You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course:
Vampire Legends (Wk 1)
Cruisin’ Fusion (Wks 2–3)
Devil’s Canyon (Wks 4–5)
Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:
Potential Risk to be Reviewed: Describe the risk.
Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.
Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization.
Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.
Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
Example: Determine whether anti-virus software is in use.
Example: Determine whether virus signatures are periodically updated.
Example: Determine whether periodic virus scans are performed.
Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.
IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.
Review the various options available to address those processes and methods previously explained, and which ones might be feasible.
IT Security – Measures: Analyze the various security measures that could be taken within the organization.
Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.
Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
Example: 100% of servers and PCs have virus software installed.
Example: 100% of the virus software installed is set to automatically update, including virus signatures.
Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.
Include a 1/2- to 1-page executive summary to support your presentation. This can be an extra slide in the presentation or MS Word document. Include appropriate references.
MEMO
To: Chief Executive Officer
From: Chief information Officer
Date: 15th February, 2022
Subject: Strategy and the budget of the game Ancient Age
About my new situation as C.I.O. from Vampire Legends I have held several meetings to vouch for my insight and commitment to safety, morals and especially to our customers and the group that I am currently doing. It is very difficult for me to come to you with concerns about the moral and ethical thinking of our creative group. I’ve reached out to groups with difficulty understanding how they will deal with certain circumstances, but first I might want to look at the details of a proposed financial plan that we have worked on together.
I have attached a financial plan report to this memo release and will explain how we provide this breakdown feature for Vampire Legends.
With the $10MM spending plan, we propose dispensing $3MM of that to the advertising effort for Ancient Age of Vampires. We might want to offer our clients a multi day free preliminary of the spin-off before we begin charging month to month participation expenses. This not just allows our players an opportunity to ensure they love the game, and deal exhortation or pose inquiries, yet in addition gives those that cherished Vampire Legends the valuable chance to shape a solid dependence before their credit cards are at any point charged (Amin, Pan, & Zhang2022). It will cost us some labour to guarantee admittance to the players for the time for testing, yet we will bring in our cash back and start to produce significant benefit inside the initial 90-120 days.
· The IT office requires additional cost and manpower plans to deliver this extension. We should set aside maybe $3 million for the IT department to cover the extra time and security overhead to ensure programmers can’t access code or break into frameworks and get customer data. This, sir, is a point to be resolved in an instant. Dealing with security threats best starts with preventing and further harassing programmers before problems occur. Our staff made a deal to check log files, start manuals as well as problems programmed on the server and leave a little extra cash as extra thought for extra costs in case of a breakdown.
· $2 million in Digital Rights Management (DRM) further ensures games cannot be hacked, distorted or downloaded without being used by players or legally. We really want to enable and securely maintain certificates and customer approvals that prevent unauthorized customers from accessing the game without a valid contribution to the documents.
· Compensation increases, how much $2 million will be shared between IT and the progress team. Stating extended compensation would be useful and important to maintain a sense of commitment, reduce sales, and think I can offer to keep a finely tuned team with great chemistry together for a bright future at Vampire Legends.
Lastly, I might like to summarize the discussion I had with my group about the security vuln
2
Contest Rules and Use of personal information
University Of Phoenix
Corey Garrett
CMGT/582
02/12/2022
Contest Rules and Use of personal information
The users of through the website will require that they provide information which may include personal information. Therefore, their consent will be required to ensure that they are fully aware of what they are doing. The information that we will collect will be used for different purposes that the users need to know and understand as well. The customers will give their consent by accepting terms and condition of services when registering.
The data that organization will collect will only be used by an organization for its own purposes and will not be exposed to unauthorized individuals. The organization has put in place strategies to protect the users’ data through strategies such encryption, data backup and organization data protection strategies.
The organization has also intellectual property that could benefit competitors in case they get access to the data. Therefore, different methods, such as trade secrets, copyrights, trademarks, and patent will protect the data from competitors benefiting from it.
The users of the system should worry about the data they are providing because the organization has implemented methods for protecting such and ensure that they are surety is guaranteed.
2
Shopping Cart Research and Blog Post
University Of Phoenix
Corey Garrett
Ellen Gaston
CMGT/582
02/27/2022
Shopping Cart Research and Blog Post
Shopping Carts Research
Square
The Square is shopping cart software for online websites consisting of small shops for customers. Square is an application developed for websites that need a point of sale system for their website. Allows payment by credit and debit cards through devices and client systems running iOS or Android. This includes an item management platform. Easy space to manage and implement shopping cart software.
PinnacleCart
PinnacleCart is software designed to provide easy-to-use software for users who are not necessarily familiar with the software. It is a platform for e-commerce websites. It allows website developers to customize the design of their online store.
CS-Cart
-Cart is an easy-to-use software. This is possible for both small and large store websites. It focuses on getting customers to sell the items available on the site. It is a mobile friendly software in which the customer has the option of a mobile application.
AbanteCart
The AbanteCart is the free open-source software. It can be customized easily according to the website in which it cooperates. It is feasible for small online business websites. It is easy to implement and follow.
3dCart
3dCart includes many payment gateways for customer convenience. It is a complete ecommerce website platform designed to support online shops. 3dcart focuses on customer satisfaction.
Blog Post
Launching Shopping Cart
To Launch the Shopping Cart feature follow the below-mentioned steps:
Step 1: First of all after choosing the items that customer want to purchase from the website the customer select the cart option for payment so the first step includes a summary of the items that user has selected along with their prices.
Step 2: Adding the live chat option during purchasing the items will increase the selling rate for the website.
Step 3:Make sure that website has mobile-friendly checkout
Step 4: The shopping cart options must be formatted in a way that is easy to understand by the user.
Step 5: Provide only relevant details as too many options will create confusion for the customer.
Step 6: The payment process must be user-friendly.
Step 7: Assure the customer that placing an order on the website is safe.
The assurance can be achieved by using the logos that represent the security of the website. By providing the contact details if the customer has any query makes the customer feel safe during payment.
a. Differences between ethics, organizational policies, and laws
Ethics, organizational policies, and laws dictates how one should behave. In the cybersecurity, the three aspects governs an individual access and use of the data. However, the three are significantly different. Ethics are moral principles that an individual choses to uphold in his/her day to day activities (Furlotti & Ma
5
Part B: Policies, Plans, and Risks
Policies and Security Plans
The security plans and policies are important for guiding how organizations information are safe from an authorized access. This policies and plans are designed for organization employees and guide the on what is needed of when using organization information technology infrastructure. The security polices lists and describe all the rules that these employees need to follow in an organization. On the other hand, the security plan stipulates the details on how the users implement the security policies (Lewis, 2017).
One of the concerns raised is the upload of video without the consent of the organization management as well as the creators. Therefore, one of the security policies is one state explicitly when one need to upload the videos from the organizations webcam mounted on the slopes.
The security plan will outline the policy implementation in the company. Devil’s Canyon guests will be required to sign the agreement in order to organization’s resources. The agreements form is an agreement that explains that guest can use and upload pictures and videos coming off the web cam. The policy will be critical when it comes to lawsuits that guest presents when they do not want their content to appear in the organization’s internet.
Devil’s Canyon Security Roles and Safeguards
The security plans that the Devil’s Canyon will implement will be critical in addressing the security roles and safeguards. The security role as per the plans will defines the users of the systems and their levels of access. This practice is critical for identifying users or guest in different levels and their roles explicitly. The organization will also create roles and explicitly state the individuals who will get access to the organization’s data. The organizations categorize the safeguards in two forms: human and physical safeguards (Lewis, 2017). Devil’s Canyon will define and assign human safeguards with the aim of preventing the human-originating security malpractices. On the other the physical safeguards will define those forms that will be needed to protect the system’s user’s rights, which include their information and other personal content such as their pictures and videos. The organization will let the users of the presents of webcam and the posting of their information in other sites such as social media.
Security Risks and Threats
Most organization have had to suffer much from the security risk and threats. Most of the threat and risk happening in the organization target the most crucial resource: data. Devil’s Canyon will ensure that there are minimal risks; therefore, the organization will few loopholes of security risk (McIlwraith, 2021). The organization will create action plan to cover its defenses. The following are five possible security risk that the company is anticipated to face:
1. The systems failure that could happen both internally and external and
Why Choose Us
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How it Works
- Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.