INfo Syst 2 parts – 2 different due dates

Part 1: Due 08/02/2023 by 7pm est

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

MANAGING CYBERSECURITY RISKS

In last week’s Discussion, you examined the impact of cybersecurity risk on an organization. This week, you will put yourself in the position of a senior-level executive in that organization and will discuss with your colleagues your ideas for how you might change the IS/IT approach of that organization to better manage—or even eliminate—cybersecurity risks and threats going forward.

RESOURCES

   Be sure to review the Learning Resources before completing this activity.Click the weekly resources link to access the resources.   

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

WEEKLY RESOURCES

To prepare for this Discussion:

Return to last week’s Discussion and consider any ideas your colleagues brought forward in that Discussion that you want to incorporate into this week’s post.

Review the article you included in your post last week and, if needed, do some additional research to locate examples of organizations that have implemented particular strategies for managing cybersecurity risk.

As you draft your initial post, write it from the perspective of the senior leader in your selected organization. You can use your creativity to either craft a memo to your board of directors or a statement of intent for the changes you’d like to make to your IT organization/department. The format of your post is up to you, as long as you provide the required content.

Posta synthesis of your recommendations for how your selected organization can mitigate cybersecurity risks in the future, to include the following:

Propose two or three strategies you will employ within your IT organization/department to more effectively manage cybersecurity threats and risks. (You have license to form new teams, hire additional staff, or any number of other approaches. Assume you have the budget required to make whatever changes you feel are needed.)

For each strategy be sure to include a rationale for why you selected it, being sure to incorporate appropriate references to support your points.

Refer to the Week 5 Discussion Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.

Readsome of your colleagues’ postings.

Resource – Last Week’s Discussion

  • The selected article titled “10 common IT security risks in the workplace” by Lenny Bianculli highlights prevalent cybersecurity risks faced by organizations in the workplace. In this scenario, an organization experiences a security breach where an unauthorized individual gains access to their office, ransacks it, and steals critical professional documents, including the final design for the company’s new marketing campaign. Later, it is discovered that a competitor has launched a marketing campaign that is strikingly similar to the one the organization had designed months before the breach.
  • The immediate impacts of this cybersecurity breach on the organization are significant. First and foremost, there is a loss of valuable intellectual property, including the marketing campaign design. This can have severe financial consequences as the organization invested time, resources, and expertise in developing the campaign. The breach may also damage the organization’s reputation, as clients and partners could question its ability to protect sensitive information. There may be legal repercussions as well, depending on the jurisdiction and the nature of the stolen information. Additionally, employees’ morale and productivity could be negatively affected due to the breach’s unsettling nature.
  • In the short term, the organization will need to conduct a thorough investigation to identify the breach’s extent and the vulnerabilities that led to it. They may need to collaborate with law enforcement agencies to apprehend the culprit and recover the stolen documents. In the long term, there could be lasting impacts on the organization’s competitiveness, as their marketing campaign has been compromised, and their competitor has already capitalized on it.

    To address the consequences of the breach, the organization must invest in cybersecurity measures and technology to fortify their digital infrastructure. They should also enhance employee training on cybersecurity best practices to prevent future incidents. Rebuilding trust with customers and partners will be crucial, and the organization may need to implement transparency measures and communication strategies to demonstrate their commitment to safeguarding sensitive information. Legal actions against the perpetrator may also be pursued to recover damages and prevent similar incidents in the future.

    Reference

  • Bianculli, L. (n.d.). 10 Common IT Security Risks in the Workplace. Retrieved from CCSI: https://www.ccsinet.com/blog/common-security-risks…
  • Part 2: Due 08/05/2023 by 7pm est
  • SUPPORTING BUSINESS CONTINUITY THROUGH IT: Part A

    For this Assignment, you will act as a consultant hired by a small organization to develop a presentation on supporting business continuity while considering ethics, privacy concerns, and security risks. The organization requested that you base your presentation on a particular case that they have identified. This case is based on a real-world situation where the electronic voting system used by the Public Opinion Programme (POP) at the University of Hong Kong was under serious distributed denial of service (DDoS) attacks. In this series of case studies (A and B), you will be given the opportunity to practice identifying and assessing potential cybersecurity risks and choose risk control strategies for business continuity and disaster recovery.

    This case study consists of cases A and B. Case A gives the background on POP and PopVote and allows you to explore how to identify and assess potential security risks. Case B sets the scene for risk control in information security management. It describes some unexpected situations where management will need to make immediate decisions on what they should do to control the risks.

    For this week, you will prepare a 6- to 8-slide presentation (excluding title slide and reference slide). You will submit Part A this week and Part B in Week 6. In addition to the slide content, you should also include text in the speaker notes section of each slide that would serve as the script you would use to deliver this presentation to a group of people. Your speaker notes should include your rationale and assumptions that pertain to your slide. You also need to have a minimum of 3–4 citations and references to support your direction. Note: You may elect to include additional slides as part of an appendix if you have information you might reasonably assume that a CEO or upper management might want. It is not required that you do so.

    SubmitPart A of your presentation and script. Be sure you are fully addressing the following in 5–6 slides, excluding references:

    Part A: Identify and Evaluate Cybersecurity Risks

    Rank the vulnerabilities of PopVote, the electronic voting system, in terms of impact (financial or otherwise) to the organization. (In your speaker notes, be sure to provide rationale for your rankings.) (1–2 slides)

    Identify what the Public Opinion Programme (POP) did to mitigate risks before the New Year vote in 2014. (2 slides)

    Evaluate the strengths and weaknesses of POP’s risk mitigation plan before the New Year vote in 2014. (2 slides)

    Resources:

    Business Impacts of Cybersecurity Risks

    Are businesses the only victims when bad actors hack their systems? Who else might be put at risk? When these situations occur, can the affected businesses be held liable for their customers’ damages? To fully understand the impact of cybersecurity threats, business leaders should have informed answers to questions such as these. Through these resources, you will examine the legal risks and financial impacts companies face due to cybersecurity risks. You will also explore ways to mitigate those risks.

    Absolute. (2019, February 26).

    Data privacy laws: Cybersecurity insights #12Links to an external site.

    [Video]. YouTube. Time Estimate: 3 minutesChatterjee, C., & Sokol, D. D. (2019, April 16).

    Don’t acquire a company until you evaluate its data security

    . Harvard Business Review Digital Articles, 2–4.

    http://hbr.org

    Time Estimate: 5 minutes           

    FTC releases 2019 privacy and data security updateLinks to an external site.

    . (2020). Journal of Internet Law, 23(10), 6–9.Time Estimate: 16 minutesMorey, T., Forbath, T., & Schoop, A. (2015).

    Customer data: Designing for transparency and trust

    . Harvard Business Review, 93(5), 96–105.Time Estimate: 24 minutes

    Managing Cybersecurity Risks

    No organization is immune to cyberattacks, and the financial repercussions of these attacks can create excessive burdens for an organization. In 2020, the professional services company Accenture published a report stating that enterprise organizations spent $11.7 million in U.S. dollars, on average, to fight cyberattacks in 2019. Using these resources, you will examine methods and technology that organizations use to assess and manage cybersecurity risks. You will also explore the challenges in managing cybersecurity risks and strategies to overcome those challenges and mitigate the risks.

    Badonnel, R., Fung, C., Li, Q., & Scott-Hayward, S. (2020).

    Guest editorial: Special section on cybersecurity techniques for managing networked systemsLinks to an external site.

    . IEEE Transactions on Network and Service Management, 17(1), 12–14.

    https://doi.org/10.1109/TNSM.2020.2972769

    How to Analyze
    a Business
    Case Study
    Table of Contents
    • What Is a Business Case Study?
    • Why Use Case Studies in Business Courses?
    • The Three Common Types of Business Cases
    • Analyzing a Business Case Study
    © 2021 Walden University, LLC
    2
    What Is a Business Case
    Study?
    • Business case studies present complex business issues. They are
    designed to turn real-world situations into teachable moments.
    • The business situation in each case study is presented from
    multiple perspectives and highlights the interdependencies and
    non-linear nature of the information.
    • Characteristics of a case study include:
    • Identifying a significant issue, question, or dilemma
    • Presenting comprehensive information to draw a conclusion
    • Providing no objective conclusion, allowing the reader to
    draw their own conclusion(s)—just like in real life
    • Presenting facts in a non-linear fashion, unlike a textbook
    that presents information in a logical or progressive method
    © 2021 Walden University, LLC
    3
    Why Use Case Studies in
    Business Courses?
    • A business case study provides you with a controlled (safe)
    environment to discuss, practice, and apply the business skills
    presented to you throughout your course work.
    • You can draw multiple conclusions from a case study, which
    simulates a real-life setting and allows you to present multiple
    solutions.
    • There is typically no “right” decision, answer, or solution.
    © 2021 Walden University, LLC
    4
    The Three Common Types of
    Business Case Studies
    • Decision Scenario Case
    • In this type of case study, a critical decision is required, typically from
    the main character of the case study. After analyzing the case study,
    you would recommend what decision to make and explain why.
    • Problem-Diagnosis Case
    • In this type of case study, you would perform a comprehensive
    diagnosis that identifies the root cause of the problem described in
    the case and recommend corrective action.
    • Evaluation Scenario Case
    • In this type of case study, you would perform an in-depth evaluation
    to determine the pros and cons or strengths and weaknesses of the
    subject of the case study and then make appropriate
    recommendations.
    © 2021 Walden University, LLC
    5
    Analyzing a Business Case
    Study
    • A case study analysis is not merely a summary of the case. Instead,
    it is a systematic analysis of the evidence within the case in order to
    identify the dilemma and then develop recommendations to
    answer, mitigate, or resolve it.
    • When asked to analyze a case study within your course work, you
    will typically be provided with assignment instructions and a list of
    questions and/or prompts to help guide your analysis. You should
    begin your case study analysis by carefully reviewing these
    requirements, along with accompanying rubrics or other guidelines,
    to understand the objective(s) of your analysis.
    © 2021 Walden University, LLC
    6
    Analyzing a Business Case
    Study
    • Important Disclaimer: The following slides provide some tips or
    guidelines for basic case study analysis. The purpose of each step
    described is to ensure you are equipped to analyze the information
    in the case in a way that will support your work on any academic
    case study assignments you encounter. The following guidance is
    not meant to replace or take precedence over any specific
    assignment instructions. You should always ensure that you adhere
    to the requirements for any assignments and use the information in
    this document for additional support.
    © 2021 Walden University, LLC
    7
    Analyzing a Business Case
    Study
    • Case study analysis can be broken down into the following five
    basic steps:
    Step 1: Find and highlight the most important facts
    surrounding the case.
    Step 2: Find the cause and effect of the dilemma.
    Step 3: Consider the course(s) of action.
    Step 4: Evaluate the alternative action(s) to answer, mitigate,
    or resolve the dilemma.
    Step 5: Recommend the suggested course of action based on
    the evaluations (i.e., your best solution).
    © 2021 Walden University, LLC
    8
    Analyzing a Business Case
    Study: Step 1
    Find and highlight the most important facts surrounding the case.
    • Read through the case several times to become familiar with the
    information it contains, paying attention to the information in any exhibits,
    tables, or figures. You may find that the case study provides a great
    amount of detailed information. As in real life, some of the information is
    more relevant than others in identifying the dilemma. Your job in this step
    is to determine what is relevant and what is not.
    • As you read through the case, you may want to underline, highlight,
    and/or list the most important facts and/or figures that will help you
    understand and define the dilemma. You can assume all of the presented
    facts and figures in the case are true; however, some of the statements,
    judgments, and/or decisions made by individual characters may be
    questioned. (Remember, these are opinions and observations of
    individuals—just like in real life, they can be biased.) Note: It is good to
    compare and contrast individuals’ statements to help you determine facts.
    © 2021 Walden University, LLC
    9
    Analyzing a Business Case
    Study: Step 2
    Find the cause and effect of the dilemma.
    • This is the main analysis step of the process. (Note: You will be applying
    many of your learned business knowledge and skills to help you to
    determine cause and effect of the identified dilemma.)
    • In this step, you can use the facts you highlighted in the previous step to
    identify the key issue(s) of the case. As case studies may present multiple
    issues associated with the main dilemma, you will want to be able to
    identify the most relevant, always referring to the assignment instruction
    prompts and the business topic(s) being studied for guidance.
    • Next, you should be able to understand how and why the dilemma occurred
    and how it affects the organization in the study. You may want to jot down
    some facts from the case to help you substantiate your position as part of
    your assignment. (Items to consider: Is this the result of management or
    leadership issues, technology issues, systems or process issues, market or
    external issues, etc.?)
    © 2021 Walden University, LLC
    10
    Analyzing a Business Case
    Study: Step 3
    Consider the course(s) of action.
    • You may want to create a list of the actions that can be taken to answer,
    mitigate, or resolve the issue(s) that led to the identified dilemma. These
    actions should be validated, not only by the evidence within the case study
    but also through credible sources beyond the case study. Remember to
    consult your assignment instruction prompts and the business topic/skill
    being presented for guidance.
    • Some questions to determine the course(s) of action might be:
    • Are new technologies, business processes, organizational structures,
    or management behavior required?
    • What changes to organizational processes would be required by each
    alternative?
    • What management policy would be required to implement each
    alternative?
    © 2021 Walden University, LLC
    11
    Analyzing a Business Case
    Study: Step 4
    Evaluate the alternative action(s) to answer, mitigate, or resolve
    the dilemma.
    • Evaluate each of the identified actions you listed in Step 3. Ask
    yourself: What would be the likely outcome if this corrective
    action were implemented?
    • Identify the challenges/risks and benefits of each of the actions.
    Consider whether each action is feasible from a technical,
    operational, and financial standpoint. Be sure to note any
    assumptions on which you have based your decision and validate
    these assumptions.
    © 2021 Walden University, LLC
    12
    Analyzing a Business Case
    Study: Step 5
    Recommend the suggested course of action based on the
    evaluations (i.e., your best solution).
    • From your evaluation of your potential corrective actions, select
    your choice for the best action to be implemented and make
    some notes as to why you made this decision.
    • Your final recommendation should flow logically from the rest of
    your case analysis and should clearly specify what assumptions
    were used to guide and shape your conclusion. (Remember, there
    is typically, by design, no single “right” answer.)
    © 2021 Walden University, LLC
    13
    References
    • Ellet, W. (2007). The case study handbook : How to read, discuss,
    and write persuasively about cases. Harvard Business School
    Press.
    • Wienstein, A., Brotspies, H. V., & Gironda, J. T. (2020). Do your
    students know how to analyze a case – Really? Harvard Business
    Publishing-Education.
    © 2021 Walden University, LLC
    14
    Supporting Business Continuity
    Through IT
    Your Name
    Master of Business Administration, Walden University
    WMBA 6030: Managing Business Information Systems
    Instructor’s Name
    Month XX, 202X
    [Template Notes]
    [Note: Delete this slide before submitting your Assignment. This Assignment Template
    is based off the APA Presentation Template (APA 7) found on the General Templates page
    of the Walden Writing Center. The template found on this page provides additional
    information that may be helpful. Be sure to refer to the notes area of each slide for
    further instructions, including whether a script is needed.]
    Part A: Identify and Evaluate
    Cybersecurity Risks

    [Note: Add slide content. Delete this information in brackets.]

    [Note: Add slide content. Delete this information in brackets.]
    Part B: Risk Control Strategies for
    Business Continuity and Disaster
    Recovery

    [Note: Add slide content. Delete this information in brackets.]

    [Note: Add slide content. Delete this information in brackets.]
    References

    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER