BSA 510 Competitive Success--tutorialrank.com

Views:
 
Category: Entertainment
     
 

Presentation Description

For more course tutorials visit www.tutorialrank.com Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is a work sample. You must demonstrate your understanding of IT governance and IT strategic vision by analyzing Amazon’s business strategy in relation to IT governance.

Comments

Presentation Transcript

slide 1:

BSA 510 Week 1 IT Plan Checklist For more course tutorials visit www.tutorialrank.com Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is a work sample. You must demonstrate your understanding of IT governance and IT strategic vision by analyzing Amazon’s business strategy in relation to IT governance. Search for a recent article on Amazon’s business strategy. Develop a 1- to 2-page checklist of the main points Amazon’s IT department should consider so IT is properly aligned to Amazon’s strategic business plan. Include relevant laws regulations and industry standards that would impact the business plan such as PCI standards and SOX regulations. Write a 1- to 2-page summary of the effectiveness of Amazon’s IT governance and how it executes it’s IT strategic vision as you understand it.

slide 2:

Format your citations according to APA guidelines. BSA 510 Week 2 IT Management Executive Brief For more course tutorials visit www.tutorialrank.com Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.

slide 3:

Write a 2- to 4-page executive brief that details the following: How the 2002 Sarbanes-Oxley Act has affected IT governance including the major provisions of the act and how this might affect IT and how IT might assist in compliance How IT policies standards and procedures can be used to determine if the enterprise is in compliance and support the IT strategy How Quality Management Systems QMS are important in assuring quality processes are in place How IT management and monitoring of controls can be used to asses IT performance

slide 4:

Format your document according to APA guidelines. BSA 510 Week 3 Key Performance Indicators For more course tutorials visit www.tutorialrank.com Assignment Content Consider the importance of Key Performance Indicators KPIs as an IT manager. The previous measurement period has concluded and you must prepare an update to the CIO on your IT team. Some KPIs are pre- determined. You must also recommend other KPIs for your team. Prepare a 14- to 16-slide media-rich or voice-over presentation. Include the following: Review the provided Key Performance Indicators KPIs. Add at least three additional KPIs.

slide 5:

Research IT performance tools for monitoring and evaluation of the KPIs. Include how each tool effectively meets assurance practices and IT performance. Discuss how KPIs can be tied to strategic vision and project planning. Format your citations according to APA guidelines. BSA 510 Week 4 Change Management Methodology Proposal For more course tutorials visit www.tutorialrank.com Imagine a gaming company has many computer systems but no formal methodology to make changes to these systems. As the IT Manager the CIO has asked you to draft a change management methodology proposal. Prepare a 4- to 6-page change management methodology proposal that details the steps that must be taken when a change is recommended for any system. Include the following:

slide 6:

IT governance committee you would put in place to review and prioritize changes based on business needs and objectives and the severity of the change A mock-up of the form the stakeholder fills out to request a system change a stakeholder would be an end-user manager or IT staff member The process used to evaluate system changes and Service Level Agreements SLAs including any effect on budgeting and resources such as time or people or the severity of the change The decision-making process used to determine whether internal staff or contractors should be used to complete a system change include IT sourcing and contracting recommended practices The importance of configuration management requirements and their impact on business processes or services The methods you would use for handling conflict and other problems such as failure to meet SLAs as they arise during a project The process you would use to evaluate the success of the system change Follow APA formatting requirements. BSA 510 Week 5 Risk Management And Mitigation Plan For more course tutorials visit

slide 7:

www.tutorialrank.com The CIO of your organization has asked you to create a 4- to 6-page risk management and mitigation plan for security vulnerabilities. Select five vulnerabilities and align associated risks to a risk management framework such as NIST SP 800-37. Include the following: Consider the potential vulnerabilities or threats facing the organization. Describe the risk each vulnerability or threat would have on the organization in terms of its people network data or reputation. Explain each risks impact on the organization. Provide defined mitigation for each vulnerability such as an incident response plan disaster recovery plan or business continuity plan. Give a defined reason why a vulnerability or threat would not be mitigated such as the use of a different risk control strategy if appropriate. Description Scenario: The Stevens Company is converting the SQL Server database to the Oracle database. Using the sample below create a 1- to 2-page Risk Information Sheet in Microsoft® Excel® for at least five risks that might be encountered during the conve...

slide 8:

Format your citations according to APA guidelines. BSA 510 Week 6 BC DR And BCP For more course tutorials visit www.tutorialrank.com Part 1: Prepare a Business Impact Analysis BIA for an information system such as a payroll system. Download the template “Business Impact Analysis BIA Template” from the ComputerSecurity Resource Center website. Read the template. Notice that text in italics is instructive and placeholder text.

slide 9:

Compete the Business Impact Analysis BIA Template. Part 2: Download the Information System Contingency Plan template from the Computer Security Resource Center website. Choose the low moderate or high template based on the impact value you identified in the Outage Impacts section of the BIA template for Part 1. Complete the template. Completing the appendices is not required but recommended. Submit your assignment.

authorStream Live Help