See attached instructions. PROPER PRESENTATION and Plagiarism percent LESS THAN 5-10% COUNTS!!!
INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl link to proper use of APA https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_style_introduction.html Write a 5 page paper (1,200 or more words) in APA format. Below is a recommended outline. 1. Cover page (See APA Sample papers in www.apastyle.org OR https://owl.english.purdue.edu/owl/resource/560/01/) 2. Introduction a. A thesis statement b. Purpose of paper c. Overview of paper 3. Body (Cite sources with in-text citations.) 4. Conclusion – Summary of main points plus Lessons Learned and Recommendations 5. References – List the references you cited in the text of your paper according to APA format. (Note: Do not include references that are not cited in the text of your paper) Support all assertions with proper scholarly research, using at least 5 references (scholarly articles published in peer-reviewed academic journals). Proper APA formatting is expected (cited sources, cover page, reference page, etc.). Your submission should be presented in the form of a business document. Presentation counts! Microsoft Word - Case Study 2 Mercer Paints MGMT 9060 MIS Case Study #2 Hands-on MIS Mercer paints is a paint manufacturing company located in Alabama that uses a network to link its business operations. A security risk assessment that management requested identified a number of potential exposures. These exposures, their associated probabilities, and average losses are summarized in the table provided below. Use the table to answer the associate questions. In addition to potential exposures listed, identify at least three other potential threats to Mercer Paints, assign probabilities, and estimate a loss range. Hands-on Case Questions 1. Use a spreadsheet software and the risk assessment data to calculate the expected annual loss for each exposure. 2. Present your findings in the form of a chart. 3. Which control points have the greatest vulnerability? 4. Which recommendations would you make to Mercer Paints? 5. Prepare a written report that summarizes your findings? Mercer Paints Risk Assessment Exposure Probability of Occurrence (%) Average Loss ($) Malware attack 60% $75,000 Data loss 12% $70,000 Embezzlement 3% $30,000 User errors 95% $25,000 Threats from hackers 95% $90,000 Improper use by employees 5% $5,000 Power failure 15% $300,000 Grading Rubric Critical Elements Exemplary (3) Good (2) Fair (1) Poor (0) Use a spreadsheet software and the risk assessment data to calculate the expected. Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Present your findings in the form of a chart? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Which control points have the greatest vulnerability? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Which recommendations would you make to Mercer Paints? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Prepare a written report that summarizes your findings? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Management Information Systems: Managing the Digital Firm, Sixteenth Edition Management Information Systems: Managing the Digital Firm Sixteenth Edition Chapter 8 Securing Information Systems Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) 1 Learning Objectives 8.1 Why are information systems vulnerable to destruction, error, and abuse? 8.2 What is the business value of security and control? 8.3 What are the components of an organizational framework for security and control? 8.4 What are the most important tools and technologies for safeguarding information resources? 8.5 How will M I S help my career? Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This chapter discusses the need for security to guard information systems and data, as well as technologies used to secure information systems. Ask students what types of threats can harm an information system. Internet security, or the lack thereof, will continue to be a topic of major concern to corporations and countries. Ask students why there is so much attention paid to Internet security issues in the press. Ask if anyone has been a victim of a breach in computer security. 2 Video Cases Case 1: Stuxnet and Cyberwarfare Case 2: Cyberespionage: The Chinese Threat Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 Million Users Instructional Video 2: Meet the Hackers: Anonymous Statement on Hacking Sony Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 3 Hackers Target the U.S. Presidential Election: What Happened? (1 of 2) Problem Weak network security Limited financial resources Solutions Malware detection technology Isolate systems and networks Prevent unauthorized access Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 4 Hackers Target the U.S. Presidential Election: What Happened? (2 of 2) Hackers took advantage of uneven security and controls and loose management structure to attack the Clinton campaign Demonstrates vulnerabilities in information technology systems Illustrates some of the reasons organizations need to pay special attention to information system security Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 5 Why Systems are Vulnerable (1 of 2) Security Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This slide introduces the need for both security and controls in today’s businesses in order to safeguard information systems. Ask students to give an example of security technique and an example of a control that might be used in a business. 6 Why Systems are Vulnerable (2 of 2) Accessibility of networks Hardware problems (breakdowns, configuration errors, damage from improper use or crime) Software problems (programming errors, installation errors, unauthorized changes) Disasters Use of networks/computers outside of firm’s control Loss and theft of portable devices Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This slide discusses the main categories of threats to information systems. Note that when large amounts of data are stored digitally on computers and servers and in databases, they are vulnerable to many more kinds of threats than when they were stored in manual form, on paper in folders and file cabinets. When data are available over a network, there are even more vulnerabilities. Ask students if they have ever lost data on their computers. What was the reason (hardware, software, “disaster,” other people, etc.). On the other hand, digital records are not vulnerable in ways that manual records in a file cabinet are vulnerable. For instance, you really can’t tell who has accessed manual records, or when, in a physical file. In a database, file access is monitored (unless a hacker has found a way to read records without leaving a digital trail). 7 Figure 8.1 Contemporary Security Challenges and Vulnerabilities Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Figure 8.1, Page 298. The architecture of a web-based application typically includes a web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. This graphic illustrates the types of threats to system security and the points over the network at which these threats are prevalent. Some problems occur at the client computer, others through the network lines, corporate servers, or in corporate hardware and software. Full description: A diagram shows the common threats against contemporary information systems. The diagram shows the corporate servers connected to the client, or users, through communication lines at one end and to the