Skip to content
Home » Project 1 Company Overview

Project 1 Company Overview

Project 1 – Company Overview
Description
For this project, you will develop a company profile for a Fortune 500, publicly traded company which uses Information Technology to conduct it business operations. Fortune 500 companies almost always have a significant presence in cyberspace and therefore have a need to protect their information, information systems, and information infrastructures from threats and attacks which could originate from anywhere in the world.
You will use the same company for Projects #2, #3, and #4 so, it may be worth your time to review those project description files AND information about multiple companies before deciding which company you will focus on. Project #2 is an IT-focused Risk Assessment for your selected company. Project #3 is an IT-focused Risk Management Strategy for the company. Project #4 is a Privacy-focused Compliance Analysis.
A list of approved companies (those ranking 1-15 in the CY 2021 Fortune 500) appears at the end of this assignment description file (see Table 2). If you wish to use a company not on the approved list, you must first obtain the approval of your instructor. Alternate companies must be in the Fortune 500 and must be publicly traded on one or more of the US-based stock exchanges. The current Fortune 500 List is here: https://fortune.com/fortune500/
Research
1.       Chose a company from the table provided at the end of this assignment file. Locate its public website and review how the company presents itself to customers and the general public.
2.       Review the company’s Investor Relations website. Compare how it represents itself to investors and shareholders as compared to how it presents itself on its customer-facing website. The link to the Investor Relations website is provided in the table at the end of this file.
3.       Review Section 1 of the company’s Form 10-K Annual Report to Investors to learn about how the company presents itself to investors and shareholders. The link to the Form 10-K is provided in the table at the end of this assignment file.
Retrieve the Hoovers profile for your selected company. The base URL for Hoovers is http://ezproxy.umgc.edu/login?url=http://www.mergentonline.com/Hoovers You will need to login to the library using your UMGC SSO login credentials.
a.       Enter the company name in the Search bar at the top of the window and then click the search icon.

b.       Browse the company profile using the menu on the left.

4.       Read and analyze the Company Summary, Company Description, and Company History as presented in the Hoovers profile. Browse through additional sections in the profile to develop an understanding of the company, its products and services, and the geo-political environments in which it operates. Who are its customers? What does it sell (or how does it make money)? What laws and regulatory bodies is it subject to?
Analyze the Company’s Use of Information and IT
Note: You do not need to be precise or exacting in your analysis for this section. It will be sufficient that you identify general categories of information and IT that the company relies upon for its business operations.
1.       Review Chapter 2 in (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide. https://go.oreilly.com/umgc/https://learning.oreilly.com/library/view/isc-2-sscp-systems/9781119854982/
2.       Read the following sections in CIPM Certified Information Privacy Manager All-in-One Exam Guide: Appendix A. https://go.oreilly.com/umgc/https://learning.oreilly.com/library/view/cipm-certified-information/9781260474107/
a.       Factor Analysis of Information Risk
b.       Asset Identification
c.       Hardware Assets
d.       Subsystem & Software Assets
e.       Cloud-based Information Assets
f.        Virtual Assets
g.       Information Assets
h.       Asset Classification
i.         Data Classification
3.       Identify 3 or more additional sources of information about the company and how it uses information and Information Technologies to conduct its business operations. These sources can be news articles, articles in industry or trade journals, data breach reports, etc.
4.       Using your readings and research, develop an information usage profile for your company. Your goal is to identify categories of information that need to be protected against losses of confidentiality, integrity, and availability. Your profile should contain 10 (acceptable) – 15 (excellent) distinct categories of information. You may use the example table shown below or create one of your own design. Your profile should address the following:
a.       What types of information does this company collect, process, transmit, and store as part of its business operations?
b.       What types of Information Technologies does this company use to accomplish its business objectives? What types of information are required to operate these systems?
c.       Does this company use Operational Technologies (e.g., robots and control systems used in manufacturing or for other types of device controls)? What types of information are required for these systems?
d.       Summarize the company’s Information Use & Protection Requirements. What is the sensitivity level of the information? What would be the potential impacts of attacks causing loss of confidentiality, integrity, and/or availability both for single incidents and over time.
Table 1. Information Usage Profile (sample)

Interested in getting help with this assignment?
Get a professional writing team to work on your assignment!
Order Now
Recent postsFor this final assignment, you will prepare a brief paper detailing the steps undertaken to complete a presentation that disseminates information you assemble
Please choose to answer only one of the 2 following questions. Option 1: In your opinion and based on scientific, peer-reviewed published evidence, does child
At the beginning of the previous academic year, the institution announced it would drop football at the conclusion of the season. The announcement created pub
you will review current research in Personality and provide a critical evaluation of that personality research through an annotated bibliography. An annotated
In Module 5, we considered the third in our three-part series on research design. Specifically, the focus was on the longitudinal studies, in which the resear

About us
We are an online-writing service provider that works to provide high-quality writing to anybody who comes to us. We offer a wide variety of essays for sale to meet the needs of every client.Our services

TermPaper Writing
Essay Writing
Thesis and Dissertation
Online Exams
Weekly Assignments
Quick links

Home

Abut us

Our services

Contact us

Blog

We accept

Contact us
[email protected]

+123 456 7890

Launch livechat

Facebook

Twitter

Instagram

© Aquapapers.com. All rights reserved.

/* */
var DIVI = {“item_count”:”%d Item”,”items_count”:”%d Items”};
var et_builder_utils_params = {“condition”:{“diviTheme”:true,”extraTheme”:false},”scrollLocations”:[“app”,”top”],”builderScrollLocations”:{“desktop”:”app”,”tablet”:”app”,”phone”:”app”},”onloadScrollLocation”:”app”,”builderType”:”fe”};
var et_frontend_scripts = {“builderCssContainerPrefix”:”#et-boc”,”builderCssLayoutPrefix”:”#et-boc .et-l”};
var et_pb_custom = {“ajaxurl”:”https://generalessays.blog/wp-admin/admin-ajax.php”,”images_uri”:”https://generalessays.blog/wp-content/themes/Divi/images”,”builder_images_uri”:”https://generalessays.blog/wp-content/themes/Divi/includes/builder/images”,”et_frontend_nonce”:”1b23b9c6ee”,”subscription_failed”:”Please, check the fields below to make sure you entered the correct information.”,”et_ab_log_nonce”:”52503428f1″,”fill_message”:”Please, fill in the following fields:”,”contact_error_message”:”Please, fix the following errors:”,”invalid”:”Invalid email”,”captcha”:”Captcha”,”prev”:”Prev”,”previous”:”Previous”,”next”:”Next”,”wrong_captcha”:”You entered the wrong number in captcha.”,”wrong_checkbox”:”Checkbox”,”ignore_waypoints”:”no”,”is_divi_theme_used”:”1″,”widget_search_selector”:”.widget_search”,”ab_tests”:[],”is_ab_testing_active”:””,”page_id”:”8816″,”unique_test_id”:””,”ab_bounce_rate”:”5″,”is_cache_plugin_active”:”no”,”is_shortcode_tracking”:””,”tinymce_uri”:””,”waypoints_options”:[]};
var et_pb_box_shadow_elements = [];
/* */

Need help with a similar or different Task?

We have the best writers to help you. Hire Writer Now

ORDER NOW