Wk1-5.docx

Wk 1 – Signature Assignment: Vampire Legends [due Mon]
Top of Form
Bottom of Form
Assignment Content
1.
Top of Form

Part A: Ch. 10 Role Playing Sim: Vampire Legends

In this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.

Using the Vampire Legends Access link, complete the interactive before moving to Part B. 

Part B: Memo to CEO

Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts:
· Part 1: Analysis of Components of Information Security that does the following:
· Categorizes the components of information security
· Analyzes the components of information security as it applies to the scenario presented in Vampire Legends
· Contains a breakdown of the budget report
· Discusses your allocation strategy based on the risks and expenses involved
· Describes your choice for the best advertising campaign
· Outlines the course of action in handling information security threats in the future
· Part 2: Role of Ethics that does the following:
· Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organization
· Describes the consequences of the conflict
· Discusses the solution to the conflict
· Discusses the impact of ethics on revenue

CMGT/582: Security & Ethics
Wk 2 – Cruisin’ Fusion, Part 1 [due Mon]
Top of Form
Bottom of Form
Assignment Content
1.
Top of Form

Part A: Ch. 6 Role Playing Sim: Cruisin’ Fusion

In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You are not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture.

Using the Cruisin’ Fusion Simulation Access link, complete the interactive before moving to Part B.

Part B: Cruisin’ Fusion Contest

Now that the Cruisin’ Fusion website is up and running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In to participate, the customer will need to enter their first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation, with speaker notes, for the next web meeting to address the following:
· Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
· Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in to use the name suggested by the winner? What protection or disclaimer does the customer require?
· Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Submit your assignment.
Bottom of Form

Bottom of Form

CMGT/582: Security & Ethics
Wk 3 – Signature Assignment: Cruisin’ Fusion, Part 2 [due Mon]
Top of Form
Bottom of Form
Assignment Content
1.
Top of Form

Refer to Cruisin’ Fusion, Part A in Wk 2.

The Cruisin’ Fusion taco trucks are gaining popularity, fueling a demand for an -ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. 
 

Research various shopping cart software to determine the best choice for website.
 

Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online s is safe. Your blog post should do the following:
· Introduce the -ahead option.
· Explain the differences between ethics, organizational policies, and laws.
· Analyze how the new shopping cart software upholds ethical trends in consumer privacy.
· Describe organizational policies that will be implemented to help protect consumer data.
· Examine ethical considerations for maintaining confidentiality and consumer data.
· Describe the various privacy laws and regulations upheld with the shopping cart software.

CMGT/582: Security & Ethics
Wk 4 – Devil’s Canyon, Part 1 [due Mon]
Wk 4 – Devil’s Canyon, Part 1 [due Mon]
Top of Form
Bottom of Form
Assignment Content
1.
Top of Form

Part A: Devil’s Canyon Simulation

In this simulation, you will evaluate how to design an enterprise architecture for a mountain resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying in budget.

Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B.

Part B: Policies, Plans, and Risks

Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.

In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team:
· Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
· Outline the importance of a security plan in relation to security roles and safeguards.
· Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
· Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
· Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

CMGT/582: Security & Ethics
Wk 5 – Signature Assignment: Devil’s Canyon, Part 2 [due Mon]
Top of Form
Bottom of Form
Assignment Content
1.
Top of Form

Refer to Devil’s Canyon, Part A in Wk 4.

Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should:
· Describe briefly each of the identified risks/threats.
· Evaluate the security controls that mitigate each of the risks/threats identified.
· Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
· Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.
Bottom of Form
Bottom of Form
Bottom of Form

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY