Premium Essay

Cmgt 442 Week 2 Individual

In:

Submitted By pouncer100
Words 1192
Pages 5
Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this type of system are many. Who has access to the information and what information they have access to needs to be defined and quantified. The HR staff will need access to this type of information as they control and use this information. Since there is a trucking union involved, what access does the union representative need for their job? The risk with the union person somehow getting access to

Similar Documents

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 Entire Course http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ CMGT 442 Week 1 DQ 1 DQ 1: Based on the Ledford article, what special issues must be considered for corporate data which is not fully digitized? What are the potential risks associated with the loss of this type of data? CMGT 442 Week 1 DQ 2 DQ 2: Based on the Barr article, what special issues must be addressed for a risk management strategy that supports Web-based systems? Why the risks are associated with disruption of these web-based systems critical and require diligent consideration? CMGT 442 Week 1 Summary For this first week’s weekly summary topic, please find and summarize an IS risk management related current event. You may reference any source (Newspaper, Magazine, e-article, etc.) but please be sure to cite your source based on APA standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member’s article summary. CMGT 442 Week 2 DQ 1 Based on the Keston (2008) article, how important is enterprise identity management for reducing risk throughout the enterprise? Explain why a viable risk management strategy must include...

Words: 1299 - Pages: 6

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cmgt-442-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 442 ENTIRE COURSE Information Systems Risk Management Week 2 Individual Assignment Service Request SR-HT-001 (Huffman Trucking Benefits Election System) Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman Trucking Company. Week 3 Individual Assignment Security Monitoring Prepare a 3- to 5-page paper describing the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified. Week 4 Individual Assignment Outsourcing Risks Prepare a 3- to 5-page paper that identifies the possible risks to an organization in each of the following outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a vendor...

Words: 2578 - Pages: 11

Premium Essay

Information Technology

...Course Syllabus College of Information Systems & Technology CMGT/442 Version 4 Information Systems Risk Management Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project risk management guidelines: Managing risk in large projects and complex procurements. Hoboken...

Words: 1690 - Pages: 7

Premium Essay

Dfdffd

...|[pic] |Course Design Guide | | |College of Information Systems & Technology | | |CMGT/442 Version 4 | | |Information Systems Risk Management | Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials...

Words: 1982 - Pages: 8