CMGT 442 University of Phoenix Wk 1 Systems Risk Management Discussion

User Generated

obbxbsryvwnu

Computer Science

CMGT 442

University of Phoenix

CMGT

Description

Assignment Content

  1. Choose an organization from the education, financial, or healthcare sector to study throughout this course. Each week you explore different aspects within the IT division of the organization including:
    • 3 dimensions of risk management
    • Potential risks during a server database migration
    • Risk assessment and continuity plan
    • Request for proposal for new web servers
    • Monte Carlo method

    You have been asked by the CIO of the organization you chose to create Microsoft®PowerPoint® presentation, along with an accompanying summary guide handout, for the managers of the IT, Accounting/Finance, and Engineering departments to inform them of the three dimensions of risk management.
    The three dimensions of risk management shape the organizational framework of project risk management and determine the degree of freedom used to classify various realizations of uncertainties, resulting in a formalized systematic analysis of physical systems.
    Research information about the organization you chose to complete this week's assignment.
    Part A:
    Create a 4- to 6-slide, media-rich Microsoft® PowerPoint® presentation which describes each of the three dimensions, its definition, values, and importance to your company. Identify the potential security risks to an organization in each of the following outsourcing situations:
    • The implementation of an external service provider for data/security protection
    • The use of contractual service providers for processing information systems applications such as a payroll, human resources, or sales order taking
    • The use of an offshore company to support your desktop computers
    • The use of an third-party governance to provide network support

    Note: Media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.
    Part B:
    Create a 1-page Microsoft® Word Summary Guide on this presentation. Include the following:
    • Risk considerations during the development and implementation of information systems
    • The importance of Information systems risk management
    • A summary of the organizational risk management framework
    • The risk register of the highest risk of information security to the organization

    Include APA-formatted citations when necessary.
    Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Delete the assignment instructions from the document. This will improve the originality score from Safe Assign. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to correct any content, quality, or originality issues.

    Submit your assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

1

Inherent and Successful Information Systems Implementation

Student’s Name
Institutional Affiliation
Professor’s Name
Date

2
Risk Considerations
The process of developing and implementing information systems a sensitive drive for
Centene Incorporation. Being a key player in the healthcare management and insurance sector,
the company is surrounded by highly critical risk considerations. From the inception moment,
the sufficient protocols of System Development Life Cycle (SDLC) should be inherently adopted
(Chinnasamy et al., 2021). The behavioral response characteristics of the security integration
team and partners should be highly considered to eliminate the integrity questions that may arise
when data and sensitive information are run and protected by third party service providers. Other
considerations include: reviews on legislative changes, software security integration and
enforcing software and hardware management policies
The Importance of Information System Risk Management
In the digital era, companies such as Centene Incorporation cannot operate smoothly
without a robust Information System Risk Management (ISRM). With ISRM policies in place...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags