CMGT

Learning Team Vulnerabilities and Threat Pairs

-13 (7 logical and 6 physical) Olive Green-13 (6 logical and 7 physical) Red-12 (6 logical and 6 physical) Purple- 12 (6 logical and 6 physical) OrangeVulnerabilities Threats Probability Impact Suggested Mitigation Steps     Physical     Card access Network Security       Access Roster Confidentiality       Biometrics Confidentiality     […]

Using Roles

Using Roles Paper This paper will discuss a better way to control user access to data is to tie data access to the role a user plays in an organization. It will cover the value of separating duties in the organization. Then discuss the value of using roles to segregate the data and system access

SDLC Comparison Summary

SDLC Comparison Summary Name Institution Instructor Date SDLC Comparison Summary WeLoveVideo, Inc needs an SDLC that gradually takes in the feedback from the customers to gradually implement a CRM that will satisfy the needs of existing customers and future customers. It should also be in a position to acquire newer customers and retain existing ones

IT Systems Connection Table

IT System Connection Table CMGT/430 IT System Connection Table  IT System Target System Connection Type Possible Security Vulnerability Related Risk EXAMPLE HR System Identity Management System Feeder File File could be modified. User rights might not be correctly updated. Administration & Management EDPSQL Data management portal Data breachInternal & External threat agents Danger to data IntegrityLoss

Mobile Computing FAQ

Week 5 Team A: Mobile Computing FAQ CMGT/554 Mobile Computing FAQ What is mobile computing? Mobile computing is human-computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice, and video . In this context, computer refers to any electronic device that allows the user

Individual System Requirements

System Requirements Name Course name CMGT/555 Date System requirements for the marketing and customer support are all geared towards improving performance of employees and making the end goal better satisfaction of customers. This is all in line with WeLoveVideo, Inc goals. To achieve this, all requirements must be geared towards optimal service deliver. The requirements

Learning Team Ranking the Pairs

Vulnerabilities Threats Probability Impact Suggested Mitigation Steps     Physical     Card access Network Security High Access any physical location permitted by the card. Practice having your card on you at all times. This ensures having your card will always be on you. Access Roster Confidentiality Low Bypass authentication Double and triple check user

International Plastics Inc. Standards and Protocol Review

International Plastics Inc. Standards and Protocol Review Standard Protocol Recommendations IP Fast Ethernet Minimum of Cat6 cabling for VoIP/Desktop TCP Local Talk Upgrade all connections to outside network from T3., T2 to OC-3 (make standard) Cat 5 FDDI Incorporate IPSec for VoIP SMTP Gigabit Ethernet Standardize VoIP across organizational infrastructure HTTP ATM Incorporate standardized training

International Plastics Inc Manufacturing eCommerce Integration Proposal

Manufacturing E-Commerce Integration Proposal International Plastics Inc. Manufacturing eCommerce Integration Proposal Introduce E-commerce is the marketing, buying, and the selling of products or services over the internet (Barlow, 2011). To integrate e-commerce into International Plastics a newly created e-commerce department will be responsible for responsible for developing an e-commerce presence map, a timeline and utilize

International Plastics Network Description

At the current rate the network infrastructure of International Plastic is going there is a high percentage of catastrophic failure in the near future. If in the event of a failure of such magnitude productivity or even total loss of data is not a question of how much but when. In addition, security is another

Scroll to Top