Realtime Writers
  • Home
  • Writers
  • FAQ
  • Blog
  • My Account
  • Order Now
  • Menu Menu

cyber security Determine Relevant Supply Chain Risk Management (SCRM) Practices and Challenges)

July 28, 2024/0 Comments/in Uncategorized /by Admin

 Project 3 You hear voices coming from the chief technology officer’s office as you approach to hand in your weekly status report. As you walk in, he looks up and says, “Perfect timing! I have a new project for you.” John introduces Brenda, the director over in Accounting Systems. “Brenda, please explain why you’re here and what you need from us.” Brenda smiles. “Sure. As I was just telling John, accounting needs a more efficient way to handle our month-end closing procedures. “Currently, this process is cumbersome with many tasks that could be automated. Also, every month during this procedure, we process a high volume of sensitive data that could be at risk while we implement any type of change. “In a few weeks, John and I must make a recommendation to the CEO whether to purchase new software or develop an original application to improve the efficiency of month-end processing. We need to present a recommendation that will consider the needs of accounting while keeping the data secure.” John turns to you. “I would like you to look into solutions and provide me with a recommendation prior to our meeting with the CEO. There are several factors that I would like you to think about. “First, consider the importance of supply chains. I would also like some slides on supply chain risk management concepts that I can include in my presentation. Next, conduct your due diligence on software development. The third factor to consider is software assurance, whether we develop or procure. And finally, should we be considering open source options? Whatever option we choose, we’ll need to support the maintenance of it, and so you should also develop a maintenance plan that provides all of the functionality needed by the accounting department, with minimal disruption in their operations, and of course, maximum security.” Brenda says, “Automating the month-end process will be a huge benefit to the accounting department.” John concludes, “I would like to see your final recommendations in three weeks in order for us to have time to prepare for our conversation with the CEO.” Cyber management and policy professionals need to be able to identify software security vulnerabilities and communicate those vulnerabilities to nontechnical policy makers. Whether an organization purchases commercially available software or develops original applications, understanding the vulnerabilities is especially important. Upon completion of this project, you will evaluate relevant vulnerabilities, determine potential costs associated with these vulnerabilities, and recommend the best solution for an organization. You will also develop and present a software maintenance plan, taking into consideration the Supply Chain Risk Management (SCRM) framework. Finally, you will present the recommended solution to a nontechnical audience. This is the third of four sequential projects. There are thirteen steps in this project. Begin by reviewing your project scenario, then proceed to Step 1. When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. 6.1: Analyze secure software development methodologies and describe the cybersecurity issues that each methodology addresses. 6.4: Explain systems life cycle management concepts used to plan, develop, implement, operate, and maintain information systems. 9.4: Demonstrate secure principles, methods, and tools used in the software development life cycle. 9.5: Describe the cybersecurity implications related to procurement and supply chain risk management. Step 1: Determine Relevant Supply Chain Risk Management (SCRM) Practices and Challenges You begin your project with an investigation of supply chain risk management (SCRM). SCRM is the implementation of strategies to manage risks associated with the selection, installation, implementation and use of products with the goal of reducing vulnerabilities and assuring secure operations. It is important to understand SCRM in order to make informed decisions regarding the selection of products. Review Supply chain risk management concepts and theories. As you read about SCRM, document the following:

Share this entry
  • Share on WhatsApp
  • Link to Instagram
https://realtimewriters.com/wp-content/uploads/2025/01/Realtime-Writers-Transparent_white-bg.png 0 0 Admin https://realtimewriters.com/wp-content/uploads/2025/01/Realtime-Writers-Transparent_white-bg.png Admin2024-07-28 11:25:462024-07-28 11:25:46cyber security Determine Relevant Supply Chain Risk Management (SCRM) Practices and Challenges)
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

You must be logged in to post a comment.

Calculate the Price

Deadline
Type of paper
Academic level
Pages
Plagiarism report FREE
Unlimited revisions FREE
Unlimited sources FREE
Title pageFREE
FormattingFREE

$0.00

Secure Payment

IntaSend Secure Payments (PCI-DSS Compliant) Secured by IntaSend Payments

Writing Services

  • Essays
  • Research Papers
  • Assignments
  • Course Work
  • Thesis

We Accept

  • PayPal
  • Visa
  • Mastercard
  • Apple Pay
  • Google Pay

© 2025 Realtime Writers | All Rights Reserved

Multimedia slide presentation Examine the role that these concepts plays in “The Great Fear,” “The Cog,”... Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

AcceptRejectSettings

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept Reject

WhatsApp