All Questions
- Based on the facts presented in the case, how far had Fetcher-Allen progressed in identifying and mitigating their Y2K bug risks by June, 1998? (Explain your reasoning supported by specific evidence from the case study.)
- How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999? (Explain your reasoning.)
- At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.” What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?
Post your answers to the questions as a PDF document to Canvas following the instructions in the syllabus . Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question Do not prepare a separate cover page, instead put your name, the class section number (e.g. MIS5206.001 or MIS5206.701), and the case name in the top-left corner of the header. Add page numbers in the footer of the document. Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case3-YourName.pdf
In The News
Wrap Up
Unit #6 – All Questions
- What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?
- For an organization choosing among Denver Colorado, Miami Florida, Redlands California and Tulsa Oklahoma, from a physical security perspective – where would be the best place to locate their data center? Why is this place better and the other places worse?
- A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?
Unit #6 – Question 1
What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?
Use this link for the reference to Physical Security Bridge to IT Security PHYSBITS
Unit #6 – Question 2
For an organization choosing among Denver Colorado, Miami Florida, Redlands California and Tulsa Oklahoma, from a physical security perspective – where would be the best place to locate their data center? Why is this place better and the other places worse?
Unit #6 – Question 3
A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?