Collaborate with your team on the components of a policy that will help manage the services provided by a vendor, including cloud services that deliver both applications and data storage.
Discuss a set of policies that can be used to control security provided by outside organizations. Use Ben’s graphics business as a focal point of the conversation.
Part 1:
Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company’s productivity.
Leveraging your Week Five Learning Team collaborative discussion, “Security Control Policies,” create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:
1. Potential issues related to wireless security
2. The advantages and disadvantages of cloud technologies
3. The risks and ways to reduce them
Part 2:
Compile all sections of the Information Security Policy presentation (I compiled them, except the part has you have to add when finished with part 1 of this assignment). This should include all parts of the policy from Weeks Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices. The total presentation should be 30 to 35 slides. (I included 26 slides already)
Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.
Note: All references need to adhere to APA citation guidelines.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more