Data and Applications Security Impact Analysis and Mitigation Report

Company Name 2 Project Outline and Requirements (Week 1) Company Profile [Your Company Name] is a medium-to-large-sized organization. It sells different types of products and offers few services to other organizations or people. The products could be office and school supplies, sport material, furniture, computers, software, cosmetics, clothes, and so forth. It is headquartered in Chicago, but some of the employees may work remotely. The company employs 75 people or more and only works in the United States of America. [Your Company Name] has been in business for approximately 20 years. Draw your organization plan flow chart (similar to what you see below). US Rail-Adel, LLC Organization Plan Data and Applications Security Impact Analysis and Mitigation Report 3 Your Company Name 3 Company Goal You company should have several objectives and goals. For example, improve product quality, improve schedule accuracy, improve customer satisfaction, and so forth. Identify your company objectives and goals. SWOT (Strengths, Weaknesses, Opportunities, Threats) The SWOT section should include the company strengths that support achievement of the goals, weaknesses that inhibit achievement of the goals, opportunities that would result from achievement of the goals, and threats that could prevent achievement of the goals. Identify the SWOT of your organization. System Requirements [Your Company Name] has several issues and problems within its information system. It cannot depend on it any more to provide them with the necessary information to make the right decision. The company is planning to hire a consultant (you) to make a comprehensive look at its current system and provide them with valuable advice about what it needs. As a consultant, you should provide a detailed report containing a new business intelligence (BI) system requirements including design, development, integration, marketing, customer relationship management (CRM), and enterprise logistics and operations. Data and Applications Security Impact Analysis and Mitigation Report 4 Your Company Name 4 Application and System Evaluation (Week 2) Application and System Evaluation Recommended Tools Data and Applications Security Impact Analysis and Mitigation Report 5 Your Company Name 5 Application/System Recommendation (Week 3) BIS Major Functional Areas Data and Applications Security Impact Analysis and Mitigation Report 6 Your Company