OverviewOne of the responsibilities placed on managers in today's On-Demand Economy isthat of ensuring that the business processes are held to a high degree ofcybersecurity. Because the concept of data-on-demand is an operational necessitythat places the enterprise's and customers' resources at risk to potential fraudulenthacks, all employees, including those that sit in the loftiest of office spa
...[Show More]
Overview
One of the responsibilities placed on managers in today's On-Demand Economy is
that of ensuring that the business processes are held to a high degree of
cybersecurity. Because the concept of data-on-demand is an operational necessity
that places the enterprise's and customers' resources at risk to potential fraudulent
hacks, all employees, including those that sit in the loftiest of office spaces, must be
trained, made aware of the various methods and practices that can lead to
vulnerabilities, and held to very high standards of compliance with standard
cybersecurity practices.
The growth of mobile technologies and the IoT have played a significant role in the
On-Demand Economy environment. A downside to the proliferation of such
technologies is the cracks and doors into the corporate and agency networks that
have been opened along the data path, allowing for an increased level of black hat
intrusions and reconnaissance.
Case Study Assignment
Download the APA Style Template (DOCX) and review the Case Study
Requirements section.
Conduct research on various methodologies and solutions relating to the
implementation of effective cybersecurity programs that may be utilized to thwart
outside-agency attacks on an enterprise’s networks. Your approach here should
be to seek out scholarly source data relating to examples of the various
cybersecurity measures that top management and IT departments might provide
for employees and contractors, including data access enforcement, network
intrusion detection and prevention systems, and real-time responses to incidents
and attacks. You could focus your research on any one of the various types of
defenses such as anti-malware applications, Intrusion Detection Systems
(IDSs), Intrusion Prevention Systems (IPSs), biometric access, rogue app
monitoring, mobile kill switch, or remote wipe capability technologies.
Follow the guidelines in the Case Study Requirements section.
Your document submission is due by the posted due date. Your instructor will use the 3.3 Case Study Rubric for evaluating
and grading your submission.
Save your assignment using a naming convention that includes your first and last name and the activity number (or
description). Do not add punctuation or special characters.
APA Format and …
Assignment Case Study Requirements
4/21/2020 3.3 Case Study: Cybersecurity (PLG1)
https://erau.instructure.com/courses/110418/assignments/1989741?module_item_id=6139450 2/4
MGMT 221 3.3 Case Study Rubric
This assessment aligns with Module Objective 2 and Learning Outcome 8.
Purpose of Case Study Assignments
Case Study assignments require you to analyze
real-world information systems topics and provide
examples that illustrate how prominent
businesses and organizations implement the
theoretical concepts you are studying. Case Study
assignments provide a broader, integrated, critical
thinking process that helps you to expand on and
clarify your understanding of the information
systems topics.
Research
Be sure to conduct in-depth research on the
topics and provide factual details obtained from
primary sources that support the case that you
are making. It is strongly recommended that you
conduct research utilizing the ERAU Hunt Library.
The Hunt Library contains a great amount of
information on aviation and other topics. A benefit
of utilizing the Hunt Library is the availability of the
APA style citation/reference tool that is provided
when conducting research utilizing the
EAGLEsearch feature. This tool can automatically
provide the proper APA style formats for citatio
[Show Less]