Identify the specific compliance requirements

Assignment Help Computer Engineering
Reference no: EM133588650

Homework: Compliance Plan

For this homework you will take on the role of a compliance consultant who has been hired to create a plan that will assist an institution in meeting its professional or governmental compliance standards.

This compliance plan will be based on the scenario you chose and researched. Include the following information in your compliance plan.

Question A. Carefully review the standards for the option you chose. Identify the specific compliance requirements within the standards, and briefly discuss the business reasons for implementing the standards chosen.

Question B. Explain the type of network design that would best meet the standards identified. Revise your network diagram from Week 2, using Visio within your lab environment. This diagram must be copied into your plan document as an image. (The Visio diagram may be included in your homework by means of a screenshot pasted into your document prior to submission. Assistance with capturing a screenshot of your Visio may be found at Take-a-screenshot org) Describe how you would recommend segmenting the network in order to best meet compliance standards, providing a rationale for your suggestions and supporting your statements with your research.

Question C. Examine the firewall types necessary to ensure the security of the individual network segments within your institutional setting. Create a plan for the implementation of firewalls within each partition of the network.

Question D. Analyze the potential uses of intrusion detection systems (IDSs) within each network partition and recommend the placement of IDS within the partitions based on the standards for your institution. Evaluate the controls needed for maintaining your recommended IDS infrastructure and create a brief plan that outlines your recommendations for this maintenance. Provide a rationale for your suggestions supporting your statements with your research.

Question E. Classify the types of data included in your chosen scenario and evaluate the IT governance methodologies that apply to the classified data types. Explain which IT governance methodology would need to be implemented within each partition of the network in order to meet compliance standards.

Reference no: EM133588650

Questions Cloud

Discuss how the research design is useful : Provide an example of a quasi-experimental research design in public administration. Discuss how the research design is useful. For information about
What do you see as the other challenges to budget planning : Under standing revenue sources and fixed costs are essential to this. What do you see as the other challenges to budget planning and why?
Explain the purpose and focus of your selected organizations : Select three of these organizations that are most relevant to your career goals. Explain the purpose and focus of your three selected organizations.
How does monitoring counter transference and using evidence : How does monitoring counter transference and using evidence-based practices help counselors to create safety and trust?
Identify the specific compliance requirements : Identify the specific compliance requirements within the standards, and briefly discuss the business reasons for implementing the standards chosen.
Identifying that janine wanted to do a quiet activity with : Identifying that Janine wanted to do a quiet activity with only a few people and that she is interested in books, crosswords, gardening and knitting
What social media platforms would they frequent : What social media platforms would they frequent? Are these personas likely different now after the pandemic?
How would you use appreciative inquiry to address the issues : As OD practitioner, how would you use appreciative inquiry to address the issues observed in the film? How would you assess the emotional intelligence
Describe the problem and opportunity facing the business : Describe the problem and opportunity facing the business. Additionally, Describe any limitations you have found

Reviews

Write a Review

Computer Engineering Questions & Answers

  What other data could you imagine would be valuable

What could you do/would you need to do to clean or modify the existing data? What other data could you imagine would be valuable to consolidate.

  Describe the key issue in the news item and its possible

Explore recent privacy law and compliance news on the internet, in periodicals, or in scholarly articles. In one, well-written paragraph describe

  What would qualify someone to be a cyber professional

What would qualify someone to be a Cyber Professional? Include any special skills necessary for someone interested.

  The binary representation of the number of elements

Prove that, the number of times two trees in the binomial heap are merged into a bigger tree is equal to the number of bit- ips when B is incremented by 1.

  Explain the term symmetric key cipher

Use concrete examples to explain each of the following concepts relating to security in network computing: symmetric key cipher.

  How to plan a wan network linking a toy manufacturing plant

How to plan a WAN network linking a toy manufacturing plant? Plan a WAN network linking a toy manufacturing plant (located in Dallas Texas) with two division centres (Los Angeles, California and Pittsburgh, Pennsylvania)

  The development and implementation of biometric system

Do you support the development and implementation of biometric optical surveillance system (BOSS) as a crowd surveillance tool for police departments?

  Define research question for the orthogonal-coded regression

Write Section 3 of the DAA. Specify a research question for dummy-coded regression. Articulate a null hypothesis and alternative hypothesis for the overall.

  What hybrid connectivity feature do you need to implement

What hybrid connectivity feature do you need to implement to get full coexistence? a. Minimal Hybrid Configuration b. Exchange Classic Hybrid

  Which is of the least importance to the organization

It is clear that people, information, and information technology are all crucial components of any organization. Out of the three, which is to believe

  Write your response on a new wireless network

Suppose your neighbor upgraded to a new wireless network and did not make it secure. Is it ethical for you to tap into his/her network.

  Generate the word internationalist in two ways

Write a PROLOG grammar that will generate the word internationalist in two ways, one for each understanding.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd