Describe policies standards processes and guidelines

Assignment Help Computer Network Security
Reference no: EM131230458

Computer Science

Select a company or any existing business. This can be the company you currently work for. If you cannot find information about the security infrastructure of a company, you may make up the details as realistic as possible. Over the next few weeks you will utilize this company for the main project.

Your company wishes to ensure that know and understand they various regulatory acts they are required comply with and understand. This first assignment will allow you to establish the Key Assignment Template that will be used throughout the class for all Individual Project Submissions.

First, you will start by providing an overview of the company you have chosen. Be sure to describe its current security infrastructure.

Second, explore the regulations applicable for Security Compliance. You will:

• Describe 5 different Federal Regulations your company needs to understand and have compliance
• Describe 2 different State Regulations your company needs to understand and have compliance
• Discuss how each of these regulations are applicable to the company

The template document should follow this format:

• Security Compliance Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Section 1- Company Overview
o Section 2 - Federal and State Regulations, Directives, and Acts
o Section 3 - Compliance Plan
o Section 4 - Acceptable Use Policy
o Section 5 - Certification and Accreditation
o Section 6 - Preparing for Certification

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Section 1 - Company Overview
• Section 2 - Federal and State Regulations, Directives, and Acts

o Identify and describe 5 Federal Regulations
o Identify and describe 2 State Regulations
o Describe how each apply to the specific company

• Section 3 - Compliance Plan

o Describe Policies, Standards, Processes and Guidelines
o Discuss the relationship between Controls and Audits
o The Sarbanes-Oxley Act
o The different implications Regulations have on Government and non-Government entities

• Section 4 - Acceptable Use Policy

o Global Regulations
o Safe Harbor
o Work Councils
o Acceptable Use Policy and Enforcement Ethics

• Section 5 - Certification and Accreditation

o Certification and Accreditation
o Certification and Accreditation Frameworks

• Section 6 - Preparing for Certification

o DIACAP
o ISO27002

Add the discussion about the Company Overview and the Federal and State regulations to the sections titled: Company Overview and Federal and State Regulations, Directives, and Acts.

Reference no: EM131230458

Questions Cloud

Think of viable business venture : Think of a viable business venture you could embark on and share your ideas using the following questions: Which niches can you own in this proposed venture? Of these which would be the most profitable?
How do these ideas relate to how you experience leadership : What are the key ideas that Simon Sinek presents in the beginning of his book. How do these ideas relate to how you experience leadership today? Describe the roles that E.S.D.O play in leadership. How can knowing this chemistry benefit a leader? What..
Describe the concept of due care and due diligence : Discuss the importance of the security professional to be knowledgeable with State and Federal Regulations, Directives, and Acts. Describe the concept of due care and due diligence.
Estimate long term fraction of time they have each cuisine : Suppose a dinner clubs eats out once a week, and the members have a choice of Chinese, Italian, or American cuisine. They never eat the same cuisine two weeks in a row. If they have American the first week, what is the probablility they have Chinese ..
Describe policies standards processes and guidelines : Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.
In pursuing opportunities in foreign markets : In pursuing opportunities in foreign markets, MNEs may choose to adopt either a global strategy or a multi-domestic strategy. What are the conditions under which either a global or a multi-domestic strategy will make most sense? Use examples to illus..
Describe policy issue for your selected role specialization : Describe a policy issue for your selected role specialization. Synthesize knowledge for values theory, ethics, and legal regulatory statutes, and develop a personal philosophy that will map out a policy strategy that uses a high degree of politica..
What are the problem solving processes you will embark on : Assume that you are the hospital administrator of a 150-bed hospital located in a smalltown. Your best friend Betty works for the local newspaper in town. One day Betty calls you and informs you about a rumor that one of the ER nurses in your hospita..
Which types of systems is each operating system most suited : Compare and contrast at least 2 network operating systems. For which types of systems is each operating system most suited, and why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd