Justify every element in ethical and legal terms

Assignment Help Computer Engineering
Reference no: EM131723349

Preparation: Choose a real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its products, services, activities, and/or operations. If you work in an organization or field that could benefit from an information network security policy, you might wish to apply the project to it.

Assignment: Prepare a well-written security policy proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and policy.

Make sure that your proposal includes the basic elements of a good security policy including:

1. Introduction describing your organization and its mission, products/services, technical resources, and technical strategy
2. Analysis of the organization's relationships to its clients/customers, staff, management, and owners or other stakeholders
3. A vulnerability assessment
4. Your recommendation, including:
5. a. Proposed remedial measures (as appropriate to the situation; these might include firewall/gateway provisions, authentication and authorization, encryption systems, intrusion detection, virus detection, incident reporting, education/training, etc.
6. b. Proposed code of ethics or code of practice to be applied within the organization
7. c. Legal/compliance requirements and description of how they will be met
8. d. Proposed security policy statement/summary

Important: Your proposal must justify every element in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (i.e., how it is good for the organization and why it is good for customers, users, or employees, or the public). Also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.

Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 8-10 pages long with document and citation formatting per CSU-Global Guide to Writing and APA Requirements.

Recommendation: It is recommended that students review Chapter 8 in the course textbook, which is required reading for Module 6, early in the term and apply the knowledge therein to planning and drafting the Portfolio Project. In Chapters, 8, 10, and 12, Kizza (2014) discussed the role of a security policy in the compliance of an organization. He observed that in response to public outcry in the 1990s, governments went on a binge passing laws to regulate the new Internet. But privacy advocates pushed back and by the early 2000s, the result of much politicking was a mixed system of sectoral laws (dealing with specific situations) and largely voluntary norms. These norms were adopted by organizations and enshrined in security and privacy policies regarding data and networking. Kizza (2014) made the point that, "A good, balanced and unified approach to information security compliance consists of a good security policy that effectively balances and enforces core information security and compliance elements" (p. 199).

Incremental Deliverable due by 11:59 PM on Sunday of Week 2

Submit a brief description of the "real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, activities, or operations" that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information network security policy, consider using your place of employment as the scenario for your project.

Your description should be at least a paragraph and no more than a page in length.

Reference no: EM131723349

Questions Cloud

Determine james maximum available line of credit : If the appraised value of James's residence is $197,500, what percentage of the home's esti­mated market value is the lender using to determine James's maximum?
Discuss evaluating security software : Use Internet resources or the Ashford University Library to identify two competing security products such as antivirus software
Do you anticipate the innovations the companies is engaging : Do you anticipate the innovations the companies is engaging in now will put the company, Facebook, on a good path to growth in the future?
Describing consumer lending field in given statements : What term in the consumer lending field does each of the following statements describe?Plastic card used to pay for goods and services without borrowing money.
Justify every element in ethical and legal terms : proposal must justify every element in ethical and legal terms
Can you think of an example related to environmental justice : Can you think of an example related to environmental justice? No landfill though as we have had extensive discussions on that example.
With multiple departments arranged by resource type : With multiple departments arranged by resource type, conventional general hospitals are _____.
Fee simple absolute and fee simple conditional : What are the key differences between a Fee Simple Absolute and a Fee Simple Conditional?
Describing the federal law : Which federal law or laws apply to each of the situations described below? A loan officer asks an individual requesting a loan about her race.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a data frame that is equivalent to the sas data

Read inPrecipitation.dat using R. Submit your code, and a listing and an str() of the data frame you created. (Hint: you will need to handle the missing value correctly. Read in Traffic.dat using R and create a data frame that is equivalent to the ..

  Develop systems administration procedures

Develop systems administration procedures to configure and manage host-based security capabilities (firewalland anti-virus/anti-malware).

  What effect does have on the address translation process

The PMMU can be programmed to treat the high-order three address bits from the 68020 address bus in a special way. What way and why?

  Determine how many gates can be packed into an ic

Out of the 14 pins available in a standard TTL SSI circuit package, two pins 10.6 are used for V, and Ground. The following gates are required.

  Find the distortions when a uniform quantizer is used

[Uniform Quantizer with Levels Set to the Midpoints] Find the distortions when a uniform quantizer is used to quantize a zero-mean, unitvariance Gaussian.

  This is an individually prepared assessment task in this

q. that governments need to do more to safeguard the internet from hacking and cyber warfare because such activity

  Describe difference between uninformed and informed searches

Write a short essay (800-1000 words) that addresses the following: Describe the difference between uninformed and informed searches.

  Determine who is attending conferences and events

Determine who is attending conferences and events. This will promote fostering relationships and ensure coverage of conferences that are considered of high importance.

  Modify a for loop that calculates the total

modify a While Loop that lets the user enter a number. The number should be multiplied by 10, and result stored in a variable named product. The loop should iterate as long as product contains a value less than 100.

  Which algorithm makes the most efficient use of memory

Given memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb (in order), how will each of the first-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb (in order)?Which algorithm makes the most ef..

  Questionone of compensation to writing a program that is

questionone of compensation to writing a program that is subdivided into modules is that such a structure allows unlike

  Evolution of software and hospital improvements

Discuss how the hospitals are improving the efforts along with their supply chain through the evolution of software.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd