Reference no: EM132982162
Benchmark - Impact Analysis
Part: Audit
Benchmark -: Perform requirements analysis to identify and obtain data and evidence in support of cyber law inquiries and incidents.
Next, gauge and evaluate your organizations current state of security and protection protocols and mechanisms. Identify gaps, challenges and opportunities for improvement by conducting a thorough audit making sure to:
1. Identify the industry specific cyber law in relation to inquiries and incidents, relating to an education facility, (tutoring service),
2. Assess the critical information infrastructure. Determine the configuration of doors, windows, logical controls, data storage and encryption, firewalls, servers, routers, switches, hubs, and so forth to be compliant.
3. Identify key vulnerabilities points and strengths. Show compliance using a test case (pass/fail requirement). Demonstrate an actual compliance test of server, workstation, etc. that indicates what passes or what doesn't.
4. Indicate the legal elements and liability (costs) that the organization may encounter for non-compliance.
Place your findings in a report that will be reviewed by the CIO and System Security Authority (SSA).
Attachment:- Impact analysis part.rar
How the academic honesty practices learned
: Explain the differences you discovered about academic misconduct versus academic honesty while taking this course. Did anything surprise you?
|
Evaluate the data analysis and interpretation
: Evaluate the data analysis and interpretation. Does the data support the hypothesis and help answer the research question? Support your answer.
|
What does a collaborative information system do
: What does a collaborative information system do? And explain what inputs would be necessary to provide assistance in making the decision.
|
What are the primary activities and support activities
: How is the 2008 study by Brynjolfsson and McAfee different from previous studies? What are the primary activities and support activities
|
Determine the configuration of doors
: Determine the configuration of doors, windows, logical controls, data storage and encryption, firewalls, servers, routers, switches, hubs, and so forth
|
Describe the original decision made by the us government
: Describe the original decision made by the U.S government to impose a trade embargo on Cuba. What conditions existed at the time, and what behavioral forces may
|
What is business process management
: What does ISO certification signify? What is business process management? What role does it play in allowing a company to differentiate itself?
|
What is the importance of workforce diversity
: -What is the importance of workforce diversity? Discuss an organization that exemplifies ideal diversity in the workforce.
|
What is business process re-engineering
: What is an ERP system? How does an ERP system enforce best practices for an organization? What is one of the criticisms of ERP systems?
|