Describe the it controls for information security

Assignment Help Management Theories
Reference no: EM131660955

Question: Review the following scenario:

An aircraft manufacturing company located in California, with contacts in the U.S. government, had a data breach. Data stolen included employee records containing employee names, addresses, social security numbers, and bank account numbers. It also included current aircraft blueprints. It was determined that the breach occurred due to an open remote access computer an employee set up with a simple password, for ease of working from home.

After reviewing the scenario, list the laws that impact this data breach. Describe the steps the company has to take in order to comply with the identified laws. Also, describe the IT controls the company needs to set up for information security in order to prevent a similar breach in the future.

You must cite examples from state breach notification laws (because the company is located in California you need to follow the California state breach notification law) and FISMA (Federal Information Security Management Act)

Do not use any others sources others than the 2 sources above.

Reference no: EM131660955

Questions Cloud

Identify a health policy issue : Describe the current policy and what needs to change, justify your conclusions with citations from the literature
Find the equilibrium profits : Does the demand for firm 2's product satisfy the law of demand - What is the equation of firm 1s best-response function and Find the equilibrium profits
Analyze three current or future security issues in iot : Analyze critically three current or future security issues in IoT. Demonstrate professional and ethical behaviour with regard to network security.
Pick an article issue : Pick an article issue. The article presentation should be concomitant to a particular topic open to varying opinions, debate, and argument.
Describe the it controls for information security : Describe the IT controls the company needs to set up for information security in order to prevent a similar breach in the future.
Define the client for which symptoms of red man syndrome : The nurse, administering an infusion of vancomycin, will observe the client for which symptoms of red man syndrome
The value of planning the risk management approach : Reflect upon the value of planning the risk management approach. Identify two to three challenges faced in doing project work.
Develop a cost estimation equation for monthly production : Develop a cost estimation equation for monthly production costs using the regression method
What are the challenges associated with your choice : Which is more important: the formulation of a strategy or the implementation of a strategy? What are the challenges associated with your choice?

Reviews

Write a Review

Management Theories Questions & Answers

  Who had title to the boat marcus or heiselman

When the yacht yard was unable to deliver the Mainship boat to Marcus in April, Marcus took back his Silverton boat. Who had title to the boat, Marcus or Heiselman? Explain.

  Identify an important managerial challenge

Instructions:1. Identify an important managerial challenge facing your work or other organization.2. Develop a plan that integrates Project Management (PM), Operations Management (OM), and Information Systems Management (ISM) to successfully meet thi..

  Calculate the standard bargaining solution

Calculate the standard bargaining solution for the following variations of the Jerry-Rosemary example in this chapter. In each case, graph the bargaining set, find the maximized joint value, determine the players' individual values, and compute th..

  Change the nature of the multilateral trading system

Regional and Preferential Trade Agreements have the potential to change the nature of the multilateral trading system

  Specify the discharge and head for the pump

When operated at 1170 rpm, a centrifugal pump, with impeller diameter of 8 in., has a shut-off head of 25.0 ft of water. At the same operating speed.

  Write a vision statement for your school of business

Only the fairytale ends with a "they lived happily ever after." What is the relevance of this statement to the concepts vision and mission statement?

  Discuss an emtala violation

Scenario: You are the administrator on call for a local hospital and you receive a call at 2:00 a.m. from another local hospital regarding a patient.

  How does networking increase a person power

How is the concept of power defined? How does networking increase a person's power? Is networking more critical in certain industries

  Economic order quantity

Economic order quantity

  Application: adoption of electronic health records

Application: Adoption of Electronic Health Records

  What is the primary goal of the vulnerability assessment

What is the primary goal of the vulnerability assessment and remediation domain of the Maintenance Model? Is this important to an organization with an Internet presence? Why?

  Written summary of the work to be done

Which of the following is a written summary of the work to be done?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd