Reference no: EM13761210
Case Study: Data Breaches and Regulatory Requirements
The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website about the data breaches within government systems.
Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.
Write a three to five (3-5) page paper on your selected case in which you:
Describe the data breach incident and the primary causes of the data breach.
Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).
Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.
Use at least three (3) quality resources in this assignment.
Describing three major components of your strategic plan
: Write a 500 word overview describing 3 major components of your strategic plan, This description must provide information about current HR conditions and a forecast of what to do in the future. This description must align with the company's miss..
|
Operating systems that can be used in health care delivery
: Discuss at least 2 operating systems that can be used in health care delivery. Your discussion should include descriptions of at least 2 operating systems such as, but not limited to, the following: Windows and Unix
|
Unemployment in the australian labour market
: Differences between fictional unemployment, structural unemployment, and cyclical unemployment - The costs associated with unemployment.
|
Research the rules and techniques for transfer pricing
: Using the Internet to research the rules and techniques for transfer pricing. Choose two foreign countries and research their respective tax rates.
|
Analyze how the data breach could have been prevented
: Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIP..
|
Evaluating science resources
: To reinforce this skill, you will apply this knowledge by researching and evaluating two different resources on one scientific topic.
|
Assignment on strategic hrm planning process
: Write a 500- -word proposal for your HR director. Provide details about what the considerations are. Justify why they were important for your strategic HRM planning process. Provide recommendations for addressing these considerations.
|
Internet class
: i have four diferent paper in diferent subjct first one is Choose a topic recently in the news that concerns the Internet.
|
Distinguishing features of currency crises
: One of the distinguishing features of currency crises and capital flight episodes that have occurred since the 1980's is that they have often linked across countries.
|