Describe policies standards processes and guidelines

Assignment Help Computer Network Security
Reference no: EM131230458

Computer Science

Select a company or any existing business. This can be the company you currently work for. If you cannot find information about the security infrastructure of a company, you may make up the details as realistic as possible. Over the next few weeks you will utilize this company for the main project.

Your company wishes to ensure that know and understand they various regulatory acts they are required comply with and understand. This first assignment will allow you to establish the Key Assignment Template that will be used throughout the class for all Individual Project Submissions.

First, you will start by providing an overview of the company you have chosen. Be sure to describe its current security infrastructure.

Second, explore the regulations applicable for Security Compliance. You will:

• Describe 5 different Federal Regulations your company needs to understand and have compliance
• Describe 2 different State Regulations your company needs to understand and have compliance
• Discuss how each of these regulations are applicable to the company

The template document should follow this format:

• Security Compliance Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Section 1- Company Overview
o Section 2 - Federal and State Regulations, Directives, and Acts
o Section 3 - Compliance Plan
o Section 4 - Acceptable Use Policy
o Section 5 - Certification and Accreditation
o Section 6 - Preparing for Certification

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Section 1 - Company Overview
• Section 2 - Federal and State Regulations, Directives, and Acts

o Identify and describe 5 Federal Regulations
o Identify and describe 2 State Regulations
o Describe how each apply to the specific company

• Section 3 - Compliance Plan

o Describe Policies, Standards, Processes and Guidelines
o Discuss the relationship between Controls and Audits
o The Sarbanes-Oxley Act
o The different implications Regulations have on Government and non-Government entities

• Section 4 - Acceptable Use Policy

o Global Regulations
o Safe Harbor
o Work Councils
o Acceptable Use Policy and Enforcement Ethics

• Section 5 - Certification and Accreditation

o Certification and Accreditation
o Certification and Accreditation Frameworks

• Section 6 - Preparing for Certification

o DIACAP
o ISO27002

Add the discussion about the Company Overview and the Federal and State regulations to the sections titled: Company Overview and Federal and State Regulations, Directives, and Acts.

Reference no: EM131230458

Questions Cloud

Think of viable business venture : Think of a viable business venture you could embark on and share your ideas using the following questions: Which niches can you own in this proposed venture? Of these which would be the most profitable?
How do these ideas relate to how you experience leadership : What are the key ideas that Simon Sinek presents in the beginning of his book. How do these ideas relate to how you experience leadership today? Describe the roles that E.S.D.O play in leadership. How can knowing this chemistry benefit a leader? What..
Describe the concept of due care and due diligence : Discuss the importance of the security professional to be knowledgeable with State and Federal Regulations, Directives, and Acts. Describe the concept of due care and due diligence.
Estimate long term fraction of time they have each cuisine : Suppose a dinner clubs eats out once a week, and the members have a choice of Chinese, Italian, or American cuisine. They never eat the same cuisine two weeks in a row. If they have American the first week, what is the probablility they have Chinese ..
Describe policies standards processes and guidelines : Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.
In pursuing opportunities in foreign markets : In pursuing opportunities in foreign markets, MNEs may choose to adopt either a global strategy or a multi-domestic strategy. What are the conditions under which either a global or a multi-domestic strategy will make most sense? Use examples to illus..
Describe policy issue for your selected role specialization : Describe a policy issue for your selected role specialization. Synthesize knowledge for values theory, ethics, and legal regulatory statutes, and develop a personal philosophy that will map out a policy strategy that uses a high degree of politica..
What are the problem solving processes you will embark on : Assume that you are the hospital administrator of a 150-bed hospital located in a smalltown. Your best friend Betty works for the local newspaper in town. One day Betty calls you and informs you about a rumor that one of the ER nurses in your hospita..
Which types of systems is each operating system most suited : Compare and contrast at least 2 network operating systems. For which types of systems is each operating system most suited, and why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How does a password or authentication relate to cia triad

In these weeks readings, we learned about the CIA Triad and how each exhibits dependance on the other. Give examples of how failure of one security property

  How clark -wilson model is implemented on computer system

Assume that the Clark -Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system?

  Media technologies affect social and societal issues

Any introduction of a new technology into a society initiates an endless series of effects, especially for those who have and use the technology compared with those who do not or cannot use the technology. Write a 1,400- to 1,750-word paper that a..

  There is a common misconception that analog technology is

there is a common misconception that analog technology is no longer used in the transmission of digital data. however

  Defines five it security positions

Create a 1-page outline to be included with your audit that defines five IT security positions that will add significant expertise and experience to your security audit.

  Discuss the issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges

  Detailed network security recommendations

As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed.

  Java code to c programming

Convert the following Java code to C programming. Pass ProjectNum and ProjectName as parameter values and call printHeading from main method.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  List and explain key objectives of information security

Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..

  Analyze the emerging security threats presented

Analyze the emerging security threats presented within the "Security Threat Report 2014" report. Analyze the major threats to mobile devices, and suggest at least two methods to mitigate the concerns.

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd