Describe the federal, state, and local cyber defense partner

Assignment Help Computer Engineering
Reference no: EM133456093

Question 1: In many situations, multiple levels of government must work in partnership when ensuring security compliance. As a cybersecurity professional, research the following:

  • Describe the federal, state, and local cyber defense partners/structures.
  • Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices within their industry.
  • Explain federal laws and authorities, including the Computer Security Act, Sarbanes - Oxley, Gramm - Leach - Bliley, Privacy (COPPA) HIPAA / FERPA, USA Patriot Act, Americans with Disabilities Act, Section 508, and other Federal laws and regulations.

Question 2: When providing information assurance, a sound defense strategy does not only look at the legal aspects but also the ethical abuses of abilities on the job.

  • There are three main categories of unethical behavior that organizations must seek to minimize: ignorance, accident, and intent. From your research and your professional/personal experience, provide examples of each category and best practices for how to prevent such activities from happening.
  • What happens when a job task borders on unethical from your personal viewpoint? Is your response to the issue any different than what you discussed above? What behaviors/tasks would an organization find acceptable where your personal viewpoint may not? Select 2-3 scenarios and discuss how you would address them from a Christian worldview. Consider Matthew 18:15-18. How could you apply this to a workplace scenario?
  • Refer to the ISACA code of conduct. Describe the responsibilities related to the handling of data as it pertains to legal, ethical codes of conduct, and/or agency auditing issues, frameworks, and best practices.
  • InfoSec professionals are under increasing pressure to provide access to information/data without sacrificing security or usability. Explore the challenges of balancing security and usability and what results if there is a lack of balance between the two.
  • Describe how you would integrate information assurance and security requirements into an organization's processes and practices.
  • Examine the ethical considerations of ethics and cyberspace, ethical issues, property, availability, rights of others, respect and principles of community, resource use, allocation, and abuse, censorship, ethics-based decision tools, and cybersecurity and social responsibility.

Reference no: EM133456093

Questions Cloud

What questions do you have about the practices : What questions do you have about the practices? Why do we do it in this way? What are you challenged by?
What is the tone of the text : What is the tone of the text ? What words or phrases throughout the text support your answer ? The article is a Georgia stud t's incredible journey from
The farm to fork strategy : The Farm to Fork Strategy The Dutch BBB victory Eminent domain as applies to agriculture and government policies.
Effective inventory management processes : It is critical that companies have effective inventory management processes to optimize their supply chain.
Describe the federal, state, and local cyber defense partner : Describe the federal, state, and local cyber defense partners/structures. Examine the laws, regulations, and standards that organizations use to align with
Most strategic decisions firm : One of the most strategic decisions a firm makes is to make vs. buy when considering the materials they use to make their finished product.
What are some standard methods of breaking ciphers : What are some standard methods of breaking ciphers besides heavy mathematics and large computers in the real world? Are these methods more prevalent today
How is the metric of lifetime value calculated : How is the metric of lifetime value calculated? Explain the basic formula.
What about sexting and pornography : Describe your opinion on this issue. Do you feel that Edward Snowden is a whistle-blower and a patriot or is he a traitor? How do you feel about his current

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd