armed robberies completely but that does not mean that it should not be attempted. After careful consideration and tedious research it is my recommendation that anyone convicted without reasonable doubt by their peers in a court of law of armed robbery should have to serve double the maximum prison term. This type of deterrence, I believe, will prove to have successful results.…

    • 1016 Words
    • 5 Pages
    Good Essays