The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.
At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.
The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.
Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.
Write 4–6 paragraphs responding to the following questions:
Suggestions for Responding Peer Posts
Click here to place an order for a similar paper and have exceptional work done by our team and get A+results
Click here to place an order for a similar paper and have exceptional work done by our team and get A+results
In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.
Classmmate Post:
###########
Technology Management
Discussion Board Five
Hi my name is #######. I am a new consultant recently hired to assess security measures that can be implemented into current business operations for a company that has offices in four different continents around the world. All four offices will communicate through a marketing information systems website as well as private networks. This site will be accessed by authorized personnel such as management and employees of each location.
Some potential security threats that can happen when conducting business abroad for example, damage to company data as a result of hackers, private information can be stolen and even identity theft. These examples could leave a bad image on a company. Sometimes a database can be compromised by personnel within the company. Employees with access to the network may gain access to security codes without permission and misuse personal information and even make alterations causing damage to the system.
In order to avert potential threats, this company can implement preventative measures such as employing practices to protect information of the company’s network and database. Network is achieved through using software and hardware (cico.com, n. d). As a result, it protects the reliability and integrity of the company data and network. There must be several layers of security put in place. When one is weak, another will be its back up (cico.com, n.d). To add maintain continuous protection, the software must be updated on a continuous basis. Components of network security include firewall, anti-spyware, anti-virus, intrusion prevention system and virtual private networks.
This company should train all employees on how to maintain a high security level when using the company database and avoid sharing private information. The company must also implement policies, security guidelines and what is to be expected in the employee code of conduct. Employees should change passwords every few months; and all passwords are to be kept private and secure at all times. Network administrators should report any suspicious behavior. This company should also consider backing company data in a separate location in the event information is tampered with or hacked that way there will be a recovery for lost or damage data.
References
What is network security? (n d) what is network security? Retrieved fromhttp://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/http://allacademia.com/http://writemyassignments.org/order
Click here to place an order for a similar paper and have exceptional work done by our team and get A+results
Click here to place an order for a similar paper and have exceptional work done by our team and get A+results