Please use the attached template to fill in.   For this activity, you will establish the fictional company, executives, and team members that you will

Please use the attached template to fill in.

 

For this activity, you will establish the fictional company, executives, and team members that you will refer to.

Respond to each of the following:

  1. What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
  2. In 1-2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
  3. Finally, choose one of the following roles on the team (cybersecurity).
  1. Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name (John Smith) where it belongs; the other roles can have fictional names assigned to them.
    • Cybersecurity Specialist:
    • Networking Specialist:
    • Data Management Specialist:
    • IT Project Manager (Assistant to the Project Manager):
    • Software Development Team Lead:

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can