4. You decide to prepare a security checklist for Personal Trainer. Prepare a list of security is- sues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the six security levels.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter7: Risk Management: Treating Risk
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question

Task 4

Continuing Case: Personal Trainer, Inc.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers
have done well, and the company is planning an international expansion by opening a new “su-
percenter" in the Toronto area. Personal Trainer's president, Cassia Umi, hired an IT consultant,
Susan Park, to help develop an information system for the new facility. During the project, Susan
will work closely with Gray Lewis, who will manage the new operation.
Background
System changeover and data conversion were successful for the new Personal Trainer system. The
post-implementation evaluation indicated that users were pleased with the system. The evaluation
also confirmed that the system was operating properly. Several users commented, however, that
system response seemed slow. Susan Park, the project consultant, wants to meet with you to dis-
cuss operation, maintenance, and security issues affecting the new system.
Tasks
1. What might be causing the slow response time? Prepare a brief memo explaining system
performance and workload measurement, using nontechnical language that Personal Trainer
users can understand easily.
2. What could be causing the network slowdowns at Personal Trainer? If a problem does exist,
which performance and workload measures would you monitor to pinpoint the problem?
3. At the end of the systems analysis phase, you studied the economic feasibility of the system
and estimated the future costs and benefits. Now that the system is operational, should
those costs and benefits be monitored? Why or why not?
4. You decide to prepare a security checklist for Personal Trainer. Prepare a list of security is-
sues that the firm should evaluate and monitor. Be sure to organize the items into categories
that match the six security levels.
Transcribed Image Text:Continuing Case: Personal Trainer, Inc. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “su- percenter" in the Toronto area. Personal Trainer's president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation. Background System changeover and data conversion were successful for the new Personal Trainer system. The post-implementation evaluation indicated that users were pleased with the system. The evaluation also confirmed that the system was operating properly. Several users commented, however, that system response seemed slow. Susan Park, the project consultant, wants to meet with you to dis- cuss operation, maintenance, and security issues affecting the new system. Tasks 1. What might be causing the slow response time? Prepare a brief memo explaining system performance and workload measurement, using nontechnical language that Personal Trainer users can understand easily. 2. What could be causing the network slowdowns at Personal Trainer? If a problem does exist, which performance and workload measures would you monitor to pinpoint the problem? 3. At the end of the systems analysis phase, you studied the economic feasibility of the system and estimated the future costs and benefits. Now that the system is operational, should those costs and benefits be monitored? Why or why not? 4. You decide to prepare a security checklist for Personal Trainer. Prepare a list of security is- sues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the six security levels.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Concurrency control
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Oracle 12c: SQL
Oracle 12c: SQL
Computer Science
ISBN:
9781305251038
Author:
Joan Casteel
Publisher:
Cengage Learning