Analyze the means in which data moves within organization

Assignment Help Management Information Sys
Reference no: EM131927528

Assignment

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a 6 page paper in which you:

1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

2. Recommend the proper audit controls to be employed in the registrar's office.

3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131927528

Questions Cloud

What are the projected sales for last year before sale : CelebNav, Inc. had sales last year of $745,000, What are the projected sales for the last year before the sale?
Saving for a cruise over the summer : James has decided to start saving for a cruise over the summer. His money is currently in the local bank
Discuss efforts of ics-cert specifically to stuxnet threat : Discuss the efforts of ICS-CERT specifically to the Stuxnet threat and examine its incident response efforts to mitigate this risk against U.S. industrial syste
Find the parametric equations for tristan motion : (a) Find the parametric equations for Tristan's motion. 10-3/2t, -3+11/2t
Analyze the means in which data moves within organization : Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
Competition as a challenge to effective team management : Types of Teams As a group, identify four (4) types of teams.What are their characteristics? As a group, which of the teams do you mostly identify with and why?
What will the annual savings be : Community Hospital has annual net patient revenues of $150 million. what will the annual savings be?
What would an equation of a line through the point : What would an equation of a line through the point (2, 4) that is perpendicular to the x-axis look like. Graph the line and what is the state of the slope.
Raise large amounts of capital through the sale of stock : The type of business ownership that has the potential to raise large amounts of capital through the sale of stock is called

Reviews

Write a Review

Management Information Sys Questions & Answers

  Personal key performance indicators

Explain how you will overcome threats from each of the five forces while achieving your professional goal(s) after graduation from the MS-IST Program.

  Do some internet research on identify management systems

Do some Internet research on identify management and single sign on systems.

  Disadvantages of a lock down environment in it

Disadvantages of a lock down Environment in IT - I need assistance with figuring out some disadvantages a business may encounter from a locked-down IT environment.

  How do the four components of the physical layer of system

Describe what types of applications that might use frequency division multiplexing, time division multiplexing, and dense wavelength division multiplexing.

  Discuss the likely impact on the health care industry

Analyze the two working models for understanding different health care systems and determine which model would be most useful to you in your current (or future) position in the health care industry. Provide specific examples to support your respon..

  Why although boat aims at separation of concerns

Explain why although BOAT aims at separation of concerns, the integration/mapping of aspects is of paramount importance. Use examples to illustrate.

  describe three advantages of green IT

With a focus on enterprise hardware, software, services, and human capital, list and describe three advantages of green IT

  Packets routers and ip addresses

Packets, Routers and Private vs Public IP Addresses - The solution shows packets, routers and IP addresses. In terms of security, private IP address is favored over public IP address. However, Public IP addresses is favored in terms of commercial b..

  Evaluate interface design models

Building an interface can be broken down into the phases of design and development. Analyze the activities that take place in both phases, and explain why certain activities should be included in design but not in development.

  Describe the organizations important business processes

Describe the organizations important business processes - Describe the organizations structure and suggest strategic information systems appropriate for that particular business. including those based on Internet technology.

  List the three boolean operators the lionsearch accepts

List the three Boolean operators the LionSearch accepts and describe the operation each performs. Explain the difference between the query "information systems" and information systems

  Explian about rick auto enterprises

Rick Auto Enterprises (RAE): Project Planning, Execution and Closure - What are the risks involved? What are the questions we need to ask and what are the answers we can expect

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd