Describe how encryption can be used

Assignment Help Management Information Sys
Reference no: EM131828568

Assignment Requirements

Refer to the "Case Study: Veterans Affairs (VA)" text sheet. By now, you have analyzed the case study and have suggested possible mitigating remedies to prevent loss of private information. Write an executive summary that supports your list of suggested remedies.

To begin, summarize your findings in a simple bullet-point list. This will help to prioritize the remedies suggested. Once you have the summary ready, compile your findings in the form of an executive summary. The main points you need to cover are:

Analyze the mistakes committed by both the employees and the Department of Veterans Affairs that led to data loss.

Ensure that the remedies you suggest prevent the mistakes you analyzed from reoccurring in the future. You can think of using encryption as one of the possible remedies. In this case, describe how encryption can be used.

Explain methods that will ensure proper monitoring and enforcement of the existing security policies.

Analyze the procedural changes made by the Department of Veterans Affairs as a result of the 2006 data breach. Are the changes sufficient to prevent similar data breaches in the future?

Required Resources

Text Sheet: Case Study: Veterans Affairs (VA) (ts_caseveteransaffairs)

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Institution Release Statement

Reference no: EM131828568

Questions Cloud

State-transition diagram of the process : a. The state-transition diagram of the process b. The transition probability matrix of the process c. The limiting-state probabilities.
Write a summary that includes the services main features : Does anyone in your area offer a Wi Max service? If yes, write a one-page summary that includes the service's main features.
What techniques or controls are available to data analysts : What resources are available to the security professional interested in leveraging math to engage in security related activities?
Determine the state-transition diagram for the process : a. Determine the state-transition diagram for the process. b. Give the transition probability matrix for the process.
Describe how encryption can be used : Analyze the mistakes committed by both the employees and the Department of Veterans Affairs that led to data loss.
Give the state-transition diagram of new england : Give the state-transition diagram of New England fall weather with the state "sunny" as state 1, the state "cloudy" as state 2, and the state "rainy" as state 3
What kinds of applications can be supported : What kinds of applications can be supported, what equipment will be necessary, where the equipment will be located, and what services this company offers.
Give the state-transition-rate diagram of the process : a. Give the state-transition-rate diagram of the process. b. What is the fraction of time that both servers are down?
Give the state-transition-rate diagram of the process : a. Give the state-transition-rate diagram of the process. b. What is the probability that there are three customers waiting in the shop?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd