Guidance provided by department of health and human services

Assignment Help Computer Network Security
Reference no: EM13758280

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Reference no: EM13758280

Questions Cloud

Perform a functional dependency analysis : Sample data and make any assumptions you need about the company. Make any comments about the approach that you are going to follow, as you see fit - Perform a functional dependency analysis, and include it as part of your deliverables, for every s..
Explain the regulatory compliance law : From the e-Activity, explain the regulatory compliance law that you researched, and ascertain the effect that information security could have on such a law
Deductive logic appear in all business communications : Inductive and deductive logic appear in all business communications that will give the basis of your argument. What other (5) considerations should also be made in the design of your message?
A plan for planning : Case: You are a consultant for a Fabric company that burned down, this company was the only source of income for many of the town people they all worked there, as a consultant to the owner how to rebuild the company to where it will be better than be..
Guidance provided by department of health and human services : Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements
Annual reports for the coca-cola company and pepsico : Using 2007 annual reports for The Coca-Cola Company and PepsiCo, Inc., answer the following questions. Write these up in a Word document, clearly identifying your response to each lettered item. Show supporting calculations for the items lettered ..
Discuss a preschool classroom and a classroom for children : Discuss a preschool classroom and a classroom for children five years old or more. Describe how the environments should use the principle of age appropriateness
Core competencies and network-based strategies : How does Procter and Gamble Company address change; consider the use of BPM/BPR and other change processes. How is Procter and Gamble Company using synergies, core competencies and network-based strategies to achieve competitive advantage?
What element of establishing an organizational strategy : Satisfying the customers of an organization is a requirement for business success. Therefore, customer perceptions matter when trying to decide what products and services the organization will offer. What element of establishing an organizational str..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  What would the hash value of the modified file look like

Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file.

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  Why is security primarily a management issue not a

why is security primarily a management issue not a technological issue? also provide some specific bulleted points on

  Research paper about data encryption techniques

Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  Issues while maintaining security in a company

Assignment Preparation: Activities include independent student reading and research. Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countrie..

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Theft of logins and passwords

Theft of logins and passwords

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd