MGMT 221 Week 3 Case Study | Assignment Help | Embry Riddle Aeronautical University
- embry-riddle-aeronautical-university / MGMT 221
- 05 Jun 2019
- Price: $6
- Other / Other
MGMT 221 Week 3 Case Study | Assignment Help | Embry Riddle Aeronautical University
3.3 Case Study: Cybersecurity (PLG1)
Overview
One of the responsibilities
placed on managers in today's On-Demand Economy is that of ensuring that the
business processes are held to a high degree of cybersecurity. Because the
concept of data-on-demand is an operational necessity that places the
enterprise's and customers' resources at risk to potential fraudulent hacks,
all employees, including those that sit in the loftiest of office spaces, must
be trained, made aware of the various methods and practices that can lead to
vulnerabilities, and held to very high standards of compliance with standard
cybersecurity practices.
The growth of mobile
technologies and the IoT have played a significant role in the On-Demand
Economy environment. A downside to the proliferation of such technologies is
the cracks and doors into the corporate and agency networks that have been
opened along the data path, allowing for an increased level of black hat
intrusions and reconnaissance.
Case Study Assignment
Download the APA Style Template (DOCX) and review
the Case Study Requirements section.
Conduct research on various
methodologies and solutions relating to the implementation of effective
cybersecurity programs that may be utilized to thwart outside-agency attacks on
an enterprise’s networks. Your approach here should be to seek out scholarly
source data relating to examples of the various cybersecurity measures that top
management and IT departments might provide for employees and contractors,
including data access enforcement, network intrusion detection and prevention
systems, and real-time responses to incidents and attacks. You could focus your
research on any one of the various types of defenses such as anti-malware
applications, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems
(IPSs), biometric access, rogue app monitoring, mobile kill switch, or remote
wipe capability technologies.
Follow the guidelines in
the Case
Study Requirements section.
Your document submission is
due by the posted due date. Your instructor will use the 3.3 Case Study Rubric for evaluating and grading your submission.
Save your assignment using
a naming convention that includes your first and last name and the activity
number (or description). Do not add punctuation or special characters.
MGMT
221 3.3 Case Study Rubric
MGMT 221 3.3 Case Study Rubric |
|||||||
Criteria |
Ratings |
Pts |
|||||
This
criterion is linked to a Learning OutcomeAnalysis & Content |
|
55.0 pts |
|||||
This
criterion is linked to a Learning OutcomeConclusion & Recommendations |
|
15.0 pts |
|||||
This
criterion is linked to a Learning OutcomeStyle & Mechanics |
|
10.0 pts |
|||||
This
criterion is linked to a Learning OutcomeScholarly Research |
|
10.0 pts |
|||||
This
criterion is linked to a Learning OutcomeAPA Style |
|
10.0 pts |
|||||
Total Points: 100.0 |