MMIS221 case study: cybersecurity

User Generated

unlqra69sna

Business Finance

Embry Riddle Aeronautical University

Description

One of the responsibilities placed on managers in today's On-Demand Economy is that of ensuring that the business processes are held to a high degree of cybersecurity. Because the concept of data-on-demand is an operational necessity that places the enterprise's and customers' resources at risk to potential fraudulent hacks, all employees, including those that sit in the loftiest of office spaces, must be trained, made aware of the various methods and practices that can lead to vulnerabilities, and held to very high standards of compliance with standard cybersecurity practices.

The growth of mobile technologies and the IoT have played a significant role in the On-Demand Economy environment. A downside to the proliferation of such technologies is the cracks and doors into the corporate and agency networks that have been opened along the data path, allowing for an increased level of black hat intrusions and reconnaissance.

Case Study Assignment

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks. Your approach here should be to seek out scholarly source data relating to examples of the various cybersecurity measures that top management and IT departments might provide for employees and contractors, including data access enforcement, network intrusion detection and prevention systems, and real-time responses to incidents and attacks. You could focus your research on any one of the various types of defenses such as anti-malware applications, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), biometric access, rogue app monitoring, mobile kill switch, or remote wipe capability technologies.

Case Study assignments require you to analyze real-world information systems topics and provide examples that illustrate how prominent businesses and organizations implement the theoretical concepts you are studying. Case Study assignments provide a broader, integrated, critical thinking process that helps you to expand on and clarify your understanding of the information systems topics.

Research

Be sure to conduct in-depth research on the topics and provide factual details obtained from primary sources that support the case that you are making.


Requirements

Use the APA Style template as a guide for completing this assignment. Delete the notes and fill in the template with your data.

  • Scholarly paper
  • Microsoft Word® (DOCX)
  • Current APA style
    • Times New Roman Font
    • 12 pt font
      • Double-spaced lines
    • Title page
    • Page headers on all pages
    • Body of the text
      • Introduction paragraph
      • Citations Conclusion
    • Reference list page
  • MINIMUM of TWO FULL pages in the body of the text
  • Provide data from research utilizing a minimum of TWO primary sources OUTSIDE of the course textbook

Unformatted Attachment Preview

1 Do NOT place “Running head:” or the title of the paper data in any page headers (NEW with APA Style Manual Version 7). Place only the page number flush to the right-hand margin in the header of every page. Use automatic page-numbering. In Microsoft Word®, select Insert/Header/Page Number/Top of Page/ Plain Number 3. Title of Paper (bold font) First name, Middle initial(s), and Last name College of Business, Embry-Riddle Aeronautical University MMIS 221: Introduction to Management Information Systems Instructor's Name Assignment due date (i.e. March 1, 2020) 2 Title of the Paper (bold font) Begin the body of the text with the title of the paper in title case, bold, and centered in the first line. The words in the title of the paper, except for minor words such as "of," "and," "the," etc., must begin with uppercase letters. The text must be left-aligned, double-line-spaced, with the first line of each paragraph indented by one tab key (0.5 inch). Use headings as needed and appropriate within the text to separate sections and to reflect the organizational structure of the content. Do not start a new page or add extra line breaks when a new heading occurs; each section of the text should follow the next without a break. Present an introduction paragraph to begin the body of the text. You must present in-text citations for all data that was borrowed from a source, regardless of whether the data consists of a direct quote or words that have been paraphrased. Review the Writing Style Guide that is linked in the Course Specific Information section of the course for format information and examples of the different types of in-text citations. Conclusion (bold font) The conclusion is the last part of the body of the text. Center the word "Conclusion" on the first line of the conclusion in bold font with no italics, underlines, or quotation marks, as illustrated above. The conclusion wraps up what you have been discussing in your paper. After moving from general information in the introduction paragraph to specific information in the body of the text, your conclusion should begin pulling back into more general information that restates the main points of your argument. The following outline may help you conclude your paper. In a general way: 3 • Restate your topic and why it is important. • Restate your thesis/claim. • Address opposing viewpoints and explain why readers should align with your position. Remember that once you accomplish these tasks, unless otherwise directed by your instructor, you are finished. Simplicity is best for a clear, convincing message. The preacher's maxim is one of the most effective formulas to follow for argument papers: • Tell what you're going to tell them (introduction). • Tell them (body). • Tell them what you told them (conclusion). 4 References (bold font) Refer to the APA Style Manual (7th ed.) or the following Purdue University OWL website for specific formatting information: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/ge neral_format.html
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Cyber Security- Outline
I. Introduction
A. The unprecedented advancement in On-Demand Economy environments has
called for stronger cybersecurity measures especially with organizations relying
on interconnected networks and IoT devices.
B. Using methodologies from scholarly resources, this discussion will consider how
these specific measures, including AI defenses, can combat external cyber threats
in the current connected business environment.
II. Data access enforcement is significant in the protection of sensitive information within
and organization.
A. Measures such as Multi-Factor Authentication (MFA) and Role-Based Access
Control (RBAC), and others are important.
B. By integrating these controls, it becomes possible for the organizations to make
sure that only authorized people are able to access their critical IoT and systems
hence limiting internal and external risks.
III. Two critical tools which can help to identify and prevent unauthorized network access are
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
A. IDS monitors network traffic and sends notification to the system administrator
when potential intrusion has occurred whilst IPS has the capability of blocking
out intrusive traffic immediately.
IV. There are also Real-time response systems such as Security Information and...

Similar Content

Related Tags