Ism 491a Capstone Project

Improved Essays
This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date. It will also cover …show more content…
I worked with the IT department and came up with all the components (hardware and software) that are currently being utilized. I also researched the vendor they are using that supplies the customer information to them and how that information is transmitted and how it is stored in their servers and database.
The second phase was focused on the encryption method that would work with the business environment. I found four different approaches to solve the solution to their issue and determined how each would fit within the environment and the cost involved with implementing that methodology. Each one is outlined in a PowerPoint slide to easily show how they can benefit the company in one way or another. After analyzing the solutions I provided my recommendations for each method to help the company decide on which option to implement.
I have been working on completing the final documentation as I am working on the whole project. I am approximately 75% completed on those tasks and will have those finished before the final due dates. I have included the project timeline below with percentages for each task and the tasks that have been completed up to this

Related Documents

  • Decent Essays

    The project is scheduled to finish in 21 months starting from August 2015. The project is divided into three categories. 1. Civil Works: -Civil Works comprise all major civil works of the project like construction of the dams for reservoir, power house, and buildings for staffs, tailrace, penstock, testing and commissioning of all hydraulic steelworks including all gates, trash racks and trash rack cleaners. 2.…

    • 200 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 5

    • 1218 Words
    • 5 Pages

    2. What are everyone’s perceived short and long term project deliverables? 3. What…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    I’m writing to you in response to your vacancy for the position of IT Security Specialist. I think that you’ll find that I am uniquely qualified with a broad set of skills. In 2014, I joined Renaissance RX as a help desk technician, but my eagerness to learn pushed me into several projects alongside security engineers where I helped to evaluate Palo Alto firewalls, Carbon Black whitelisting, and Dell encryption. I was also assigned to a project to deploy BMC Footprints Asset Core within our environment.…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Sc300 Unit 3 Assignment

    • 1018 Words
    • 5 Pages

    Klima 08/16/2015 SC4 Encrypted security system for users will be developed R. Klima 08/16/2015 SC5 Infrastructure required for the software system which consists of a database server, application server and web server R. Klima 08/16/2015 SC6 The system will only be developed in the English language R. Klima 08/16/2015 SC7…

    • 1018 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    HCA 498: Assignment

    • 398 Words
    • 2 Pages

    Jessica Davis 02/12/2017 HCA 498 Assignment 5 1. In my development of the intervention plan I would first ask my stakeholders what they will like to know about the plan before we start. The intervention effect evaluation deserves the same degree of attention during program planning as does development of the program. All too often, it is only after the goals and objectives are finalized, the program is up and running the attention is focused on developing the evaluation (Issel, 2014).…

    • 398 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Appreciate the unstructured problematical situation 2. Understand the worldviews of the key stakeholders 3. Create root definitions of relevant systems 4. Make and test conceptual models based upon worldviews 5. Compare conceptual models with reality 6.…

    • 1538 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hr Audit Paper

    • 1056 Words
    • 5 Pages

    HR Audit Strategic Management of Human Capital Jasmine Flores [Date Submitted] HR Audit Introduction Any organization faces an essential requirement to follow a certain number of rules, regulations, practices and other detailed procedures for staying on the path of success. For an organization to be successful, some of the most significant aspects which can assist it in relation to this include different instances of HR metrics. By following and monitoring significant HR metrics, a company can deal with issues effectively and raise the standards of its operations and outcomes in an informed manner.…

    • 1056 Words
    • 5 Pages
    Improved Essays