Strategic Information Security at Wal-Mart

$10.00

Management of information security at Wal-Mart

Recommendation for developing the security model

 

SKU: Repo938924

RESEARCH PAPER-1

Background

Select one organisation of your choice. Investigate and report on the current state of this organisation (as per material covered in these chapters) and make suggestions for improvements that the organisation could adopt to improve their security. If you are working at this organisation, please make sure NOT to divulge any sensitive information (you may wish to check online what information is made public by the organisation to ensure this). While the scope is reflected by chapters 1-4, you are allowed to use journal articles to support your statements.

Provide the URL, values, vision, and mission statement as an appendix.

Write a research paper and organise it in the following way:

  • Title (you are required to decide your paper’s title)
  • Your name and student number
  • Abstract
  • Introduction
  • Body context (you could divide into several sub-sections if required)
  • Conclusion

 

Structured development of research paper

Logical flow leading the reader from start to finish on a clear path of addressing the assessment requirements; clear identification of the current security state; and description of network usage.

 

Depth of research/ critical reflection

Reason to support findings: critical evaluation and analysis of the current state of the organisation aligned with chapters 1-4; suggestions of improvements implement the understanding of the current state and the solutions provided in the chapters 1-4;

 

Understanding of key ideas and concepts

Understood the course material; able to identify key ideas and concept within a real life scenario of issues; able to explain an issue with the use of key ideas and concepts; able to relate own experience to course material and issue by introducing own perspective

 

RESEARCH PAPER-2

Background

This assessment item coverschapters 1-12. Using the organisation from your last two assessment items, you are now addressing controlling risk, protection mechanisms, personnel and security, law and ethics specifically.  Provide the organisation with the necessary guidelines for implementation. Your solution will incorporate specific aspects from all the chapters as you are building your argument for this requirement.

 

Write a report in accordance to the recommendations of the links on the study desk.

 

Structured development of research paper

Logical flow leading the reader from start to finish on a clear path of addressing the assessment specification; strong focus on the specific requirements with interweaving of relevant aspects of all chapters; succinct reporting of issues and limitations installation and use of monitor; applied correct report format.

 

Depth of research/ critical reflection

Reason to support findings: focus on depth of controlling risk, protection mechanisms, personnel and security, law and ethics; specific focus related back to previous chapters; critical review of PRT monitor identifying issues showing proactive investigation into purpose and usefulness of PRT monitor

 

Understanding of key ideas and concepts

Understood the course material; able to identify key ideas and concept within a real life scenario of issues; able to explain an issue with the use of key ideas and concepts; able to relate own experience to course material and issue by introducing own perspective; showing judgement by incorporating objective view of how implementing a concept may not work and providing suggestions on how this could be overcome.

Reviews

There are no reviews yet.

Be the first to review “Strategic Information Security at Wal-Mart”

Your email address will not be published. Required fields are marked *

Sorry no more offers available