Description
Option #1: Information Technology Analysis
You are the information technology senior analyst at your company. Your company can be a real business where you work or a virtual business that you would like to start. In both cases, you should be familiar with the business environment and the nature of work performed at your selected company. If you need help with selecting an appropriate company, please contact your instructor.
Your CEO meets with you and assigns you the following tasks, which you will assemble in a written report to the CEO:
- Review the companys infrastructure and identify of all types of vulnerabilities: environmental, physical, and human.
- Suggest and discuss security models that can be used to overcome the associated security risks.
- Design a robust security plan for the company.
- Design a code of ethics related to the IT profession that can be applied at the company.
Portfolio Milestones:
You will complete and receive points for two Portfolio Milestones that will help you complete your project. This work will inform your final project, but you will not re-submit this work with your final project. Here are the milestones:
Module 2: Describe the company you will be analyzing for the project. Include size, industry, and location. (25 Points)
Module 6: Provide an outline of the security models you will be presenting in your portfolio project. (25 Points)
Your well-written paper should meet the following requirements:
- Paper length: 8-10 pages
- Include at least five scholarly references in addition to the course textbook. The CSU Global Library is a good place to find these references.
- Format according to the CSU Global Writing Center (Links to an external site.).
Option #2: Digital Crime
In the broadest sense, a digital crime is any illegal activity that uses a computer during its commission. Computer crime encompasses a wide range of activities from fraud and financial crimes, cyber terrorism, cyber extortion, to even cyber warfare. Conduct research on 5 different types of digital crime and real-world examples of each. For each real-world example:
- Describe the crime that was committed.
- How was a computer used in the crime?
- Who were the victim(s) of the crime?
- What was the effect or outcome of the criminal act (on the system/victim)?
- How could the crime have been prevented?
- Were the perpetrators identified or caught?
- Was any action taken against the perpetrators, and if so, what?
Portfolio Milestones:
You will complete and receive points for two Portfolio Milestones that will help you complete your project. This work will inform your final project, but you will not re-submit this work with your final project.
Module 2: Provide an outline of the 5 types of cybercrime you will research. (25 Points)
Module 6: Provide the 5 real-world cases you will analyze for the portfolio project. (25 points)