You are on page 1of 3

BUSINESS GOALS AND BUSINESS PROCESSES 1

Business Goals and Business Processes

Kathleen McClain

IT FP3358

Capella University

July 31, 2019

This study source was downloaded by 100000853219703 from CourseHero.com on 10-12-2022 08:29:46 GMT -05:00

https://www.coursehero.com/file/44069188/IT-FP3225-McClainKathleen-Assessment-1-Attempt-1docx/
SECURITY POLICY BUSINESS GOALS AND BUSINESS PROCESSES 2

Business Goals and Business Processes


Pick a company or organization that you are familiar with. This can be your workplace, place of
worship, volunteer workplace, or a company found from a case study from the Capella
University Library or on the Web. When picking the company or organization, think about your
educational specialization area, information technology interests, or career goals.
Examine your organization to determine if it exhibits any of the warning signs that indicate
difficulty in integrating business goals and processes.
Consider the following questions as you look at your organization's business goals and
processes:
Do you feel the company or organization is utilizing information technology effectively?
Why or why not?

Does this organization have many isolated systems that make it difficult for necessary work
to flow smoothly as an end-to-end process?

Does this organization have difficulty sharing data with anyone in the organization who
needs the data as part of their implementation of a business goal?

Mission.
Objectives.
At least two business processes used at the company or organization.
At least two information systems used at the company or organization.
Explanation of how IT systems do or do not integrate with business goals.
Identification of some of the challenges of integrating IT goals and business goals in the
company or organization.

This study source was downloaded by 100000853219703 from CourseHero.com on 10-12-2022 08:29:46 GMT -05:00

https://www.coursehero.com/file/44069188/IT-FP3225-McClainKathleen-Assessment-1-Attempt-1docx/
SECURITY POLICY BUSINESS GOALS AND BUSINESS PROCESSES 3

References

Andress, Jason. (05/2014). The Basics of Information Security: Understanding the Fundamentals

of InfoSec in Theory and Practice, 2nd Edition [VitalSource Bookshelf version].

Retrieved from https://bookshelf.vitalsource.com/books/9780128007440

Chapple, Mike, (October 2004) “Top six steps for a secure Web server”. Tech Target. Retrieved

July 22, 2019 from https://searchsecurity.techtarget.com/tip/Six-steps-to-securing-your-

Web-server

Von Ogden, Jacqueline. (May 24, 2016). “10 Smart Ways to Mitigate Overlooked Network

Security Risks”. Cimcore, Inc. Retrieved July 26, 2019 from https://www.cimcor.com/

blog/10-smart-ways-to-mitigate-overlooked-network-security-risks

Walsh, Karen (n.d.) “Legal Liability in Information Security: How Compliance Can Be Used to

Protect Assets”. Reciprocity, Inc. Retrieved July 26, 2019 from https://reciprocitylabs

.com/legal-liability-in-information-security/

This study source was downloaded by 100000853219703 from CourseHero.com on 10-12-2022 08:29:46 GMT -05:00

https://www.coursehero.com/file/44069188/IT-FP3225-McClainKathleen-Assessment-1-Attempt-1docx/
Powered by TCPDF (www.tcpdf.org)

You might also like