Fill This Form To Receive Instant Help
Homework answers / question archive / 5-1 Capstone Element 5: Analysis of Existing Business Systems, Business Recommendations, and Analysis of Information Security Instructions In this activity, you will write a report based on the Capstone Scenario Two document
5-1 Capstone Element 5: Analysis of Existing Business Systems, Business Recommendations, and Analysis of Information Security
Instructions
In this activity, you will write a report based on the Capstone Scenario Two document. The report will address
Component 1 of your final project.
Take a moment to review the Capstone Scenario Two document. From the scenario, you will identify the
shortcomings of outdated business system technology and outdated IT infrastructure technology. You will
identify if there are better technology alternatives to the ones provided in the scenario and how that
technology addresses the shortcomings. You will identify and describe considerations in complying with
information security policy procedures including personally identifiable information (PII) and security threats.
You are required to submit your work. In this module, this assignment will be given a pass/fail grade based on
submission. You will receive instructor feedback on this submission that you should integrate into your
Component 1 portfolio for the final project, due in Module Seven.
To complete this assignment, review the Capstone Scenario Two document.
Already member? Sign In