Description
In about at least 350 words, kindly answer the attached question. Address each point in one paragraph, so 2 paragraphs
Unformatted Attachment Preview
Please no plagiarism everything must be
original. Two systems must be briefly
describe one per paragraph if must use
outside source please provide citation.
As customers, students, patients, taxpayers, and citizens, we are surrounded by information systems
that support customer interactions. Identify and describe two such systems that you have used. Briefly
describe the types of customer interactions you have experienced with these systems and compare
what you found to be important features of each one. Are there features or functions that you would
change or add to either system?
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hello, kindly check your assignment and let me know if you need any editsthanks
INFORMATION SYSTEMS
1
Information systems
University name
Student’s name
Professor’s name
Course
Date
INFORMATION SYSTEMS
2
INFORMATION SYSTEMS
Information systems that support customer interactions
The management information system used by Amazon to market its products and boost
their sales is an example of a customer relationship management system. After the products are
uploaded in the websit...
Completion Status:
100%
Review
Review
Anonymous
I use Studypool every time I need help studying, and it never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of Central Missouri Changing Access Controls Paper
Scenario Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider cha ...
University of Central Missouri Changing Access Controls Paper
Scenario Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences. Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff: Understand and document the purpose of each access control change requestKnow what access controls were in place before any changesGet an approval of change by managementUnderstand the scope of the change, both with respect to users, computers, and objectsHave evaluated the expected impact of the changeKnow how to evaluate whether the change meets the goalsUnderstand how to undo any change if necessaryStatus or setting prior to any changeReason for the changeChange to implementScope of the changeImpact of the changeStatus or setting after the changeProcess to evaluate the changeInternet accessCourse textbookFormat: Microsoft Word (or compatible)Font: Times New Roman, size 12, double-spaceCitation Style: APALength: 2 to 4 pagesI created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.I followed the submission guidelines. Tasks Create a guide that security personnel will use that includes procedures for implementing an access control change. The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved. Ensure that your procedures include the following:
WEBD 122 American Public University Web Analytics Analytics Job Discussion
Discussion Instructions:In this week’s discussion, you are to discuss the role of the Web Analyst, from an actual Job De ...
WEBD 122 American Public University Web Analytics Analytics Job Discussion
Discussion Instructions:In this week’s discussion, you are to discuss the role of the Web Analyst, from an actual Job Description that you locate from Careerbuilder.com.Your Instructions:
Go to Careerbuilder and or Indeed.com
In the Keyword Search area place "Web Analytics" or "Web Analytics Professional" as your search term (without the quotes) location is not important
Locate the best Web Analytics Job Posting that comes as close as you can determine, to the lessons discussed in the class
Review the job description and formulate some opinions to the skill set required for the job, how do the skills listed in the job listing relate to what this course delivered and define these topics in your discussion post.
Interpret the Job Qualifications, Job Duties, and Educational Requirements, do you believe the description portrays the real aspects of the web analytics professional role.
Discuss any salary listings you find, do they appear to be acceptable for the position?
Be sure to place the link to the job posting you found.
Creating an audit plan
Worksheet: Creating an Audit Plan Course Learning Outcome(s) Develop IT compliance audit plans. . When establ ...
Creating an audit plan
Worksheet: Creating an Audit Plan Course Learning Outcome(s) Develop IT compliance audit plans. . When establishing an audit program, the auditing committee or auditor will select those items or controls, within an organization’s IT infrastructure that will be audited. Referring back to NIST SP 800-53 and NIST SP 800-53A, controls are selected and those items which need to be reviewed are selected. Enterprises provide services to their customers in the forms of operating systems, applications, hardware, Internet, VoIP and security. These services are provided through internal hardware you would find in a server room such as an application server, data storage, web servers, email servers, call-managers, firewalls, and security appliances that provide network based security and monitoring. Often, there are services that are provided to an enterprise by a third party vendor or other organization such as SaaS, cloud based storage, telephony, security, web hosting, connectivity, routing and switching. Though these services are not inherent to the enterprise, there are still controls that are auditable. When developing an audit plan, we first have to identify those items that are to be audited. Each audit looks at controls that are derived from internal and external sources. Items or controls that are internal to the enterprise are known as internal controls. These are controls that are implemented and managed locally within the organization and the enterprise. Often, services are provided by outside vendors or third parties. Compliance is usually managed through the use of service level agreements (SLA). An SLA is a contractual agreement that the vendor or third party will adhere to a predefined set of requirements. These requirements should fall within the organizations compliance requirements. The services an organization receives from an external agency are known as inherited controls. A key component in developing an audit plan is to identify those controls that are internal and inherited to an organization. As an auditor, you are responsible to ensure those controls that are both internal and inherited are within compliance of accrediting the system. Those items not meeting SLA requirements that may or may not be injecting any level of risk into accreditation should be reported to the client or contracting official within your organization. An audit plan consists of various components as you have learned in your reading and lessons. A fundamental document that is the foundation of any audit is to clearly define what it is that’s going to be audited. When that’s know, the auditor can review those items to determine which controls are internal and which are inherited so that the right resources can be assigned to validating those controls. Review the following scenario and determine if the control is internal or inherited; XYZ Corporation has retained you to audit their enterprise and validate their compliance requirements. XYZ Corporation has a staff of 200 employees and an IT staff of three personnel. Internal to XYZ Corp, the organization has a server room which houses network storage for proprietary data, an application server to manage applications and licenses, a web server which hosts the company’s internal and external websites, hardware firewalls and security appliances to manage and protect inbound and outbound services. The organization has contracted Python LLC to provide email, VoIP, SaaS and cloud storage services for non-proprietary data for XYZ Corp. Based on the scenario above, determine whether the following controls are internal or inherited. Control Name Control Assessment Objective Internal / Inherited Use of External Information Systems AC-21(1).1 Determine if the information system employs automated mechanisms to enable authorized users to make information-sharing decisions based on access authorizations of sharing partners and access restrictions on information to be shared. Content of Audit Records AU-3(2).1 Determine if: the organization defines the information system components for which the content of audit records generated is centrally managed; and the organization centrally manages the content of audit records generated by organization-defined information system components. Information Systems Connections CA-3.1 Determine if the organization identifies connections to external information systems (i.e., information systems outside of the authorization boundary); the organization authorizes connections from the information system to external information systems through the use of Interconnection Security Agreements; the organization documents, for each connection, the interface characteristics, security requirements, and the nature of the information communicated; and the organization monitors the information system connections on an ongoing basis to verify enforcement of security requirements. Incident Monitoring IR-5(1) Determine if the organization employs automated mechanisms to assist in the tracking of security incidents; the organization employs automated mechanisms to assist in the collection of security incident information; and the organization employs automated mechanisms to assist in the analysis of security incident information. The audit and auditor are also auditable and considered a control within the NIST framework. Referring to the NIST SP-53 and 53A, Audit and Accountability Policy and Procedures, explain what the assessment objective is based on the control number it’s associated to: Control Number: Description: When an auditor develops an audit plan, the size or scope of the audit must be defined so that redundant audits are avoided and that time can be applied to those controls within the domains that are needed. In the chart below, list the seven domains that are auditable: 1. 2. 3. 4. 5. 6. 7.
4 pages
Katask1
Define and describe the mobile web. Mobile web is the ability for a mobile device to access web service. A mobile device i ...
Katask1
Define and describe the mobile web. Mobile web is the ability for a mobile device to access web service. A mobile device is a portable device. E.g. a ...
11 pages
Ibn And Sdn Assignment
Software-defined Networking is a relatively new technological strategy that has the capability of manipulating network beh ...
Ibn And Sdn Assignment
Software-defined Networking is a relatively new technological strategy that has the capability of manipulating network behavior dynamically through ...
Similar Content
compare and contrast the Balanced Scorecard
WK5: QUESTIONAfter watching the videos below and reading about the Balanced Scorecard in Chapter 12, compare and contrast ...
KFUPM Yala Rule Malware Lab Report
LAB ASSIGNMENT Please make a Yara rule that can scan malware from specific (malware sample dataset) 1- please collect a ma...
IT404 Assi
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the a...
growth of Amazon Web Services, Microsoft Azure, computer science homework help
storage dsWith the growth of Amazon Web Services, Microsoft Azure and similar services from Google and hundreds of smaller...
BLCN 634 University of Cumberlands HR Management and Blockchain Reflection Paper
write about this subject HR Management & Blockchain (BLCN-634). follow the below steps.Provide a reflection of at least 50...
Campbellsville University To Bid or Not to Bid Case Study Questions
Read the case study "To Bid or Not to Bid" on page 1(1011) and then answer 2 questions on page 2(1012)Please provide the r...
Data Visualization .docx
Visualization is any plan for developing images, animation, diagrams to convey a message. Visualization via visual imagery...
Scrum
In the waterfall web development technique, processes flow sequentially like a waterfall starting from the initiation and ...
COMPUTER SCIENCE DEPARTMENT PORTAL APPLICATION WEBSITE
The aim is to make an online web portal for Computer Science Department, so that everyone can get information about depart...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of Central Missouri Changing Access Controls Paper
Scenario Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider cha ...
University of Central Missouri Changing Access Controls Paper
Scenario Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences. Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff: Understand and document the purpose of each access control change requestKnow what access controls were in place before any changesGet an approval of change by managementUnderstand the scope of the change, both with respect to users, computers, and objectsHave evaluated the expected impact of the changeKnow how to evaluate whether the change meets the goalsUnderstand how to undo any change if necessaryStatus or setting prior to any changeReason for the changeChange to implementScope of the changeImpact of the changeStatus or setting after the changeProcess to evaluate the changeInternet accessCourse textbookFormat: Microsoft Word (or compatible)Font: Times New Roman, size 12, double-spaceCitation Style: APALength: 2 to 4 pagesI created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.I followed the submission guidelines. Tasks Create a guide that security personnel will use that includes procedures for implementing an access control change. The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved. Ensure that your procedures include the following:
WEBD 122 American Public University Web Analytics Analytics Job Discussion
Discussion Instructions:In this week’s discussion, you are to discuss the role of the Web Analyst, from an actual Job De ...
WEBD 122 American Public University Web Analytics Analytics Job Discussion
Discussion Instructions:In this week’s discussion, you are to discuss the role of the Web Analyst, from an actual Job Description that you locate from Careerbuilder.com.Your Instructions:
Go to Careerbuilder and or Indeed.com
In the Keyword Search area place "Web Analytics" or "Web Analytics Professional" as your search term (without the quotes) location is not important
Locate the best Web Analytics Job Posting that comes as close as you can determine, to the lessons discussed in the class
Review the job description and formulate some opinions to the skill set required for the job, how do the skills listed in the job listing relate to what this course delivered and define these topics in your discussion post.
Interpret the Job Qualifications, Job Duties, and Educational Requirements, do you believe the description portrays the real aspects of the web analytics professional role.
Discuss any salary listings you find, do they appear to be acceptable for the position?
Be sure to place the link to the job posting you found.
Creating an audit plan
Worksheet: Creating an Audit Plan Course Learning Outcome(s) Develop IT compliance audit plans. . When establ ...
Creating an audit plan
Worksheet: Creating an Audit Plan Course Learning Outcome(s) Develop IT compliance audit plans. . When establishing an audit program, the auditing committee or auditor will select those items or controls, within an organization’s IT infrastructure that will be audited. Referring back to NIST SP 800-53 and NIST SP 800-53A, controls are selected and those items which need to be reviewed are selected. Enterprises provide services to their customers in the forms of operating systems, applications, hardware, Internet, VoIP and security. These services are provided through internal hardware you would find in a server room such as an application server, data storage, web servers, email servers, call-managers, firewalls, and security appliances that provide network based security and monitoring. Often, there are services that are provided to an enterprise by a third party vendor or other organization such as SaaS, cloud based storage, telephony, security, web hosting, connectivity, routing and switching. Though these services are not inherent to the enterprise, there are still controls that are auditable. When developing an audit plan, we first have to identify those items that are to be audited. Each audit looks at controls that are derived from internal and external sources. Items or controls that are internal to the enterprise are known as internal controls. These are controls that are implemented and managed locally within the organization and the enterprise. Often, services are provided by outside vendors or third parties. Compliance is usually managed through the use of service level agreements (SLA). An SLA is a contractual agreement that the vendor or third party will adhere to a predefined set of requirements. These requirements should fall within the organizations compliance requirements. The services an organization receives from an external agency are known as inherited controls. A key component in developing an audit plan is to identify those controls that are internal and inherited to an organization. As an auditor, you are responsible to ensure those controls that are both internal and inherited are within compliance of accrediting the system. Those items not meeting SLA requirements that may or may not be injecting any level of risk into accreditation should be reported to the client or contracting official within your organization. An audit plan consists of various components as you have learned in your reading and lessons. A fundamental document that is the foundation of any audit is to clearly define what it is that’s going to be audited. When that’s know, the auditor can review those items to determine which controls are internal and which are inherited so that the right resources can be assigned to validating those controls. Review the following scenario and determine if the control is internal or inherited; XYZ Corporation has retained you to audit their enterprise and validate their compliance requirements. XYZ Corporation has a staff of 200 employees and an IT staff of three personnel. Internal to XYZ Corp, the organization has a server room which houses network storage for proprietary data, an application server to manage applications and licenses, a web server which hosts the company’s internal and external websites, hardware firewalls and security appliances to manage and protect inbound and outbound services. The organization has contracted Python LLC to provide email, VoIP, SaaS and cloud storage services for non-proprietary data for XYZ Corp. Based on the scenario above, determine whether the following controls are internal or inherited. Control Name Control Assessment Objective Internal / Inherited Use of External Information Systems AC-21(1).1 Determine if the information system employs automated mechanisms to enable authorized users to make information-sharing decisions based on access authorizations of sharing partners and access restrictions on information to be shared. Content of Audit Records AU-3(2).1 Determine if: the organization defines the information system components for which the content of audit records generated is centrally managed; and the organization centrally manages the content of audit records generated by organization-defined information system components. Information Systems Connections CA-3.1 Determine if the organization identifies connections to external information systems (i.e., information systems outside of the authorization boundary); the organization authorizes connections from the information system to external information systems through the use of Interconnection Security Agreements; the organization documents, for each connection, the interface characteristics, security requirements, and the nature of the information communicated; and the organization monitors the information system connections on an ongoing basis to verify enforcement of security requirements. Incident Monitoring IR-5(1) Determine if the organization employs automated mechanisms to assist in the tracking of security incidents; the organization employs automated mechanisms to assist in the collection of security incident information; and the organization employs automated mechanisms to assist in the analysis of security incident information. The audit and auditor are also auditable and considered a control within the NIST framework. Referring to the NIST SP-53 and 53A, Audit and Accountability Policy and Procedures, explain what the assessment objective is based on the control number it’s associated to: Control Number: Description: When an auditor develops an audit plan, the size or scope of the audit must be defined so that redundant audits are avoided and that time can be applied to those controls within the domains that are needed. In the chart below, list the seven domains that are auditable: 1. 2. 3. 4. 5. 6. 7.
4 pages
Katask1
Define and describe the mobile web. Mobile web is the ability for a mobile device to access web service. A mobile device i ...
Katask1
Define and describe the mobile web. Mobile web is the ability for a mobile device to access web service. A mobile device is a portable device. E.g. a ...
11 pages
Ibn And Sdn Assignment
Software-defined Networking is a relatively new technological strategy that has the capability of manipulating network beh ...
Ibn And Sdn Assignment
Software-defined Networking is a relatively new technological strategy that has the capability of manipulating network behavior dynamically through ...
Earn money selling
your Study Documents