Briargrove Project Case Study

Improved Essays
Briargrove Project: Resolving Risk With offices open throughout the world, Briargrove Investments has hired Torres Technology Adapters to design, build, and integrate a Centralized Learning Network (CLN) for its two thousand property employees, who specialize in property management and acquisitions. Initially software risks identified during planning process posed no problems during the installation at the associate level however, a system failure notice has been occurring when rolling out the new system for management personnel. “Data collection was achieved through the use of structured questionnaire and historical data for assistance in estimating the quality of software thoroughly determine risks that were common.” (Elzamly, A., & Hussin, B. 2014). However, this conflict is causing an impact not only on Briargrove Investments daily operations but also with the complete integration of the CLN. The project team’s crucial task is to immediately find, address, and repair the failure in the following areas to resolve the failure: …show more content…
While there are many methods to reduce risk, the CLN project team failed to identify the need of a having software legal expert team member, who would have been able to give input during the planning phase about the protection requirements in information security for the Briargrove Investment organization. In addition, the questionnaires used to gather information did not address the requirement of foreign law and protections assigned to information security for both clients and customers. Questionnaires developed for this project needed to address not only associate, administration, education, managerial and corporate needs but also information security. Other areas of concern identified were developing

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    (TCO D) A firm hosts data-mining servers and performs data mining for other companies that do not desire the costs of hardware, software, or expertise to data mine their data. The firm is planning to roll out faster data-mining software that will reduce the time to sift through customers' data by a fraction of the present time. Part 1: List and discuss the major risk-management functions from a project-management perspective for the data-mining software project. (15 points)…

    • 961 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Brison Case Study

    • 117 Words
    • 1 Pages

    Hi Brison, Thank you for your kind assistance, and also for all your updates! For the financials, we manage a local and regional financials, please see the attached files and let us know if you think those contain the enough information or if the landlord needs to look our regional financials. We also request that the landlord signed a Confidentiality and Nondisclosure Agreement before you send to him the financials.…

    • 117 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Hey Evan, I called and left you message. I’m want to schedule a time when we can have phone conference, so we can discuss the issues Briney Foret have been having. This way once I have a better understanding of the issue we can being looking into possible external issues outside of Pro Law that could be the cause.…

    • 59 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Just want to give an heads-up that Bryok’s extension was done till September 30,2017(both CIF extension as well as extension letter signed with them). We used around $12K of $50K extension so far and we may use $2 to $3K for POC. As we may need their help during negotiation and contract preparation, we can extend the date using the remaining money. Please let me know if you would like to proceed with paperwork and how long the extension could be.…

    • 81 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Data Breaches In Research

    • 1346 Words
    • 6 Pages

    Types of data breaches Safeguarding and securing information is an important aspect of business that allows for preventing and minimizing risks. With data breach or incidents in which information is compromised, both businesses and consumers are greatly impacted, due to adverse consequences that may follow. The globalization of today’s economy is dependent upon electronic access via the internet, email, and “other components of “cyberspace,” including the global consumer credit card payment networks. Different types of informational or data breaches that significantly affect business functions involve compromise of financial data, customer’s private information, and business proprietary data. Data breaches totaled 1,540 worldwide in 2014…

    • 1346 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Physical Security

    • 1193 Words
    • 5 Pages

    Companies have witnessed robbery attack, terrorist attack, shooting rampage by disgruntled employees or students in an institution of learning. It was also vividly mentioned in this chapter that if any security measures such as closed-circuit TV (CCTV) surveillance, security guards, intrusion detection systems (IDSs) failed, then of course the fault is from a human being considered as the weakest link in information security. This chapter also noted that people did not embrace physical security the…

    • 1193 Words
    • 5 Pages
    Superior Essays