Assignment: Framework Decisions

Want create site? With Free visual composer you can do it easy.

Assignment: Framework Decisions

Assignment: Framework Decisions

ORDER NOW FOR AN ORIGINAL PAPER:Assignment: Framework Decisions

The RN to BSN program at Grand Canyon University meets the requirements for clinical competencies as defined by the Commission on Collegiate Nursing Education (CCNE) and the American Association of Colleges of Nursing (AACN), using nontraditional experiences for practicing nurses. These experiences come in the form of direct and indirect care experiences in which licensed nursing students engage in learning within the context of their hospital organization, specific care discipline, and local communities.

Note:  The teaching plan proposal developed in this assignment will be used to develop your Community Teaching Plan: Community Presentation due in Topic 5. You are strongly encouraged to begin working on your presentation once you have received and submitted this proposal.

Managing and Using Information Systems:

A Strategic Approach – Sixth Edition

Keri Pearlson, Carol Saunders, and Dennis Galletta

© Copyright 2016 John Wiley & Sons, Inc.

Chapter 7 Security

Opening Case

• What are some important lessons from the opening case?

• How long did the theft take? How did the theft likely occur?

• How long did it take Office of Personnel Management (OPM) to detect the theft?

• How damaging are the early reports of the data theft for the OPM?

© 2016 John Wi ley & Sons, Inc. 3

How Long Does it Take?

• How long do you think it usually takes for someone to discover a security compromise in a system after the evidence shows up? A. Several seconds B. Several minutes C. Several hours

D. Several days E. Several months

A Mandiant study revealed that the median for 2014 was 205 days! That’s almost 7 months! The record is 2,982 which is 11 years!

© 2016 John Wi ley & Sons, Inc. 4

Timeline of a Breach – Fantasy

• Hollywood has a fairly consistent script: • 0: Crooks get password and locate the file • Minute 1: Crooks start downloading data and

destroying the original • Minute 2: Officials sense the breach • Minute 3: Officials try to block the breach • Minute 4: Crooks’ download completes • Minute 5: Officials lose all data

Source: http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf

© 2016 John Wi ley & Sons, Inc. 5

Timeline of a Breach – Reality

Source: http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf

© 2016 John Wi ley & Sons, Inc. 6

IT Security Decision Framework Decision Who is

Responsible Why? Otherwise?

Information Security Strategy

Business Leaders They know business strategies

Security is an afterthought and patched on

Information Security Infrastructure

IT Leaders Technical knowledge is needed

Incorrect infrastructure decisions

Information Security Policy

Shared: IT and Business Leaders

Trade-offs need to be handled correctly

Did you find apk for android? You can find new Free Android Games and apps.