Free Essay

Cmgt/442 Week 2

In:

Submitted By tinkerbell73
Words 830
Pages 4
Huffman Trucking Service Request
Huffman Trucking is in need of addressing possible security requirements as well as security risks within their Benefit Elections System. Throughout the report the security requirements and security risks for the Benefits Electronic System will be documented and addressed. A few of the risks that are involved with the Benefits Electronic System are errors that cannot be controlled, taking too much time to complete, not having a correct plan and most importantly support from the stakeholders. It is important that the Huffman Trucking current system is reviewed and documented so that risks can be documented as well as requirements. It is important that the stakeholders are updated throughout the entire project.
Any of the systems that Huffman Trucking is unclear about needs to be documented and any security requirements need to documented and corrected before the analysis phase can be started. A few of the security requirements that might need to be documented are what resources will be used; any risk boundaries that are with the system and what data diagrams are being used. There also needs to be a backup plan in case the system is hacked into during the project process. Without some type of a backup plan there can be a lot of information stolen from within the system.
When the Benefits Elections System starts the upgrade process it is important that a project manager is assigned to the project. The purpose of the project manager is to help the project run smoothly. The project manager will also assign daily tasks to other team members throughout the project process. During the project process it is important that the security requirements are checked often to determine if there are any technical issues, or any other issues that will prolong the completion of the project. Extra security will need to be added to the systems if there has any trace of hackers within the system.
Huffman Trucking needs to have their resources documented through some type of data diagram. The data diagrams will help in security risks. Any resources that are used throughout the project needs to be done between any systems dependencies and any outline dependencies. It is also important that any system testing that needs to be done is between the system entry points and third party software. The testing between these will show where there are any issues and then document them. Any security risks that are documented a team member will need to know how to handle the risk or the threat.
There will be a team member assigned to that asset each of the issues that are found within the system. It is important to make sure that the team member that is assigned to handle the risks is creative and is able to address the risks and threats the best possible way. Each team member needs to be trained in what to do if the system has been hacked into. They each need have an understanding of what information may be stolen from within the system. All systems can become a vulnerable target if the proper security is not used.
The risks that Huffman Trucking may face are defined as what risks are the weakest and what risks are the strongest. Huffman Trucking is a large organization so there risks may not be as high as risks from a smaller organization. The smaller organizations does not have the resources or the income of a larger organization has so the type of security. Although it is important no matter how large or how small your organization is it is important to have the best security available so help prevent security risks. There will loss that organizations will face at some point.
For Huffman trucking to have a successful Benefits Elections Systems they need to make sure that their systems are up-to-date with security. Without the proper security there are chances of the system being hacked into. The systems also need to be able to accommodate to the growing needs that organizations a faced with. The needs are growth within the organization from customers, supply and demand. If there is not enough security or security at all the organization can become devastated from the loss that hackers may erase or steel. It is also important for employees to have an understanding of what to do in case of the system being hacked into and also how to make sure that the systems has the best security system available.
The systems needs to make sure that they are able to handle what system upgrades are needed. The organization does not want to commit to a project and then not have the system to run the new project. Each of the organizations team members needs to have daily duties to make sure that their section of the system is running smoothly. If they notice anything that does not look normal they need to know how to report the security risks.

Similar Documents

Premium Essay

Cmgt 442 Week 2 Ia

...Risk Analysis Considerations for Huffman Trucking University of Phoenix CMGT442 1-8-2012 The purpose of a risk assessment is to help decision makers to become aware of threats that can negatively impact the business and to help them to make sound and informed decisions to limit the amount of risk the business is exposed to. Huffman trucking is embarking on the creation of a benefits election system for the tracking and reporting of employee benefits. Because of the sensitive nature of the information being dealt with, Huffman must take measures to limit the amount of exposure to risk the system will have. Often times companies overlook some factors of risk because they have limited vision with regards to potential liabilities or faults in their systems. A good and thorough risk assessment can identify previously unseen weaknesses as well as develop a better understanding of all the threats. There are some components that when in place can have a huge effect on the validity of a risk assessment. Hiring an outside firm with expertise in identifying threats and developing action plans can be costly but can also help to ensure any risk analysis is thorough. Also, companies with good data sources are in a better position to evaluate existing operations and assets. When putting together a risk assessment there are certain components that are crucial to getting the process completed thoroughly and appropriately. These steps include: Identifying Threats. Cataloging both internal...

Words: 751 - Pages: 4

Premium Essay

Cmgt 442 Week 2 Individual

...Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this type...

Words: 1192 - Pages: 5

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 Entire Course http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ CMGT 442 Week 1 DQ 1 DQ 1: Based on the Ledford article, what special issues must be considered for corporate data which is not fully digitized? What are the potential risks associated with the loss of this type of data? CMGT 442 Week 1 DQ 2 DQ 2: Based on the Barr article, what special issues must be addressed for a risk management strategy that supports Web-based systems? Why the risks are associated with disruption of these web-based systems critical and require diligent consideration? CMGT 442 Week 1 Summary For this first week’s weekly summary topic, please find and summarize an IS risk management related current event. You may reference any source (Newspaper, Magazine, e-article, etc.) but please be sure to cite your source based on APA standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member’s article summary. CMGT 442 Week 2 DQ 1 Based on the Keston (2008) article, how important is enterprise identity management for reducing risk throughout the enterprise? Explain why a viable risk management strategy must include...

Words: 1299 - Pages: 6

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cmgt-442-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 442 ENTIRE COURSE Information Systems Risk Management Week 2 Individual Assignment Service Request SR-HT-001 (Huffman Trucking Benefits Election System) Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman Trucking Company. Week 3 Individual Assignment Security Monitoring Prepare a 3- to 5-page paper describing the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified. Week 4 Individual Assignment Outsourcing Risks Prepare a 3- to 5-page paper that identifies the possible risks to an organization in each of the following outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a vendor...

Words: 2578 - Pages: 11

Free Essay

Homework Lance Online Homework Help

...http://homeworklance.com/downloads/acc-206-entire-course/ http://homeworklance.com/downloads/acc-310-entire-course-week-1-5-latest/ http://homeworklance.com/downloads/acc-340-complete-course-material-wk-1-5-a/ http://homeworklance.com/downloads/acc-400-entire-course-final-exam-guide/ http://homeworklance.com/downloads/acc-407-entire-course-advance-accounting/ http://homeworklance.com/downloads/acc-423-entire-course/ http://homeworklance.com/downloads/acc-455-entire-course-asolution/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting-2/ http://homeworklance.com/downloads/acc-557-complete-course-material/ http://homeworklance.com/downloads/acc-557-full-course-new-updated-2014/ http://homeworklance.com/downloads/acc-561-complete-course-material/ http://homeworklance.com/downloads/acct-212-financial-accounting-complete-course/ http://homeworklance.com/downloads/acct-504-accounting-finance-managerial-use-analysis/ http://homeworklance.com/downloads/acct-505-managerial-accounting-entire-course/ http://homeworklance.com/downloads/ajs-532-entire-course-week-1-6-complete-course/ http://homeworklance.com/downloads/ajs-582-entire-course/ http://homeworklance.com/downloads/bcom-275-complete-course-material/ http://homeworklance.com/downloads/beh-225-entire-course-weeks-dqs-assignments/ http://homeworklance.com/downloads/bis-155-complete-course-material/ http://homeworklance...

Words: 1331 - Pages: 6

Free Essay

Homework Lance

...http://homeworklance.com/downloads/acc-206-entire-course/ http://homeworklance.com/downloads/acc-310-entire-course-week-1-5-latest/ http://homeworklance.com/downloads/acc-340-complete-course-material-wk-1-5-a/ http://homeworklance.com/downloads/acc-400-entire-course-final-exam-guide/ http://homeworklance.com/downloads/acc-407-entire-course-advance-accounting/ http://homeworklance.com/downloads/acc-423-entire-course/ http://homeworklance.com/downloads/acc-455-entire-course-asolution/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting-2/ http://homeworklance.com/downloads/acc-557-complete-course-material/ http://homeworklance.com/downloads/acc-557-full-course-new-updated-2014/ http://homeworklance.com/downloads/acc-561-complete-course-material/ http://homeworklance.com/downloads/acct-212-financial-accounting-complete-course/ http://homeworklance.com/downloads/acct-504-accounting-finance-managerial-use-analysis/ http://homeworklance.com/downloads/acct-505-managerial-accounting-entire-course/ http://homeworklance.com/downloads/ajs-532-entire-course-week-1-6-complete-course/ http://homeworklance.com/downloads/ajs-582-entire-course/ http://homeworklance.com/downloads/bcom-275-complete-course-material/ http://homeworklance.com/downloads/beh-225-entire-course-weeks-dqs-assignments/ http://homeworklance.com/downloads/bis-155-complete-course-material/ http://homeworklance...

Words: 1331 - Pages: 6

Premium Essay

Information Technology

...Course Syllabus College of Information Systems & Technology CMGT/442 Version 4 Information Systems Risk Management Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project risk management guidelines: Managing risk in large projects and complex procurements. Hoboken...

Words: 1690 - Pages: 7

Premium Essay

Dfdffd

...|[pic] |Course Design Guide | | |College of Information Systems & Technology | | |CMGT/442 Version 4 | | |Information Systems Risk Management | Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials...

Words: 1982 - Pages: 8