Premium Essay

Cmgt 442 Week 2 Individual

In: Computers and Technology

Submitted By pouncer100
Words 1192
Pages 5
Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this type of system are many. Who has access to the information and what information they have access to needs to be defined and quantified. The HR staff will need access to this type of information as they control and use this information. Since there is a trucking union involved, what access does the union representative need for their job? The risk with the union person somehow getting access to…...

Similar Documents

Premium Essay

Week 2 Individual Exercises

...Week 2 Individual Assignments from the Reading Chapter 8 3) What are the essential features of the allowance method of accounting for bad debts? The essential features of the allowance method of accounting for bad debts are: (1) Uncollectible accounts receivable are estimated and matched against revenues in the same accounting period in which the revenues occurred. (2) Estimated uncollectibles are debited to Bad Debts Expense and credited to Allowance for Doubtful Accounts through an adjusting entry at the end of each period. (3) Actual uncollectibles are debited to Allowance for Doubtful Accounts and credited to Accounts Receivable at the time the specific account is written off as uncollectible. 4) Lauren Anderson cannot understand why the cash realizable value does not decrease when an uncollectible account is written off under the allowance method. Clarify this point for Lauren. Lauren should realize that the decrease in cash realizable value occurs when estimated uncollectibles are recognized in an adjusting entry. The write-off of an uncollectible account reduces both accounts receivable and the allowance for doubtful accounts by the same amount. Thus, cash realizable value does not change. E8-5) Hachey Company has accounts receivable of $95,100 at March 31, 2007. An analysis of the accounts shows these amounts. Balance, March 31 Month of Sale 2007 2006 March $65,000 $75,000 February 12,600 8,000 December and January 10,100 2,400 November......

Words: 416 - Pages: 2

Free Essay

Cmgt 441 Week 2

...Information Security and Phone Users CMGT/441 Information Security and Phone Users Infosecurity magazine released an article today December 3, 2012 titled “Phone Users Worry About Security, but Won’t Pay for It. Information security is heavy on most people’s minds these days. The running risk of identity theft, hacking, and viruses leaves people feeling uneasy at times, but often they are also considering the risk to the information stored on or used with their cell phones. The people who are considering the information security with their cell phones are more often than not, unwilling to pay for it, and that is what that article addressed. The Statistics The article discusses a survey done of 1026 cell phone users in the UK (United Kingdom), most of them did express a concern about information security within their mobile device . Of those 1026 users, 38% (389.88 users) felt it would be the service providers fault if there was an information security breech. 32% (328.33 users) felt they would most likely blame themselves if their information was stolen, while 18% (184.68 users) would blame the cell phone manufacturer. When questioned further, a startling 68% of users were unwilling to pay for information security, and 24% were unwilling to pay more than £1 (about $1.30) per month to pay for added security, that is a total of 943.92 people. The Attitude This is interesting information, it is curious why people who are clearly concerned about the possibility of...

Words: 475 - Pages: 2

Premium Essay

Cmgt 410 Week 2 Individual

...and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand what social engineering is. This is where training comes into view. The military does not take training related to securing its information seriously enough. Most average users on the military network could not spot an email intentionally created with inaccurate details which would throw up a red flag to trained users. Kevin Mutnik in a presentation given to military leaders said it perfectly, “The military needs to take security training seriously. Anyone who’s currently serving in the military or works for the Department of Defense has probably gone through basic computer security education, often consisting of nothing more than a one......

Words: 1178 - Pages: 5

Premium Essay

Cmgt/554 Week 3 Individual

...to the specifications of ANSI/TIA/EIA-568A (1995). 1000BASE-T also supports 1000 Mbps operation over the newest emerging EIA/TIA cabling specifications Category 5e”. Individual sections of departmental networks such as Radiology use different standards such as 1000 BaseF. According to "1000basef Or 1000base-F" (n.d.), “1000BaseF, also known as 1000Base-F, is a 1000-Mbps baseband specification for Ethernet communications over optical fibers”. All patient data files are being encrypted for storage using AES (Advanced Encryption Standard) and require proper identification and authentication of any user wanting to access the data. The standard for all of the Radiology modalities is DICOM (Digital Imaging and Communication in Medicine) standard and PACS (Picture Archiving and Communication System). This is to keep within the compliance with the HIPAA (Health Insurance Portability and Accountability Act). The backbone network structure for the entire hospital is 1000 BaseT. According to "1000base-T Delivering Gigabit Intelligence" (n.d.), “1000BASE-T specifies Gigabit Ethernet operation over the Category 5 cabling systems installed according to the specifications of ANSI/TIA/EIA-568A (1995). 1000BASE-T also supports 1000 Mbps operation over the newest emerging EIA/TIA cabling specifications Category 5e”. Individual sections of departmental networks such as Radiology use different standards such as 1000 BaseF. According to "1000basef Or 1000base-F" (n.d.), “1000BaseF, also......

Words: 2259 - Pages: 10

Premium Essay

Cmgt/554 Week 3 Individual

...Patton-Fuller Community Hospital Networking Project Week 3 Individual Week 3 individual Week 3 Individual This paper will show an analysis of the Patton-Fuller Community Hospital network system. Based on the findings I will define what may be missing from the current network architecture. In addition I will identify the wireless technology in use, and how it enhances the hospital network. Looking at the Patton-Fuller Community Hospital intranet Web site it shows seven separate network diagrams. In these seven diagrams there are a Top View, logical, administrative, radiology, and radiology information system data center, information technology data center, and includes the ward floors, the operating room and the intensive care unit. In each section there is a complete detailed description of the network diagrams. Starting with the top view diagram representing the hospital structure from an Information Technology network perspective there are two segments of the network which are the clinical functions and the administrative functions. In the clinical areas include the emergency room and operating room, pharmacy, the labs, radiology, intensive care units, the doctor’s personal offices, and the wards. In the administrative areas are the information technology department, admitting and discharge, human resource, finance, the hospital senior management, and the facilities. The backbone network structure for the entire hospital is 1000 BaseT. According to......

Words: 2557 - Pages: 11

Premium Essay

Cmgt 445 Week 2 Dqs

...document of CMGT 445 Week 2 Discussion Questions shows the solutions to the following problems: DQ 1: Haddad and Ribi?re (2007) explore and expand upon the more formal use of Knowledge Management in the process of software acquisition. Analyze and discuss the use of the Software Acquisition Capability Maturity Model (SACMM) if you were the project manager responsible for a large software acquisition at your company. DQ 2: In what ways can changes in a business affect an application software development project? What are some of the tools a project manager can use to respond to changes that occur? DQ 3: Boehm and Bhuta, (2009) explore the risks associated with integrating an existing software component into a new application implementation project. Regarding the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project. DQ 4: From a project management perspective, at what point in an application implementation project timeline should the mainframe computer or server hardware be specified and/or acquired? Identify two or three considerations for making sure that the right hardware is available at the right time. General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1......

Words: 359 - Pages: 2

Premium Essay

Cmgt 410 Week 2 Individual

...from the same location. If this is not possible, transportation will need to be provided to and from the training. Additional time will also need to be schedule with the venue for setup prior to training, and tear down at the conclusion of the event. Training Training will begin with sign in at the registration tables. Registration tables should be divided into a minimum of 3 tables, equally split by first letter of attendees last name. Once a person has registered, they will be offered a light breakfast and beverages and then will be asked to make their way to their respective meeting location. Breaks will be provided every 90 minutes with a 1-hour lunch in the middle of training. At the end of the training class (end of day 2), all attendees will be asked to complete a short survey about the event. The questions will cover the material covered, the training venue, and the hotel accommodations....

Words: 536 - Pages: 3

Free Essay

Week 2 - Individual Problems

...Week 2 Individual Problems Chapter 1, E1-2 Prob. # | Answer | | 1. | A | | 3. | C | | 4. | C | | 7 | B | | 9 | D | | 10 | C | | Chapter 2, Question 12 What is a CAFR? What are its main components? The CAFR is short for Comprehensive Annual Financial Report. The CAFR reports the governments’ activities from the fund accounts and the government-wide financial statements. The Main components are the introduction section, financial section, and statistical section. Differentiating between a budget and a Comprehensive Annual Financial Report (CAFR). The CAFR is a combination of financial reports for the transactions of the government. What makes it different from a budget is the transactions are complete and show revenues that pay expenditures.A budget represents what cash the government wants to use for the year or financial period on specific projects. This means a plan of services and actions by the government to meet public needs and requirements. Budget changes happen when revenues do not equal project amounts.This information comes from the annual CAFR to meet each period’s budget. With the CAFR the public views the amount spent and the amount in reserve. So the budget is the plan, and the CAFR is the report of completion. The breakdown of the two is different also. The CAFR is an introductory describing the government, a financial section shows spending and revenues, and the statistical section with demographic and department statistics.The......

Words: 420 - Pages: 2

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cmgt-442-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 442 ENTIRE COURSE Information Systems Risk Management Week 2 Individual Assignment Service Request SR-HT-001 (Huffman Trucking Benefits Election System) Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman Trucking Company. Week 3 Individual Assignment Security Monitoring Prepare a 3- to 5-page paper describing the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified. Week 4 Individual Assignment Outsourcing Risks Prepare a 3- to 5-page paper that identifies the possible risks to an organization in each of the following outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a......

Words: 2578 - Pages: 11

Premium Essay

Cmgt 442 Entire Course

...CMGT 442 Entire Course http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ http://homeworkgallery.com/index.php/product/cmgt-442-entire-course/ CMGT 442 Week 1 DQ 1 DQ 1: Based on the Ledford article, what special issues must be considered for corporate data which is not fully digitized? What are the potential risks associated with the loss of this type of data? CMGT 442 Week 1 DQ 2 DQ 2: Based on the Barr article, what special issues must be addressed for a risk management strategy that supports Web-based systems? Why the risks are associated with disruption of these web-based systems critical and require diligent consideration? CMGT 442 Week 1 Summary For this first week’s weekly summary topic, please find and summarize an IS risk management related current event. You may reference any source (Newspaper, Magazine, e-article, etc.) but please be sure to cite your source based on APA standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member’s article summary. CMGT 442 Week 2 DQ 1 Based on the Keston (2008) article, how important is enterprise identity management for reducing risk throughout the enterprise? Explain why a viable risk management strategy must......

Words: 1299 - Pages: 6

Premium Essay

Cmgt 442 Week 2 Ia

...Risk Analysis Considerations for Huffman Trucking University of Phoenix CMGT442 1-8-2012 The purpose of a risk assessment is to help decision makers to become aware of threats that can negatively impact the business and to help them to make sound and informed decisions to limit the amount of risk the business is exposed to. Huffman trucking is embarking on the creation of a benefits election system for the tracking and reporting of employee benefits. Because of the sensitive nature of the information being dealt with, Huffman must take measures to limit the amount of exposure to risk the system will have. Often times companies overlook some factors of risk because they have limited vision with regards to potential liabilities or faults in their systems. A good and thorough risk assessment can identify previously unseen weaknesses as well as develop a better understanding of all the threats. There are some components that when in place can have a huge effect on the validity of a risk assessment. Hiring an outside firm with expertise in identifying threats and developing action plans can be costly but can also help to ensure any risk analysis is thorough. Also, companies with good data sources are in a better position to evaluate existing operations and assets. When putting together a risk assessment there are certain components that are crucial to getting the process completed thoroughly and appropriately. These steps include: Identifying Threats. Cataloging both......

Words: 751 - Pages: 4

Premium Essay

University of Phoenix - Cmgt 430 - Week 2 Individual

...Week 2 Individual Assignment University of Phoenix – CMGT 430 In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles....

Words: 1690 - Pages: 7

Free Essay

Cmgt/442 Week 2

...Huffman Trucking Service Request Huffman Trucking is in need of addressing possible security requirements as well as security risks within their Benefit Elections System. Throughout the report the security requirements and security risks for the Benefits Electronic System will be documented and addressed. A few of the risks that are involved with the Benefits Electronic System are errors that cannot be controlled, taking too much time to complete, not having a correct plan and most importantly support from the stakeholders. It is important that the Huffman Trucking current system is reviewed and documented so that risks can be documented as well as requirements. It is important that the stakeholders are updated throughout the entire project. Any of the systems that Huffman Trucking is unclear about needs to be documented and any security requirements need to documented and corrected before the analysis phase can be started. A few of the security requirements that might need to be documented are what resources will be used; any risk boundaries that are with the system and what data diagrams are being used. There also needs to be a backup plan in case the system is hacked into during the project process. Without some type of a backup plan there can be a lot of information stolen from within the system. When the Benefits Elections System starts the upgrade process it is important that a project manager is assigned to the project. The purpose of the project manager is to......

Words: 830 - Pages: 4

Premium Essay

Cmgt 410 Week 4 Individual Assignment

...Week 4 Individual Assignment Michael J. Beard Jr. CMGT/410 June 18, 2012 Beth Shoults Abstract To achieve success in implementing a project, it is essential to evaluate the project thoroughly. Project evaluation is a method to assure that every party involved within the project sticks with the objective until it is completed, and guarantee that precise expectations are met. Being Huffman Trucking’s evaluator, our company concentrates in certain aspects such as work authorization, project control, performance analysis, project cost, scheduling, and budgeting. Week 4 Individual Assignment As projects are completed, evaluations would still be ongoing bi-monthly in order to continuously and appropriately maintain the company’s new system. These bi-monthly evaluations are not done as a precautionary method or early detection but as well as keeping the operation smoothly running (Westat, 2002). Every department or section of Huffman Trucking along with its headquarters would undergo the evaluation process through a bottom to top system. Through this thorough evaluation, a company’s personnel liable for a certain issue would be recognized. For example, managers would be evaluated similarity for their roles and responsibilities just like regular employee would be for each and every employee has a specific tasks and responsibilities to accomplish. Project control is defined as a scheme to permit the company to design, arrange, make financial......

Words: 638 - Pages: 3

Premium Essay

Cmgt Week 2

...Project Task-list 7/1/2012 CMGT/410 Prof Lucas U.S. Immigration Customs Enforcement Stats Database The new database that is being developed and implemented into the U.S. Immigration Customs Enforcements offices will require some training and hands on practical application. This training is intended for each one of the shift supervisors from each one of the hubs around the U.S. and because of the short timeline of this project; the training will need to be conducted over two day span at one centralized location. In order to make something like this happen and for the Managers from each shift to get as must out of the training as they can this will take a lot of preplanning and a well-executed agenda that is backed by a long list of resources. Below is a list of the resources and their responsibilities to this project. * Project Management Team. * Determent the site for the training. * Ensure that there are adequate resources at this location; a training room to hold to amount of people that will be there and rooms for the managers to stay in. * Determine what local resources will need to be on site during the training like IT, HR, etc. * Disperse this information to each one of the HR departments at each ICE Hub. * Prepare a training schedule. * Get the training schedule approved by Head Quarters. * The HR Department: * Put together the list of shift supervisors. * Provide that list to; the Project......

Words: 445 - Pages: 2