CMGT430 University of Phoenix Enterprise Security Concerns Paper

User Generated

tof411

Programming

CMGT430

University of Phoenix

Description

After reviewing the material your group has prepared so far, the management team has returned with a list of five specific concerns. They include:

  • Access control
  • Security enterprise
  • Impact of implementing a change management system
  • Mitigation
  • Risk management

Management has asked you to address concerns with a visual presentation. Address concerns by providing the following information:

  • An overview of the access control
  • Required mitigation steps for each concern
  • Prioritize concerns
  • Concerns with vendor relations from the enterprise security standpoint
  • Description of how the organization can apply risk management principles in its efforts
  • Description of iterative maintenance effort, including audits and frequency

Include at least two references formatted according to APA guidelines.

Present the information in one of the following ways:

  • A detailed chart along with a brief 1- to 2-page executive summary explaining the decisions made
  • A 12- to 14-slide multimedia-rich presentation with speaker notes

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go. In case of any further inputs please let me know!All the best!I appreciate working with you!

Running Head: ASSIGNMENT

1

Enterprise Security Concerns
Name
Course
Professor
Date

ASSIGNMENT

2
Enterprise Security Concerns

Access Control Overview
Access control is a mechanism integrated into a company’s information technology
infrastructure so that there can be a way of knowing who has gained entry into the organization
information system at any given time. Access control is carried out through identification,
authorization, authentication, and even physical barrier to locations housing critical equipment
such as servers and many more. The access control measures that are currently in place are not
enough as far as control of gaining access to the company’s information system is concerned.
The company relies on an old password policy and non-reinforced server rooms. The old
password policy lacks securit...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4