Explain how performing periodic security assessments

Assignment Help Business Law and Ethics
Reference no: EM13787187

1. From your computer workstation, create a new text document called Compliance Lab #4.

2. Review the following scenario:

Your organization is a governmental agency that serves a vital role in homeland security functions. In fact, your hiring took longer than you would have liked because it seemed as though the organization's managers wanted to know a lot about you before they gave you clearance to work. After a year at the job, your manager feels your progress has come a long way, so she is giving you more responsibility and has asked you to analyze the benefits of reporting risks, threats, and vulnerabilities in an IT assessment that is under way. Your manager would like for you to conduct research and report your findings about the type of vulnerabilities that require disclosure and when it is lawful or unlawful to conceal information produced by vulnerability assessments. She would also like for you to include some trends on current security threats and the types of responsible disclosure being performed by other organizations.

3. Launch your Web browser and type in the Web address https://www.sans.org. In the Custom Search box on the Web page's upper right corner, search for "How do we define Responsible Disclosure?" On the search results page, click on the top link labeled "How do we define Responsible Disclosure?" to open the pdf article. Read about the following topics:

a. Vulnerability Life Cycle
b. Types of Disclosure
c. Nondisclosure
d. Full Disclosure
e. Limited Disclosure
f. Responsible Disclosure
g. Existing Policies and Proposals

In your text document, note one relevant point about each section.

4. In your Web browser, open the document "Symantec Global Internet Security Threat Report" provided by Symantec Corporation at https://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. Review the Highlights section of the document that discusses the main concepts in each section. Then, review the following topics in the document:

a. Threat Activity Trends
b. Vulnerability Trends
c. Malicious Code Trends
d. Phishing, Underground Economy Servers, and Spam Trends
In your text document, note one relevant point about each section.

5. In your Web browser, type the Web address https://www.zerodayinitiative.com/advisories/published/. Review some of the links on the page provided by the respected security experts at TippingPoint DVLabs and others.

6. Research other available resources (Internet resources, your textbook, and so on) to validate how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance.

7. In your text document, write an executive summary describing how security assessments throughout the seven domains of a typical IT infrastructure can help organizations achieve compliance by mitigating risks and threats.

8. Submit the text document to your instructor as a deliverable for this lab.

Reference no: EM13787187

Questions Cloud

Differences between allopathic pharmacists and professional : differences between allopathic pharmacists and professional herbalists.
Write a program that uses a recursive algorithm to compute : Write a program that uses a recursive algorithm to compute the determinant of a maxtrix. It should read a matrix, print it out, and compute and print the determinant.
About cam-application and caution : CAM-Application and Caution
Case study on organization behavior : Case study on Organization behavior
Explain how performing periodic security assessments : the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organ..
An assignment on pdca cycle : PDCA Cycle
Record the bad debts expense : Management estimates that 1% is the sales percentage to use. What adjusting entry will Hahn Company make to record the bad debts expense?
Primary source of stockholders : A primary source of stockholders' equity is
Examine performance management issues and processes : Examine performance management issues and processes

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Why is this information important

To prepare for this consulting assignment, you need to learn more about crime rates and explore crime rates by state using the Federal Bureau of Investigation's (FBI's) Uniform Crime Reports, Why is this information important? How do the definition..

  A criminal offences under the acl

A criminal offences under the ACL?

  The company you work for makes filters for kidney dialysis

the company you work for makes filters for kidney dialysis machines. several shipments of filters do not meet u.s.

  You are hired as a consultant in city x and are charged

you are hired as a consultant in city x and are charged with the responsibility of creating a plan to deal with the

  Is this behavior in any way acceptable in a law enforcement

you are in a special warrants unit in a major metropolitan area that specifically goes after street crime suspects with

  Determine the value of prevention

How do you determine the value of prevention? How do you prioritize prevention and rehabilitation? This week you reviewed delinquency prevention

  Explaining critical issues in policing

Write a 1,050-word paper explaining critical issues in policing. Address the following key aspects of policing activities and operations: Dangers of policing

  Deterrence is an important concept in classical school of

deterrence is an important concept in classical school of criminology. in an essay discuss on what premise of the

  What types of people become case managers

How is the role different for correctional counselors, probation officers, and social workers? Are some people more suited for certain areas than others? What types of people become case managers

  What has the supreme court ruled with respect to the

what has the supreme court ruled with respect to the confidentiality of a presentence report? remember to discuss

  Role of a risk manager at simply green products

Discuss the elements that must be present in order for one to prove a valid claim under the law(s) specified - The role of a risk manager at Simply Green Products, will draft a document that is commonly used in the business world-a memorandum to y..

  How could monie have protected himself

What arguments can be made to hold Owen Monie liable for any debt of the corporation arising from this death? Should the parents prevail? How could Monie have protected himself against such potential liability

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd