Describe the security methods and controls

Assignment Help Management Information Sys
Reference no: EM132249109

Assignment

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment.

Label each file name according to the section of the assignment it is written for. In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security.

As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your written paper must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

Explain the concept of privacy and its legal protections.

Describe legal compliance laws addressing public and private institutions.

Analyze intellectual property laws.

Examine the principles requiring governance of information within organizations.

Use technology and information resources to research legal issues in information security.

Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM132249109

Questions Cloud

Analysis of the organizational efficiency : The new CEO has selected your consulting firm to give him/her an analysis of the organizational efficiency.
What new challenges for companies do to offshoring : How do those companies manage business and even human resources when they become "multinational" companies?
Summarize the most impactful external opportunitiea : Summarize the most impactful external opportunities and threats that have recently affected MCM
Name the key stakeholders you will consult when developing : Name the key stakeholders you will consult when developing the policy. How will you explain the benefits of the policy to them?
Describe the security methods and controls : Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards.
Incorporate the legislation into policy : Explain how you will incorporate the following legislation into your policy:
Analyze enterprise sales and operation data : Product relative to customer's search engine, accurate market positioning: Analyze enterprise sales and operation data through business intelligence to have.
Ontario fault determination rules : 1. Referring to the Ontario Fault Determination Rules start by determining fault in this scenario.
Analyze the different cultures the product will appeal to : Analyze the different cultures this product will appeal to and make recommendations on which three (3) would be the best choice.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop a website where customers can purchase medical id

Mary Smith, the creator of Mary's Medibracelets, has hired your business, to develop a website where customers can purchase specialized medical ID bracelets.

  Differences in security strategies used by three industries

Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance. Compare the effectiveness of each industry's efforts to ensure privacy issues are addressed and pro..

  Presentation and Project topic - Pension Insurance Statistic

The topic chose for the presentation and this project is Pension Insurance Statistics. Analyze the data, and write a paper to summarize the findings

  Organizational impacts of implementing the strategic plan

positive organizational impacts of implementing the strategic plan. Justify your response. and Specify the current situation of the company with regard to its technology and security aspects

  Discuss team identity

Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships.

  A patient went to see his doctor in a clinic a front desk

a patient went to see his doctor in a clinic. a front desk assistant advised the patient to complete an online

  How would you apply your new knowledge

Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?

  Discuss about the network organizations

Write an original research report consisting of one of the following topic areas: 1) Virtual Organizations, 2) Network Organizations,3) Spin-out Organization.

  What effect would implementing the proposal have

What effect would implementing the proposal have - how would it improve cybersecurity?Which of the three elements of deterrence is the proposal most closely related to?Identify at least one cyberattack we have read about this quarter where the propo..

  Identify a commercial or open source computer forensic suite

Identify a commercial or open source computer forensic suite that can assist a law enforcement agency in investigating computer forensics cases.

  How has instagrams privacy policies changed

How has Instagram's privacy policies changed over the years and Are Instagram's latest privacy policies appopriate? Why or why not?

  How will the industry change in the next five years

What changes will these industries have to make regarding the workforce needed to accommodate the new technologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd