Reference no: EM13779923
Impact of Legislation on Organizations (NASA)
I choose NASA as my project so please use NASA. Please follow all directions and the rubric as well. No plagrisim.
Overview
During Week 1, you selected an organization (or your professor assigned an organization) that you will use for your authentic assessment projects. You must use the same organization throughout the course. Do not ask to change organizations. The purpose of project 1 is to research and evaluate the legislative drivers for information security programs within an organizational context and then write a well-researched critical analysis of legal and regulatory compliance of an organization's information security program.
Learning Objectives
At the completion of this project, students should
1.Be familiar with current legislative and regulatory (passed or proposed) requirements for information security programs
2.Be able to interpret and apply legislative and regulatory requirements for information security programs within an organizational context.
3.Be able to develop criteria for assessing legislative and regulatory compliance for an organization's information security program.
Deliverable
Your research paper should be no more than three (3) full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the three-page minimum. Papers not meeting the three full-page minimum will lose points. You must have at least three scholarly sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.
Detailed Description of Learning Activity
1.Review the following four documents (see course content): 1) May 2011 Cyber Security Legislative Proposal, 2) the proposed Cyber Security Act of 2012, 3) Executive Order (EO) 13636 Improving Critical Infrastructure Cybersecurity, and 4) Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience.
2.Review the selected organization's information security program and program evaluation reports.
3.Select three (3) to five (5) points of analysis from the resources listed in item 1 above. Your points of analysis must be specific items from the legislative proposals, the EO, or the PPD.
4.Research the impacts of the points of analysis on the selected organization's information security program.
5.Write your research paper. At a minimum, the paper should include
1.An Introduction that includes the purpose of your paper, describes your selected organization, and introduces your points of analysis.
2.A Points of Analysis section that describes your points of analysis and explains why you selected each point of analysis
3.An Analysis/Research section associated with each point of analysis explaining how the selected point of analysis will impact/did impact
your selected organization's security program (be specific)
4.A Conclusion that summarizes the purpose of your paper and describes the key findings from each point of analysis.
6.Use spell and grammar check before submitting. It is also a good idea to have someone else read your paper. You should also review the
grading rubric (Appendix C) to ensure that you have included all the graded components.
How does the theory address the problem of crime
: How does the theory address the problem of crime? How are cultural influences on crime integrated into the theory? What solutions for the individual, family, community, and society does the theory suggest
|
Just-in-time materials management
: Discuss your thoughts about just-in-time materials management, its value, shortcomings, and provide an example of where it may be implemented. Below is a brief discussion of JIT vs. MRP. Two approaches have had a major impact on inventory management:..
|
Create two objects p and q and generate 10 random numbers
: Create Two objects P and Q. in object P the array a is type int and size 10, in Q array a is string type and size 12b. Generate 10 random numbers
|
Transmitted illnesses and the social justice framework
: Consider general access to care, maintenance of health and prevention of illness, and treatment of illness. Briefly compare differences in scope (the extent and relevance to the issue of social justice) of two the conditions, obesity and HIV/AIDS...
|
Impact of legislation on organizations
: Your research paper should be no more than three (3) full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page.
|
Determine the activities of the intelligence community
: There are steps that should be taken that can produce results with minimum errors. These steps, known as the intelligence cycle, include planning, collection, processing, analysis, and dissemination. The intelligence cycle is used to determine t..
|
Neurological disorders that can occur in development
: Write 500 word essay on 2 different neurological disorders that can occur in development and how it affects development, In addition, discuss what research suggests about the effects of spiritual disciplines (prayer, meditation) on neurobiology A..
|
Explain step of king outlines for their nonviolent campaign
: List and explain the four-step process King outlines for their nonviolent campaign.
|
Analysis of raw information
: The Intelligence-Led Policing (ILP) that is occurring within the scenario involving Major Warren is not something that is uncommon. ILP is composed of six different steps in order to guide decision making when relying on the analysis of raw infor..
|