Discuss the difference between law and ethics

Assignment Help Management Information Sys
Reference no: EM131912180

Part I

Based on the reading materials at background section and your own research, prepare a 3-5 page report to address the following questions on ISO standards on information security management:

Describe the Plan-Do-Check-Act process.

What does this process accomplish?

Part II

Based on the reading materials at background section and your own research, prepare a 3-5 page report to answer the following questions

Discuss the difference between law and ethics;

Research the Sarbanes-Oxley Act of 2002 and discuss how it has impacted information security in an organization.

Assignment Expectations

Your paper should be from 6 to 10 pages long. Combine Parts I and II into a single report, labeling each part accordingly.

Your paper should provide a summary of your findings from the assigned materials and any good quality resources you can find.

Please cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular:

Ability to consolidate ideas from reading materials.

Demonstration of your understanding of the process of how to manage and operate an information security management system.

The ability to express your ideas clearly.

BACKGROUND INFORMATION

Designing and Implementing an Effective Information Security Program: Protecting The Data Assets of Individuals, Small And Large Businesses.

Implementing an Effective IT Security Program.

Reference no: EM131912180

Questions Cloud

Determine the dynamics of social work interactions in time : A process recording is a written tool used by field education experience students, field instructors, and faculty to examine the dynamics of social work.
Relationship between business and human resource strategy : HRM325 Strategic Human Resource Management Assignment. Explain the relationship between business strategy and the human resource strategy
How does wacc and capm relate to risk and return : What is "risk" in business? how does WACC and CAPM relate to "risk" and "return?"
Concatenation of the string values in reverse order : The method will return to the user a concatenation of the string values in reverse order. The function is to be called from the main method.
Discuss the difference between law and ethics : Research the Sarbanes-Oxley Act of 2002 and discuss how it has impacted information security in an organization.
The market capitalization rate for each share : If the Market capitalization rate for each share is 10% per annum, which share is the most Valuable?
Standard for strengthening authentication : Three-factor authentication has become a standard for strengthening authentication in some industries.
How do depictions of royalty differ from the egyptian art : How do depictions of royalty differ from those of others in ancient Egyptian art? Write two paragraphs (min) comparing and contrasting the evidence selected.
Waterfall and agile system development processes : Discuss the advantages and disadvantages of both the waterfall and agile system development processes.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine manner in which you would implement ip multicast

Determine the manner in which you would implement IP multicast in a campus network. In your response, provide two to three (2-3) reasons why you would choose to implement IP multicast as well as specific examples of Internet, Intranet, and multime..

  What skills should a cio possess

Do you feel that the organizations WALMART Canada, take the function of information management seriously?

  Give an example of a domain for a social security number

Give an example of a domain for a social security number and When defining a domain what are you trying to describe

  How computer hardware and application impact it professional

Consider how computer hardware, operating systems and applications impact the IT professional. Provide your thoughts about how the computing environment contributes to an individual's success or failure on the job.

  Research methodologies and designs

Create a PowerPoint presentation describing 9 different research methodologies and designs that you find interesting.

  Explain layered defenses and describe the processes involved

Explain layered defenses and describe the processes involved to ensure that layered defenses provide the appropriate level of network security.

  Analyze the term white collar crime

How has the meaning of this phrase developed and changed through the years since it was first introduced by Edwin Sutherland in 1939.

  Computers and information processing accuracy convenience

computers and information processing accuracy convenience storage device speedaccuracy of data input is important. what

  Professional development plan

A Project Manager may manage his professional development plan. When managing his professional development plan, the project manager may also manage his profile.

  Would you rather have an online or a paper catalog

Class let's look at this from both sides of the table, both the consumer and the manager. Would you rather have an online or a paper catalog? What are the advantages and disadvantages of each.

  What change management tasks should kelvin perform

HS3011 Information Security Group Assignment. What change management tasks should Kelvin perform before his next meeting

  What are the advantages of an investigative task force

Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd