Describe the data breach incident and the primary causes

Assignment Help Management Information Sys
Reference no: EM13761896

Case Study: Data Breaches and Regulatory Requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website about the data breaches within government systems.

Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.

Write a three to five (3-5) page paper on your selected case in which you:

Describe the data breach incident and the primary causes of the data breach.

Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).

Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.

Use at least three (3) quality resources in this assignment.

Reference no: EM13761896

Questions Cloud

Company predetermined overhead rate : What is the company's predetermined overhead rate?
Energy sources and alternative energy : The Effects of Coal Mining using your eScience lab manual and kit.
Write down the aggregate demand function for sweaters : Draw the aggregate demand curve for sweaters among Drexel and UPenn undergraduate students, putting the price (P) on the y-axis and the quantity (QU) on the x-axis.
Develop a visual rendering depicting your design : Assignment: Component Interface for an Emergency Control Room, Develop a visual rendering depicting your design through the use of Microsoft Visio or its open source alternative, Dia
Describe the data breach incident and the primary causes : Describe the data breach incident and the primary causes of the data breach. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements
Explore stratification and prejudice in current events : explore stratification and prejudice in current events. Despite great advances towards equality between the races and genders, racial and gender discrimination, as well as class stratification remain serious social problems.
Recent annual report for a publicly traded company : Browse the Internet to acquire a copy of the most recent annual report for a publicly traded company.
Cost behaviors and characteristics : Address each part of the following items in complete sentences. Will pay $30 must be orginal work and A+ work. I can copy and paste from the internet myself. 1. Name three cost behaviors and their characteristics. Classify each of the following co..
List and explain the key participants in an ach e-payment : List and explain the key participants in an ACH e-payment. Identify and analyze at least four digital payment concerns Centervale Apparel might want to consider in light of what you have learned from NACHA

Reviews

Write a Review

Management Information Sys Questions & Answers

  Outsourcing it functionsone of the common it acquisition

outsourcing it functionsone of the common it acquisition alternatives is acquiring outsourcing services. organizations

  Developing global information systems

Developing Global Information Systems - challenges a company faces when developing global information systems

  Evolution of current generation database technologies

Write Annotated Biblicagraphy on Evolution of Current Generation Database Technologies

  Value in protecting electronic patient health information

Discuss their use and value in protecting Electronic Patient Health Information. Research and identify two cases from a real life health- related setting in which safeguards were breached

  Effectiveness of the public relations campaign

Public Relations Campaign' and Technology - What are the technology considerations, and the strategies to determine the effectiveness of the "Public Relations Campaign"?

  Employees to build a custom system

Describes the Pros and Cons of Using Employees to Build a Custom System - A detailed discussion is provided, including each of the information system elements identified in the question

  Advantages and disadvantages of any solution employed

Considering the shared data is extremely sensitive and must be top secret at all costs, formulate a possible solution with consideration to symmetric or asymmetric cryptography and describe the advantages and disadvantages of any solution employed

  Management by conducting a costs benefit analysis

Healthcare Technology and Define eDischarge and its impact on patient care management by conducting a costs benefit analysis

  Price of education explain using supply and demand

price of education explain using supply and demand conceptover the last 30 years in the united states the real price of

  Find the required rate of return2if rf 6 percent b 13 and

find the required rate of return2.if rf 6 percent b 1.3 and the erp 6.5 percent compute ke the required rate of

  Operations and suplpy chain

Operations and Suplpy Chain - Draw a graph. Develop the equations

  Supply chain management redesignwhy does the supply chain

supply chain management redesignwhy does the supply chain management process needs too be redesigned? what are possible

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd