I’m currently pursuing MBA program, and also I’m working as

I’m currently pursuing MBA program, and also I’m working as a “QA Automation Engineer” in Information Technology (IT). 

Question: Please provide a brief explanation of how the position for which you are applying for CPT approval directly relates to your program of study.Please be sure to write clearly and legibly!

              MBA Subject’s

                        * Managerial Economics 

                        * Managerial Accounting 

NOTE: Please write the answer related to my current MBA program. 

Please use below reference.

****Example*********Example*********Example*********Example*********Example*********Example**

The Operations Security course concepts directly relates to my job responsibilities. The main focus of this course is about the Information Security Policies and about the IT Security Framework. I got my major focus of work experience with Incident Response Policies and Report.

The concept of IT Security Policy Framework was introduced to me for the first time. So I got to study my company Policies. The topics like Data Management and Risk Assessment in IT domain are implemented by me on day to day basis. Risk assessment is considered to be the most important topic for this course. Here We prioritise the risk factor and work according to the level of priority. I worked on Cassandra tool for designing data modelling. This database is used for performance tuning and making schematic for cassandra architecture. Data Policies must be taken into consideration while working on Cassandra database.

Introduction of concepts with Incident Response Policies helped me to join my company Incident response team. I was one of the key person in that project. I directly applied the theory concepts to the project. Acted as the SME(Subject Matter Expert) with the current trend. Here I worked with the current updation of the policies with the latest technology. Some of the Policies that I worked are with the PII and security Incident Report. PII (personal identifiable information) has to be more secured and the data should be accessible for limited people based on the level of hierarchy. I proposed some modifications in Physical Security Incidents with the Initial Reporting System and Investigation.

             I got a chance to work with the recent Burglary Incident that occured in my company. My role is to identify the damage of the equipment and provide estimated reports. Work on the Potential level of data risk for the damage. I prioritise the risk as high,medium and low level of it. Here in that incident some of the company mobiles and laptops are stolen, in which some devices can be logged in without passwords. These electronic equipment have PII and company information. We immediately informed to some of our vendors and customers about this incident and alerted not to respond to any spam calls. About the company confidential information, we try to change all the security passwords of the devices. As we don’t have tracking with the devices, we made a new policy to mandatories the tracking system in all equipment. Advanced GPS tracker was proposed in all devices, that will track devices even they are switched off. Our Security cameras are unable to capture the clear video files during night time. We proposed for night vision cameras. 

I personally feel this course enhanced my perspective regarding problem solving skills in IT Security Policies. After this course I am able to handle the challenges and policies that are my project. I was able to design,organize, implement and maintain IT Security Policy Framework. The experience in working with Incident Response team helped me to shape my career to new phase. Overall this course bought new phase in dealing my work towards  current Information Security Policies.

****Example*********Example*********Example*********Example*********Example*********Example*****

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Please create a Power Point of between 5-10 ppt. slides

 Please create a Power Point of between 5-10 ppt. slides on The 4 types of probability sampling what each mean and what they are used for etc…  The format must be ppt. or pptx. but NOT pdf.   Given the above, please use slightly bigger font size so your audience

This week we also discuss the concepts in chapter seven,

This week we also discuss the concepts in chapter seven, which deals with the basic concepts and algorithms of cluster analysis.  After reading chapter seven answer the following questions: What is K-means from a basic standpoint? What are the various types of clusters and why is the distinction important? What

Your reply is for a discussion post. Please use APA

  Your reply is for a discussion post.  Please use APA 7th Edition. Minimum 400 words with 2 scholarly references (Within 5 years).  Also include 2 replies to the same discussion post you are providing with references. (So, essentially you are replying to your own reply) Please only original work that

For this journal entry, answer the following questions: 1. How

  For this journal entry, answer the following questions: 1. How much did you know about communication in a business context before you began this course? 2. What did you learn about your own communication style? 3. What do you find most challenging about communicating in a business context?  4.

Read the article and answer the following questions: 1. Briefly

Read the article and answer the following questions: 1. Briefly explain 1 economic idea or concept you learned about in class and how they relate to the article.  2. How does the bolded section relate to the AS-AD model and monetary policy? Briefly explain the bolded sentence in terms of

video link at the bottom 250-300 words Harvest of Shame

video link at the bottom 250-300 words Harvest of Shame is the story of migratory farmworkers following the harvest season from Florida north to the upper Midwest and Mid-Atlantic states, and back again. Today we are used to getting news and information about people and events from all over the world

Older nurses bulling the new nurses

Description An “op ed” or “opposite the editorial page” or “opinion editorial” is a written piece published by news media that expresses the opinion of an author not affiliated with the publication’s editorial board. Students will take an issue related to health care and craft an op-ed. You will need

Descriptive Statistics -newspapers’ websites

 Visit one of the following newspapers’ websites: USA Today, New York Times, Wall Street Journal, or Washington Post. Select an article that uses statistical data related to a current event, your major, your current field, or your future career goal. The chosen article must have a publication date during this

Existing App You are the project manager / product manager

Existing App You are the project manager / product manager / business analyst for an already launched Android App for a Premium Subscription Video service. The current Android app supports a single paying user account. In this service, the user is not able to watch any video at all without

What is meant by “homeland security enterprise”? Who are the

  What is meant by “homeland security enterprise”? Who are the key players in the U.S. Intelligence Community and how do they work together to combat terrorism?    In the Active Learning threaded discussion area, using materials assigned in this module, respond to the stated question, including any relevance to and

First, carefully read the Tesla case. Then, fully answer all

 First, carefully read the Tesla case. Then, fully answer all questions presented in the case. Make sure to use competitive analysis as the framework ‘lense’ as you answer each question. There is not a page maximum, but each answer should at least be one full page in length. No supporting

Assume that you are a cashier and your manager requires

Assume that you are a cashier and your manager requires that you immediately enter each sale when it occurs. Recently, lunch hour traffic has increased and the assistant manager asks you to avoid delays by taking customers’ cash and making change without entering sales. The assistant manager says she will add

For this week, we will focus on writing a scholarly

For this week, we will focus on writing a scholarly abstract of a quantitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts. ”Directions: Analysis of Research abstract published quantitative scholarly article related to Enhancing Cyber Security In Healthcare -With The Help

Assignment 1. Education Strategies Social Marketing Case Study

Assignment 1. Education Strategies Social Marketing Case Study Analysis: (100 points) To do this exercise you must have accessed, read and viewed the case studies found on the National Social Marketing Center website (https://www.thensmc.com) 2. Your paper should be 3 pages, 12 point font, double spaced. 3. At least 6

What do the four parts of the Christian biblical narrative

What do the four parts of the Christian biblical narrative (i.e., creation, fall, redemption, and restoration) say about the nature of God and of reality in relation to the reality of sickness and disease? From where would one find comfort and hope in the light of illness according to this

Hiring FBI agents

Review the case study on page 325 of your text. You should expect to take 2-3 pages (double-spaced, 12-point font) for your response (not including any necessary reference pages). Be sure to respond to all questions. What are the advantages and disadvantages to the FBI using multiple hurdles approach to