Analyze proper physical access control safeguards

Assignment Help Management Information Sys
Reference no: EM132212940

Assignment

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist.

The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building.

Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records.

The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five page paper in which you:

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

Recommend the proper audit controls to be employed in the registrar's office.

Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132212940

Questions Cloud

Determine the number of equivalent units : Lake Surf Company uses an automated process to clean and polish its merchandise items. For March 2017, the company conducted the following activities.
Which method should be used to best reflect the performance : The management of Hil is wondering how the increase in ownership will affect the reporting of the investment in Ton. Will Hil continue to classify.
Define the scope of an it compliance audit : Define the scope of an IT compliance audit that would verify whether or not this organization is in compliance with the laws you identified.
Determine design techniques and guidelines to help deter : Describe how the concepts of territoriality and natural surveillance can help determine design techniques and guidelines to help deter crime.
Analyze proper physical access control safeguards : Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.
Having awareness of how people are motivated is component : Having an awareness of how people are motivated is a component of ______. In the CAPP Strengths model, weaknesses are ______.
Describe the communication barriers in working with client : Demonstrate clear understanding of the communication skills required for effectively communicating with the elderly. Describe the communication barriers
Explain the costs involved in the creation of the system : Describe the ongoing maintenance that will be required. Provide a workflow diagram in Visio or equivalent software to illustrate how the system will work.
What was the likely root cause of this failure : Technical projects fail when they deliver significantly late, substantially over budget, and/or with significant features missing or unusable.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Formulate this as a linear programming problem

Formulate this as a linear programming problem. - Solve the problem graphically. - Solve the problem using Excel solver.

  What does the term computer security mean

What does the term Computer Security mean? Who is involved in computers security at an organization and what is the security system development life cycle.

  Can organizations leverage economy of scale using an

can organizations leverage economy of scale using an application service provider?do you feel an organization can

  Develop a vision statement for a project that will create

Develop a vision statement for a project that will create, deploy and maintain a statewide degree requirement information service.

  Describe your project scope in a few sentences

Describe your project scope in a few sentences and then identify at least five significant varied risks associated with the project.

  Discuss about the disaster recovery planning

Include a cover slide, introduction slide at the beginning of the presentation and a conclusion slide at the end of the presentation.

  Develop a search engine optimization strategy

Develop a search engine optimization strategy for periodic data extraction, review, and analysis and make adjustments based on results.

  Producing a coherent srategic plan for a fictitious is

producing a coherent srategic plan for a fictitious is businessdrawing from several resources the work you did in

  Evaluate mobile sites and discussing security threats

Evaluate real examples of electronic and mobile commerce that have changed your experience as a consumer. Filling out this table should be easier if you relate to the different industries as a "consumer."

  What is the standard time for the task

What is the standard time for the task?- How many observations are needed to assure a 95% confidence level?

  The stages of technology development in technology

the stages of technology development in technology industrydescribe the stages of technology development in technology

  Discuss the security implications of such centralization

Authentication functions are widely used today to support network-based user authentication. Can you discuss some controls that have had a great degree of success? Which ones if any are not very useful and why?Key distribution schemes using an ac..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd