Compare and contrast any two of the certifications

Assignment Help Computer Engineering
Reference no: EM133337689

Case: Procurement leaders need to try to understand the metrics needed to measure compliance, develop a standardized policy, and bring in the tools and technology that make this process easier. In the source selection process, it is imperative that you have evaluation criteria in order to make the best decision for your organization. Often the supplier must have a specific certification and/or adhere to specific laws (domestic and/or international) in order to meet the regulatory compliance obligations of your organization

Some examples of these certifications, standards, frameworks and laws can include ISO 27001, OWASP, ILIT, CSA 4.0, SOC, PCI DSS, HIPAA, GDPR, CIS 20, NIST 800-53, The Data Protection Act 2018 (UK), FCPA, SOX, GLB, The California Consumer Privacy Act of 2018 (CCPA), etc.

Each of these are designed to instill trust with clients ensuring controls are in place and their data are protected. If you look at their principals, they each cover important dimensions of securing information, such as confidentiality, integrity and availability.

Question 1: Compare and contrast any two (2) of the certifications, standards, frameworks or laws identified above.

Question 2: Be specific in your assessment by ensuring you include who, what, where, when, why and how you would use each within your specific organization.

Question 3: Use an example from either your organization or leveraging information available on the Internet. Be sure to cite anything used from the Internet.

Reference no: EM133337689

Questions Cloud

Identify and use a different tool of your choosing : Scan your computer with the tool and report back on a few interesting things it found. Linux/Mac users - you are welcome to identify and use a different tool
What might affect a worksheet developers choice : ITE 115 Wytheville Community College Excel allows you to display a system date using the date stamp and the NOW function. When might a date stamp be important
What do you believe is necessary for good cyber security : IST 648 California State University, San Bernardino What do you believe is necessary for good cyber security defense, what guidelines would you recommend
How does our perspective on the world change : ENG 105 Grand Canyon University How does our perspective on the world change when we give to God's kingdom through time, talent, treasure, and talent?
Compare and contrast any two of the certifications : Compare and contrast any two (2) of the certifications, standards, frameworks or laws identified Be specific in your assessment by ensuring you include
Project manager is not versed in the above areas : ITM 5200 Webster University Project Manager is not versed in the above areas? Have you faced any challenges while working on a project, could you share a few
What one thing in your business or professional life : What do you need to change to have more time for Quadrant II (prevention and preparation) - What one thing in your business or professional life would bring
Is the vulnerable system internet connected : Is the vulnerable system internet connected? what is likelihood of exploitation etc? Security Architecture is more about strategic thinking, planning
Design of an ethernet network that connects : CIS 505 Strayer University Show me a screenshot a visual for your design of an Ethernet network that connects a single client PC to a single server and label

Reviews

Write a Review

Computer Engineering Questions & Answers

  Use a bubble sort algorithm in c++

use a Bubble Sort algorithm in C++ that generates a list of 10 random integers.

  Define what a next generation firewall is

Define what a Next Generation Firewall (NGFW) is and the advantages of having this type of firewall as opposed to a Packet Filter Firewall?

  Describe about the internet impact in terms of the social

the internet has made a large impact on the daily lives of people all over the world.consider all of the changes that

  How situational awareness is a driver for detection controls

Create a new thread. As indicated above, describe how situational awareness is a driver for detection and response controls. Select AT LEAST 3 other students'.

  A program that counts the number of nodes in a binary tree

Write a program in c that counts the number of nodes in a binary tree, count the nodes in the right sub-tree, and count the nodes in the left sub-tree.

  List two reasons why a company would pursue onshoring

List two reasons why a company would pursue onshoring or insourcing. List two reasons why a company would not pursue onshoring or insourcing.

  Describe how concepts such as risc evolved over past years

Describe how concepts such as RISC, pipelining, cache memory, and virtual memory have evolved over the past 25 years to improve system performance.

  Suppose the script ran under the bourne shell

suppose the script ran under the Bourne shell.

  What is professional responsibility

What is professional responsibility and how is it applied to your selected project? What are the six basic responsibilities.

  Your boss has just heard about some nefarious computer

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

  Explain in detail the steps required for the establishment

Explain in detail the steps required for the establishment of an HTTPS connection as described in class. Support your explanation with an original diagram.

  Implement a method string insert that returns a string

Using java We wish to implement a method String insert(char c, String s) that returns a string with c inserted in the correct position in already sorted String.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd