Sarbanes-oxley act

Assignment Help Computer Network Security
Reference no: EM13759265

Security Regulation Compliance

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

Reference no: EM13759265

Questions Cloud

Cancer : Approaches to prevention and control of the disease.
Employees rights to freedom of expression on or off the job : To what extent do employees retain the right of freedom of speech on the job? Off the job? What about the freedom of expression? Are there limits to an employee's rights to freedom of expression on or off the job?
How would you integrate the different units of wilson : Given Wilson Sporting Goods company's geographically diverse locations, various sport categories, and multiple products it is important for them to have employees who specialize. For example Billy is a baseball equipment sales agent and Jeannie is in..
Analyze issue using social contract and rule utilitarianism : Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.
Sarbanes-oxley act : Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act
Means of verification of cash-inventory-office equipment : "The best means of verification of cash, inventory, office equipment, and nearly all other assets is a physical count of units; only a physical count gives the auditors complete assurance as to the accuracy of the amounts listed on the balance sheet"..
Discuss specific malware and social engineer : Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.
Compare multi-domestic-global and transnational strategies : Compare and contrast multi-domestic, global, and transnational strategies. What environmental factors influence a firm's international strategy? What are the benefits and risks of international diversification? What are the challenges of managing mul..
Monetary base and the banks reserve ratio : Calculate the monetary base and the banks reserve ratio. - Calculate the total money creation in the economy with the help of formula.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote).

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  Role of ethics in developing the certification package

Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Write down a 1000- to 1500-word paper explaining the

write a 1000- to 1500-word paper describing the importance of policies and standards for maintaining information

  Modern networks have to support a number of digital data

modern networks have to support a number of digital data protocols as well as digital audio protocols. the ability to

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd