Case Study (A) – Hefty Hardware

 

Case Study Project (A) Hefty Hardware – Be sure to address each question in the Case study, and explain your rationale thoroughly. Be sure you saved your file with your full name, and title of this project. Example: Jason Karp Case Studies A. Details: You will be given a case study to solve from the textbook. While your responses will vary, properly documenting your response from valid resources is a requirement. This assignment requires you to use proper citations and references from the textbook and alternate sources. Thoughtful opinions/research based on the literature, and from the textbook are necessary, so be sure to review the chapter prior to completing these activities. This task is like a research paper, so please take your time when preparing your responses. Separating each case study with a title and proper formatting is essential so that I can read and follow your paper. A one (1) page response is NOT – NOT going to earn you maximum points. The Case Study response will be submitted on the assigned due date from the past weeks (see submission due dates and rubric). The Dropbox will close after the due date and late submission will not be accepted. Case study projects are NOT posted on the discussion board, they are submitted as an assignment. 

Case study  text from text book :

  

MINI CASE

Delivering Business Value with IT at Hefty Hardware2

“IT is a pain in the neck,” groused cheryl O’Shea, VP of retail marketing, as she 

slipped into a seat at the table in the Hefty Hardware executive dining room, next to her colleagues. “It’s all technical mumbo-jumbo when they talk to you and I still don’t know if they have any idea about what we’re trying to accomplish with our Savvy Store program. I keep explaining that we have to improve the customer experience and that we need IT’s help to do this, but they keep talking about infrastructure and bandwidth and technical architecture, which is all their internal stuff and doesn’t relate to what we’re trying to do at all! They have so many processes and reviews that I’m not sure we’ll ever get this project off the ground unless we go outside the company.””You have got that right”, agreed Glen vogel, the COO. ” I really like my IT account manager, Jenny Henderson. She sits in on all our strategy meetings and seems to really understand our business, but that’s about as far as it goes. By the time we get a project going, my staff are all complaining that the IT people don’t even know some of our basic business functions, like how our warehouses operate. It takes so long to deliver any sort of technology to the field, and when it doesn’t work the way we want it to, they just shrug and tell us to add it to the list for the next release! Are we really getting value for all of the millions that we pour into IT?”

“Well, I don’t think it’s as bad as you both seem to believe,” added Michelle Wright, the CFO. “My EA sings the praises of the help desk and the new ERP system we put in last year. We can now close the books at month-end in 24 hours. Before that, it took days. And I’ve seen the benchmarking reports on our computer operations. We are in the top quartile for reliability and cost-effectiveness for all our hardware and systems. I don’t think we could get IT any cheaper outside the company.”

“You are talking ‘apples and oranges’ here,” said Glen. “On one hand, you’re saying that we’re getting good, cheap, reliable computer operations and value for the money we’re spending here. On the other hand, we don’t feel IT is contributing to creating new business value for Hefty. They’re really two different things.”

“Yes, they are,” agreed Cheryl. “I’d even agree with you that they do a pretty

good job of keeping our systems functioning and preventing viruses and things. At

least we’ve never lost any data like some of our competitors. But I don’t see how they’re contributing to executing our business strategy. And surely in this day and age with increased competition, new technologies coming out all over the place, and so many changes in our economy, we should be able to get them to help us be more flexible, not less, and deliver new products and services to our customers quickly!”

  

The conversation moved on then, but Glen was thoughtful as he walked back to his office after lunch. Truthfully, he only ever thought about IT when it affected him and his area. Like his other colleagues, he found most of his communication with the depart- ment, Jenny excepted, to be unintelligible, so he delegated it to his subordinates, unless it absolutely couldn’t be avoided. But Cheryl was right. IT was becoming increasingly important to how the company did its business. Although Hefty’s success was built on its excellent supply chain logistics and the assortment of products in its stores, IT played a huge role in this. And to implement Hefty’s new Savvy Store strategy, IT would be critical for ensuring that the products were there when a customer wanted them and that every store associate had the proper information to answer customers’ questions.

  

In Europe, he knew from his travels, IT was front and center in most cutting- edge retail stores. It provided extensive self-service to improve checkout; multichannel access to information inside stores to enable customers to browse an extended product base and better support sales associates assisting customers; and multimedia to engage customers with extended product knowledge. Part of Hefty’s new Savvy Store business strategy was to copy some of these initiatives, hoping to become the first retailer in North America to completely integrate multimedia and digital information into each of its 1,000 stores. They’d spent months at the executive committee meetings working out this new strategic thrust—using information and multimedia to improve the customer experience in a variety of ways and to make it consistent in each of their stores. Now, they had to figure out exactly how to execute it, and IT was a key player. The question in Glen’s mind now was how could the business and IT work together to deliver on this vision, when IT was essentially operating in its own technical world, which bore very little relationship to the world of business?

  

Entering his office, with its panoramic view of the downtown core, Glen had an idea. “Hefty’s stores operate in a different world than we do at our head office. Wouldn’t it be great to take some of our best IT folks out on the road so they could see what it’s really like in the field? What seems like a good idea here at corporate doesn’t always work out there, and we need to balance our corporate needs with those of our store operations.” He remembered going to one of Hefty’s smaller stores in Moose River and seeing how its managers had circumvented the company’s stringent security protocols by writing their passwords on Post-it notes stuck to the store’s only computer terminal.

So, on his next trip to the field he decided he would take Jenny, along with Cheryl and the Marketing IT Relationship Manager, Paul Gutierez, and maybe even invite the CIO, Farzad Mohammed, and a couple of the IT architects. “It would be good for them to see what’s actually happening in the stores,” he reasoned. “Maybe once they do, it will help them understand what we’re trying to accomplish.”

A few days later, Glen’s e-mailed invitation had Farzad in a quandary. “He wants to take me and some of my top people—including you—on the road two weeks from now,” he complained to his chief architect, Sergei Grozny. “Maybe I could spare Jenny to go, since she’s Glen’s main contact, but we’re up to our wazoos in alligators trying to put together our strategic IT architecture so we can support their Savvy Stores initiative and half a dozen more ‘top priority’ projects. We’re supposed to present our IT strategy to the steering committee in three weeks!”

  

“And I need Paul to work with the architecture team over the next couple of weeks to review our plans and then to work with the master data team to help them outline their information strategy,” said Sergei. “If we don’t have the infrastructure and

  

integrated information in place there aren’t going to be any ‘Savvy Stores’! You can’t send Paul and my core architects off on some boondoggle for a whole week! They’ve all seen a Hefty store. It’s not like they’re going to see anything different.”

“You’re right,” agreed Farzad. “Glen’s just going to have to understand that I can’t send five of our top people into the field right now. Maybe in six months after we’ve finished this planning and budget cycle. We’ve got too much work to do now. I’ll send Jenny and maybe that new intern, Joyce Li, who we’re thinking of hiring. She could use some exposure to the business, and she’s not working on anything critical. I’ll e-mail Jenny and get her to set it up with Glen. She’s so great with these business guys. I don’t know how she does it, but she seems to really get them onside.”

Three hours later, Jenny Henderson arrived back from a refreshing noontime

XPSLPVU UP GJOE ‘BS[BE’T SFRVFTU JO IFS QSJPSJUZ JO-CPY. i0I #*!#*!!u TIF TXPSF. 4IF

had a more finely nuanced understanding of the politics involved in this situation, and she was standing on a land mine for sure. Her business contacts had all known about the invitation, and she knew it was more than a simple request. However, Farzad, hav- ing been with the company for only eighteen months, might not recognize the olive branch that it represented, nor the problems that it would cause if he turned down the trip or if he sent a very junior staff member in his place. “I have to speak with him about this before I do anything,” she concluded, reaching for her jacket.

But just as she swiveled around to go see Farzad, Paul Gutierez appeared in her doorway, looking furious. “Got a moment?” he asked and, not waiting for her answer, plunked himself down in her visitor’s chair. Jenny could almost see the steam coming out of his ears, and his face was beet red. Paul was a great colleague, so mentally put- ting the “pause” button on her own problems, Jenny replied, “Sure, what’s up?”

“Well, I just got back from the new technology meeting between marketing and our R&D guys, and it was just terrible!” he moaned. I’ve been trying to get Cheryl and her group to consider doing some experimentation with cell phone promotions—you know, using that new Japanese bar coding system. There are a million things you can do with mobile these days. So, she asked me to set up a demonstration of the technol- ogy and to have the R&D guys explain what it might do. At first, everyone was really excited. They’d read about these things in magazines and wanted to know more. But our guys kept droning on about 3G and 4G technology and different types of connec- tivity and security and how the data move around and how we have to model and architect everything so it all fits together. They had the business guys so confused we never actually got talking about how the technology might be used for marketing and whether it was a good business idea. After about half an hour, everyone just tuned out.  I tried to bring it back to the applications we could develop if we just invested a little in the mobile connectivity infrastructure, but by then we were dead in the water. They wouldn’t fund the project because they couldn’t see why customers would want to use mobile in our stores when we had perfectly good cash registers and in-store kiosks!”

“I despair!” he said dramatically. “And you know what’s going to happen don’t you? In a year or so, when everyone else has got mobile apps, they’re going to want us to do something for them yesterday, and we’re going to have to throw some sort of stopgap technology in place to deal with it, and everyone’s going to be complaining that IT isn’t helping the business with what it needs!”

Jenny was sympathetic. “Been there, done that, and got the T-shirt,” she laughed wryly. “These tech guys are so brilliant, but they can’t ever seem to connect what they   

know to what the business thinks it needs. Sometimes, they’re too farsighted and need to just paint the next couple of steps of what could be done, not the ‘flying around in jetpacks vision.’ And sometimes I think they truly don’t understand why the business can’t see how these bits and bytes they’re talking about translate into something that it can use to make money.” She looked at her watch, and Paul got the hint. He stood up. “Thanks for letting me vent,” he said. “You’re a good listener.”

“I hope Farzad is,” she thought grimly as she headed down the hall. “Or he’s going to be out of here by Thanksgiving.” It was a sad truth that CIOs seemed to turn over every two years or so at Hefty. It was almost predictable. A new CEO would come in, and the next thing you knew the CIO would be history. Or the user satisfaction rate would plummet, or there would be a major application crash, or the executives would complain about how much IT cost, or there would be an expensive new system failure. Whatever it was, IT would always get blamed, and the CIO would be gone. “We have some world-class people in IT,” she thought, “but everywhere we go in the business, we get a bad rap. And it’s not always our fault.”

She remembered the recent CIM project to produce a single customer database for all of Hefty’s divisions: hardware, clothing, sporting goods, and credit. It had seemed to be a straightforward project with lots of ROI, but the infighting between the client divisions had dragged the project (and the costs) out. No one could agree about whose version of the truth they should use, and the divisions had assigned their most junior people to it and insisted on numerous exceptions, workarounds, and enhancements, all of which had rendered the original business case useless. On top of that, the company had undergone a major restructuring in the middle of it, and a lot of the major play- ers had changed. “It would be a lot easier for us in IT if the business would get its act together about what it wants from IT,” she thought. But just as quickly, she recognized that this was probably an unrealistic goal. A more practical one would be to find ways for business and IT to work collaboratively at all levels. “We each hold pieces of the future picture of the business,” she mused. “We need to figure out a better way to put them together than simply trying to force them to fit.”

Knocking on Farzad’s door, she peeked into the window beside it. He seemed lost in thought but smiled when he saw her. “Jenny!” he exclaimed. “I was just think- ing about you and the e-mail I sent you. Have you done anything about it yet?” When she shook her head, he gave a sigh of relief. “I was just rethinking my decision about this trip, and I’d like your advice.” Jenny gave her own mental sigh and stepped into the office. “I think we have a problem with the business and we need to fix it—fast,” she said. “I’ve got some ideas, and what to do about the trip is just part of them. Can we talk?” Farzad nodded encouragingly and invited her to sit down. “I agree with you, and I’d like to hear what you have to say. We need to do things differently around here, and I think with your help we can. What did you have in mind?”

Discussion Questions

1. Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.

2. Create a plan for how IT and the business can work collaboratively to deliver the Savvy Store program successfully.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Scenario

 

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
  • Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
  • What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms, explain laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3S week 2 assignment DF

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 350 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

include references.

No Copy paste Strictly. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PMGT 540

 

Create a Microsoft Project file (.mpp) and build out the Project Plan:

Before you import your WBS from the prior assignment into MS Project,  you must set up your Microsoft Project Options (this information is covered in Chapter 2 of the Ambriz textbook): 

  1. From the File tab (which takes you to the Backstage), select “Options” and then “Schedule” – verify that the settings on that tab are correct for your project and work environment. Change the scheduling options so that all tasks are Auto Scheduled and that the default Task Type is set to either Fixed Duration or Fixed Work. You want to use the dynamic scheduling capabilities of MS Project. Select whether or not you want to schedule the project from the start date or the end date (regulatory requirements and events that have non-negotiable deadlines should be scheduled from the Project End Date). 
  2. Create a calendar for your project or make necessary modifications to the Standard calendar to include any revised schedule days, holidays or non-working days. 
  3. From the Project Tab, select Project Information and set the Start Date of your project. This can be the actual start date of your project or you can select a fictitious start date if you don’t know exactly when the project is going to start. Select the appropriate Calendar for your project based on step 2. 
  4. On the File tab in the Backstage view, click on Info. From the right side of the window, select Project Information, Advanced Properties. On the Summary tab, enter the Title of your project, your name and a brief description in the Comments box. Your project name will now appear in the project plan as your Zero Task / Project Summary Task.

Using the Work Breakdown Structure that your created in the last assignment, enter your Summary Tasks and Detail Tasks into Microsoft Project. During this exercise, you may identify additional tasks that you didn’t initially think of or you may decide to move things around a bit. That is perfectly acceptable and common when you start building the schedule. It is a living, breathing document and does change throughout the course of planning. Use the Indent Task/Outdent Task buttons on the Task tab to create the hierarchy of your WBS. If you want to turn on the WBS numbering scheme, right-click the column to the right of where you want that column to appear, select Insert Column and select WBS from the list of available columns. Chapter 3 of the Ambriz book includes a lot of detailed information about entering tasks into Microsoft Project. 

STEPS: 

  1. Estimation:  

Once you have thoroughly decomposed the project’s WBS by breaking larger tasks into smaller, manageable tasks you can continue to the next step which is estimation.

Using one of the techniques presented in the reference material (your textbooks or the videos), estimate the effort required to complete each task. Determine for each task what the duration and work effort is. Pages 175 – 187 in Ambriz discuss the differences and the relationship between duration and work. If you need to display the Work column in Microsoft Project, right-click the Duration column, select Insert Column and select Work from the list of available columns. Enter your estimates into your Microsoft Project schedule. Remember, don’t assign estimates to Summary tasks, the time necessary to complete the Summary task is based on the estimates of the Detail tasks that roll up to the Summary task. 

  1. Dependencies:  

Create appropriate dependencies between your tasks. What tasks control other tasks?

Use the Link button on the Task tab (or the predecessor and successor columns) to create dependencies between tasks. Double click the arrow between the tasks to change the dependency type. You should be attempting to use a mixture of the dependency options offered in the software including: Finish to Start (FS), Start to Start (SS), Finish to Finish (FF), and Start to Finish (SF). Add Lag or Lead ( Negative Lag) time where appropriate. 

Try to avoid adding constraints to tasks. Instead add deadline reminders where necessary. Tasks should have a “Start As Soon As Possible” constraint (default constraint) in order for the software to show the project team the impact of changes to the plan. 

Chapters 5 and 6 of the Ambriz book includes a lot of information on linking tasks in Microsoft Project. 

  1. Resources:   

Build out the project Resource Sheet and assign all resources to tasks. 

Add resources to your project using the resources sheet. Please define all type of resources including Work, Material and Cost. At a minimum, complete the following fields for each human resource: Resource Name, Type, Initials, Max, Std. Rate, Base (Calendar). You can choose to use role names or birth names. For other resource types, complete Cost/Use. Once the resources have been added to the project file, assign those resources to the tasks that you defined in the project schedule. Multiple resources can be assigned to the same task if appropriate but first consider if the task should be broken down into smaller tasks and assigned to individual resources. Resources should not be assigned to Summary level tasksChapters 7 and 8 of the Ambriz book include step-by-step instructions for completing these tasks. 

Once resources have been assigned to all Detail tasks you may find that some resources have been identified by the software as over-allocated. There is a red icon in the Indicator Column and in the Resource Sheet view the resource is red. Before the plan can be optimized and baselined, it will be necessary for you to address these over-allocations by having the software fix the over-allocations (Resource Leveling feature) or by manually adjusting the plan to alleviate the over-allocations (Resource Usage view). 

  1. Optimize and Baseline the Project Plan: 

a. When you are satisfied that over-allocated resources have been eliminated, you can then begin to review the plan and analyze it for any areas where changes can be made that will optimize the schedule for time and cost.

Using schedule optimization strategies, decide which steps you want to take to attempt to shorten your project finish date and decrease project costs. Update your Microsoft Project Schedule accordingly. Through this process you may create new over-allocated resources. If you do, address those over-allocations. Chapter 9 of the Ambriz book includes step-by-step instructions for optimizing your project schedule. 

  1. Baseline the Project Plan:  

When you are satisfied that you have done your best to create the most efficient plan possible, save the baseline for the project plan so that you have a point in time to measure progress against. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study 6.1 Shr

Case Study 6.1

Due: Sunday, End of Module by 11:55 p.m. EST

Read Mini Case 10 Trimming Fat at Whole Foods Market and answer the questions following the case study in a three  page paper excluding title and reference pages, 

QUESTIONS

1. Why were Whole Foods successful initially? Why has it lost its competitive advantage and is underperforming its competitors?

2. What value driver are Whole Foods using to remain differentiated in the face of competitors selling organic foods?

3. Given Whole Foods, strategic initiatives to reduce its cost structure, does the firm risk being “stuck in the middle”? Why or why not?

4. What other strategic initiatives should/could Whole Foods launch to more successfully drive its business strategy?

Additional resources:
Business Insider: Whole Foods Is Making 6 Changes to Improve Business:

http://www.businessinsider.com/whole-foods-turnaround-strategy-2014-9 ;

SmartBlog: How Whole Foods Market uses social media to keep  its marketing fresh:

http://smartblogs.com/social-media/2011/07/25/how-whole-foods-markets-uses-social-media-to-keep-its-marketing-fresh/

Writing Requirements

  • 3 pages in length  (excluding the cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3 Discussions – 1 Problem Set – 1 Research Paper.

Need help Please..!

Discussions – 3

Problem Set – 1

Research Paper – 1

Required Details Attached.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer D2

 This assignment has as main purpose to give you the understanding of what an algorithm means, and a real life application can be built by providing the right instructions. Here you have the opportunity to create an algorithm that performs one of your daily tasks. You will think of what actions you are taking to fulfill that particular task, and you should create the steps that a “clone” of you should take to perform the task like you do.  

Instruction:

 

Imagine that you want to create a robot that does what you do daily. Choose a simple task, such as your preparation to go to bed at night, the morning routine, brushing teeth, walking your dog, etc. Create an algorithm to describe the prime steps to complete the task that would guide the robot to fulfill the job. 

  1. Consider a task that can be modeled through a reasonable number of steps, which is at your choice.
  2. The algorithm should include decision items when the normal conditions of executing the task are not met. For example, if you model the routine of brushing your teeth, state what happens if you run out of toothpaste, if the water is cold, and so on.
  3. Consider including repetition items. For example, while brushing teeth, you brush ten times on each side of the mouth – you can model the repetition with a loop that counts the number of brush strokes.
  4. Include at least one decision and one loop in the algorithm

To create an algorithm, you may draw a structured flowchart or write pseudocode that describes all the steps in a Word document. If you choose to draw a flowchart, you may use a web tool, draw.io (Links to an external site.), with which you can easily create a flowchart and export it as a PDF document. Here is an example structured flowchart [PDF] for your reference.

 

Your initial response should include the following: 

  • An attachment – Attach the algorithm (.pdf, .docx, or .doc) to the post.
  • A description of the task – Type directly in the body of your post a description of the task and your considerations related to the process of creating the algorithm.
  • A conclusion – Include a conclusion in the body of your post. Based on the effort made to describe one task from your daily activity, write a statement that evaluates the effort of writing an algorithm that would guide a robot executing all the routine activities that you do daily.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Prepare a plan for digital evidence cases involving divorces

A law firm has hired you to assist with digital evidence cases involving divorces. The main evidence consists of email, spreadsheets, and documents. Before hiring you, the firm used an outside group to conduct investigations. You have to decide what equipment and software to purchase. Prepare a plan for the software, equipment, and tools you would need.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hardening the Firewall

 

In this assignment, students will demonstrate methods and techniques of adjudicating systems configured in a manner consistent with general practice.

Research methods for hardening PFSense.

Using the virtualized PFSense system created in Topic 3, harden the PFSense system using Snort.

  1. Start the Snort service.
  2. Update Snort and download the latest community rules.
  3. Ensure that you have configured Snort to detect port scans.

Using the Kali VM from Topic 3, run another port scan.

Using screenshots of the results, explain if Snort detected the port scan.

Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:

  1. Explain what hardening is, what Snort does, and why it is being used in this scenario.
  2. Explain any other methods by which PFSense can be hardened.
  3. Include at least five screenshots.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now