Premium Essay

Cmgt/442 Wk 2 Individual Example

In: Computers and Technology

Submitted By jparadise2
Words 795
Pages 4
Benefits Election System
Huffman Trucking Company has demanded a top-notch Benefits Election System to be executed within the corporation. The current benefit packages that Huffman has include dental, medical, and vision plans for the employees within Huffman. For the Benefit Election System, member info and the benefit platform they choose are accumulated and accomplished on a database system. This type of system can be adapted by an electronic file or a hardcopy paper file. However the storage method, security processes need to be executed as soon as possible to protect employee’s confidentiality and material as well as preserve Huffman’s assets from theft and/or lawsuit.
Huffman Trucking has implemented such a process called the Benefits Election System, which promotes organizational reporting and tracking of employee benefits. This document will assess the security risks and requests that the Benefits Election System requires.
Guaranteeing the safety of organizational and employee data is fundamentally vital for any company. Security hardship can be detrimental to the association and the affected employees. In Huffman Trucking’s case, data stored in the database includes sensitive employee information, social security numbers and their names that are utilized for the Benefits Election System. The cost of harm of such sensitive information will typically result in a similar outcome - the loss of financial properties and/or the harm to one’s personal, critical information. In an effort to decrease or abolish these risks altogether, several requests must be established. These requirements will include: firewall security, safeguarding passwords, and password renewals.
The key element in securing a database is to start off by implementing a firewall that will block unwanted users from gaining access to critical information. In the world of computer firewall…...

Similar Documents

Free Essay

Wk-2

...at a minimum. Costs of employee turnover can depend on multiple variables including, but not limited to, job satisfaction, pay, benefits, staffing, and job vacancy. These variables can be broken down into two groups, independent variables and dependent variables. Independent Variables Job satisfaction – describes how content an individual is with his/her current job. Factors that can increase job satisfaction among individuals include pay, benefits, perceived fairness, flexibility, working environment, and opportunities for advancement within an organization. Job vacancy – available vacant positions can influence individuals to leave their current place of business and seek employment opportunities elsewhere to achieve desired needs including more. Dependent Variables Pay – wages employees earn in comparison to each other and competitors. Benefits – these include items that can be offered to employees to increase job satisfaction including, work hours, health plans (medical/dental), insurance, etc. Training – cost of training new employees or retraining current employees due to turnover rates. Staffing - employing the right amount of individuals who are the best fit for the organization to ensure a safe workplace and scheduling flexibility. It is important that organizations ensure that the best workers remain within their company to help increase productivity levels and ensure overall success. The cost of turnover can be devastating to organizations if no plan of......

Words: 708 - Pages: 3

Premium Essay

Cmgt 410 Week 2 Individual

...and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand what social engineering is. This is where training comes into view. The military does not take training related to securing its information seriously enough. Most average users on the military network could not spot an email intentionally created with inaccurate details which would throw up a red flag to trained users. Kevin Mutnik in a presentation given to military leaders said it perfectly, “The military needs to take security training seriously. Anyone who’s currently serving in the military or works for the Department of Defense has probably gone through basic computer security education, often consisting of nothing more than a one......

Words: 1178 - Pages: 5

Premium Essay

Wk 4 Individual

...Chapter 4 Questions 11-list the five steps of hypothesis testing and explain the procedure and logic of each. Step 1: Restate the question as a Research Hypothesis and a Null Hypothesis about the populations (Aron, 2009). We want to put this into clear terms with our population 1 in the first group stating what our opinion of the research is, why we are performing the research, and what we feel the outcome will be. We then state a null hypothesis to make clear we understand there is an alternative. That is, our prediction may not be correct, there may be no effect. This is considered population 2. Step 2: Determine the characteristics of the Comparison Distribution (Aron, 2009). We want to determine if the null hypothesis is true, what is the situation that makes it so. We want to state that the population 1 is not the normal curve and population 2 is. If the null is true, they will both follow the normal curve. We will compare the two scores of the test to examine our results and to test the hypothesis and the null against one another. Step 3: Determine the Cutoff Sample Score on the Comparison Distribution at which the Null Hypothesis should be rejected (Aron, 2009). Before our initial test, we will determine a score of which our results will be compared. We need evidence to prove that our hypothesis is true and the null is not. The significance level is the probability of making a Type I error. This occurs when the decision supports the alternative hypothesis......

Words: 2430 - Pages: 10

Premium Essay

Cmgt 442

...likewise be minimized with the setting up and completion of CCTV cameras, bulletproof glass and protective bars on every window. Computer Software Infractions. Computer software that involves firewalls, anti-virus, anti-malware and encryption software should be set-up on every desktop and every laptop to assure the safety of essential info and records. Updating of software shall be kept up to date in order to ensure that new malware or viruses are discovered sooner than they can damage the database and wipe out valuable client’s data. An Information Technology (IT) division shall support all safeguarding of company computing systems along with their relevant software. Computer System Hackers. Threats may come from individuals that have a desire to harm a business. For that reason, tough monitoring should be set-up to guard the business and client data on all systems. Server approach, both physical and through the network, shall likewise be restricted. Therefore, Role Based Access Controls (RBAC) shall be utilized to keep in check user activities and set limitations or grant only those with authorization needed in the performance of their work. Policies shall be made that users will have to change their passwords at least every month so that there will be less chances of it being stolen or cracked. Conclusion McBride Financial Services uses sensitive equipment and toxic chemicals. These items place the location at risk due to their......

Words: 1455 - Pages: 6

Free Essay

Example of an Individual Report

...Individual Report #1: Movie Analysis In chapter twelve on page 269 it states, “The convenience of electronic communication does not diminish the importance of face-to-face meetings. Relying totally on electronic communication often diminishes the bonding and synergy that happens when team members meet and work face-to-face.” In this report I will discuss how my group, The Micro Bites, found out just how true the statement on page 269 is. I will also apply other concepts from chapter one of my textbook “Working in Groups.” Our group contains four members: Mrs. Ward, Mr. Brady, Miss Perez, and of course, myself. According to chapter one on page four of my textbook our group is within the range of the number of members a group should generally have to be productive. However, we did have one person in the group that did not participate. Although we were lacking one person, our group was still able to be productive and finish the presentation, but it did make it more difficult and cause more tension and conflict among the group. We chose to mainly use asynchronous communication because only two of the group members, Miss Nohemi and I, live on school campus. So, in order for our group to communicate we utilized the discussion thread on the online classroom system and sent text messages back and forth. Throughout the whole presentation process I felt it was rather confusing on which posts on the online classroom system were pertaining to the presentation because we had so many...

Words: 499 - Pages: 2

Premium Essay

Cmgt 442 Week 2 Individual

...Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this......

Words: 1192 - Pages: 5

Premium Essay

Cmgt 445 Week 2 Dqs

...This document of CMGT 445 Week 2 Discussion Questions shows the solutions to the following problems: DQ 1: Haddad and Ribi?re (2007) explore and expand upon the more formal use of Knowledge Management in the process of software acquisition. Analyze and discuss the use of the Software Acquisition Capability Maturity Model (SACMM) if you were the project manager responsible for a large software acquisition at your company. DQ 2: In what ways can changes in a business affect an application software development project? What are some of the tools a project manager can use to respond to changes that occur? DQ 3: Boehm and Bhuta, (2009) explore the risks associated with integrating an existing software component into a new application implementation project. Regarding the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project. DQ 4: From a project management perspective, at what point in an application implementation project timeline should the mainframe computer or server hardware be specified and/or acquired? Identify two or three considerations for making sure that the right hardware is available at the right time. General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1...

Words: 359 - Pages: 2

Premium Essay

Cmgt 410 Week 2 Individual

...from the same location. If this is not possible, transportation will need to be provided to and from the training. Additional time will also need to be schedule with the venue for setup prior to training, and tear down at the conclusion of the event. Training Training will begin with sign in at the registration tables. Registration tables should be divided into a minimum of 3 tables, equally split by first letter of attendees last name. Once a person has registered, they will be offered a light breakfast and beverages and then will be asked to make their way to their respective meeting location. Breaks will be provided every 90 minutes with a 1-hour lunch in the middle of training. At the end of the training class (end of day 2), all attendees will be asked to complete a short survey about the event. The questions will cover the material covered, the training venue, and the hotel accommodations....

Words: 536 - Pages: 3

Premium Essay

Cmgt 442

...International Association, found at www.prmia.org,is another non-profit association that servers it members with networking, professional development and education opportunities (The Professional Risk Managers’ International Association [PRMIA.org], 2014). PRMIA has local chapters in in the United States in Atlanta, Boston, Chicago, Houston, Los Angeles, Minneapolis, New York, San Francisco, Seattle, and Washington D.C.. The career search covers 25 distinct categories. PRMIA.org would be a good site for someone who would like to advance their career and looking for the support of local chapters. In addition to professional organizations job sites like Monster.com and CareerBuilder.com, even though they are general job search engines, can help an individual find a job in the field of risk management, and probably find jobs in risk management that are more industry specific that the professional organizations could provide. People looking for a career in risk management have plenty of options for professional organizations for networking, professional development, and career searching. While general job boards do are not specific for risk management, they can help one be more industry specific and likely to find job postings not listed on the professional organization’s web site. References Risk Management Society. (2014). About RIMS. Retrieved from http://www.rims.org/aboutRIMS/Pages/MissionandDescription.aspx# The Professional Risk Managers’ International......

Words: 402 - Pages: 2

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cmgt-442-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 442 ENTIRE COURSE Information Systems Risk Management Week 2 Individual Assignment Service Request SR-HT-001 (Huffman Trucking Benefits Election System) Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman Trucking Company. Week 3 Individual Assignment Security Monitoring Prepare a 3- to 5-page paper describing the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified. Week 4 Individual Assignment Outsourcing Risks Prepare a 3- to 5-page paper that identifies the possible risks to an organization in each of the following outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a......

Words: 2578 - Pages: 11

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 Entire Course http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ CMGT 442 Week 1 DQ 1 DQ 1: Based on the Ledford article, what special issues must be considered for corporate data which is not fully digitized? What are the potential risks associated with the loss of this type of data? CMGT 442 Week 1 DQ 2 DQ 2: Based on the Barr article, what special issues must be addressed for a risk management strategy that supports Web-based systems? Why the risks are associated with disruption of these web-based systems critical and require diligent consideration? CMGT 442 Week 1 Summary For this first week’s weekly summary topic, please find and summarize an IS risk management related current event. You may reference any source (Newspaper, Magazine, e-article, etc.) but please be sure to cite your source based on APA standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member’s article summary. CMGT 442 Week 2 DQ 1 Based on the Keston (2008) article, how important is enterprise identity management for reducing risk throughout the enterprise? Explain why a viable risk management strategy must......

Words: 1299 - Pages: 6

Premium Essay

Cmgt 442 Week 2 Ia

...Risk Analysis Considerations for Huffman Trucking University of Phoenix CMGT442 1-8-2012 The purpose of a risk assessment is to help decision makers to become aware of threats that can negatively impact the business and to help them to make sound and informed decisions to limit the amount of risk the business is exposed to. Huffman trucking is embarking on the creation of a benefits election system for the tracking and reporting of employee benefits. Because of the sensitive nature of the information being dealt with, Huffman must take measures to limit the amount of exposure to risk the system will have. Often times companies overlook some factors of risk because they have limited vision with regards to potential liabilities or faults in their systems. A good and thorough risk assessment can identify previously unseen weaknesses as well as develop a better understanding of all the threats. There are some components that when in place can have a huge effect on the validity of a risk assessment. Hiring an outside firm with expertise in identifying threats and developing action plans can be costly but can also help to ensure any risk analysis is thorough. Also, companies with good data sources are in a better position to evaluate existing operations and assets. When putting together a risk assessment there are certain components that are crucial to getting the process completed thoroughly and appropriately. These steps include: Identifying Threats. Cataloging both......

Words: 751 - Pages: 4

Premium Essay

University of Phoenix - Cmgt 430 - Week 2 Individual

...Week 2 Individual Assignment University of Phoenix – CMGT 430 In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles....

Words: 1690 - Pages: 7

Free Essay

Cmgt/442 Week 2

...Huffman Trucking Service Request Huffman Trucking is in need of addressing possible security requirements as well as security risks within their Benefit Elections System. Throughout the report the security requirements and security risks for the Benefits Electronic System will be documented and addressed. A few of the risks that are involved with the Benefits Electronic System are errors that cannot be controlled, taking too much time to complete, not having a correct plan and most importantly support from the stakeholders. It is important that the Huffman Trucking current system is reviewed and documented so that risks can be documented as well as requirements. It is important that the stakeholders are updated throughout the entire project. Any of the systems that Huffman Trucking is unclear about needs to be documented and any security requirements need to documented and corrected before the analysis phase can be started. A few of the security requirements that might need to be documented are what resources will be used; any risk boundaries that are with the system and what data diagrams are being used. There also needs to be a backup plan in case the system is hacked into during the project process. Without some type of a backup plan there can be a lot of information stolen from within the system. When the Benefits Elections System starts the upgrade process it is important that a project manager is assigned to the project. The purpose of the project manager is to......

Words: 830 - Pages: 4

Premium Essay

Cmgt 410 Week 4 Individual Assignment

...Week 4 Individual Assignment Michael J. Beard Jr. CMGT/410 June 18, 2012 Beth Shoults Abstract To achieve success in implementing a project, it is essential to evaluate the project thoroughly. Project evaluation is a method to assure that every party involved within the project sticks with the objective until it is completed, and guarantee that precise expectations are met. Being Huffman Trucking’s evaluator, our company concentrates in certain aspects such as work authorization, project control, performance analysis, project cost, scheduling, and budgeting. Week 4 Individual Assignment As projects are completed, evaluations would still be ongoing bi-monthly in order to continuously and appropriately maintain the company’s new system. These bi-monthly evaluations are not done as a precautionary method or early detection but as well as keeping the operation smoothly running (Westat, 2002). Every department or section of Huffman Trucking along with its headquarters would undergo the evaluation process through a bottom to top system. Through this thorough evaluation, a company’s personnel liable for a certain issue would be recognized. For example, managers would be evaluated similarity for their roles and responsibilities just like regular employee would be for each and every employee has a specific tasks and responsibilities to accomplish. Project control is defined as a scheme to permit the company to design, arrange, make financial......

Words: 638 - Pages: 3