Imagine you have been hired by a small but growing company to help with their IT efforts. Your first task is to let them know the general principles involved with using IT systems throughout the enterprise.
Write an e-mail describing the top five types of IT systems the company could use in its operations.
Answer the following questions in 200 to 300 words each:
* What are some important questions that need to be asked when determining the exact requirements for a system? * Why are key elements of systems often missed, in spite of having a specific step to elicit the requirements for the system?
Week Two
Answer the following in 200 to 300 words each:
Discuss the role that preparing employees to recognize and respond …show more content…
to social engineering techniques should play in the organization’s overall information security program.
Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.
Week Three
Answer the following questions in 200 to 300 words each:
What role do accounting systems play in the modern enterprise?
How has the development of complex IT systems affected accounting work?
Discuss the need to integrate accounting systems with those in the rest of the enterprise. Why would such systems need to have constant data feeds from throughout the enterprise?
Week Four
Imagine the IT department of a medium-sized company has hired you. Your first task is to provide a high-level idea of what they need to do to brand their Internet presence.
Write a 150- to 300-word letter to the IT department in which you discuss the key things the company should do to have a strong brand on the Internet.
Answer the following questions in 200 to 300 words each:
What role do IT systems play in marketing? How can IT systems help support an organization’s marketing efforts?
What are the key elements of an organization’s online reputation? How can they positively influence each one?
Week Five
Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.
Answer the following questions in 200 to 300 words
each:
What are three key elements for an organization to consider in strengthening its overall information security posture? Describe how each plays a role in the operations of the entire organization.
How do the principles of information security apply to the material that has been examined during the course? How can the systems used throughout the organization both enable business and protect the data they contain?
Format your paper consistent with APA guidelines.
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory
Option 1: Virtual Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary.
System Name | Brief Description | Department to Use the System | Purpose of the System | Connects With | Development Details | | | | | | | | | | | | |
Option 2: General IT System Inventory
Complete the following chart, filling in information for each system. Add rows to the chart as necessary.
Industry or Business Type | System Name | Brief Description | Target Departments | Purpose | Would Connect With | | | | | | | | | | | | |