Security-related legal-regulatory compliance

Assignment Help Basic Computer Science
Reference no: EM131427448

You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department.

Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

  • Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing
  • Compliance with privacy related laws and regulations
  • Adequacy of security policies and security awareness training
  • Identification of security related risks/threats

Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format:

  • Area: From the list above
    • Example: Security related risks/threats
  • Potential Risk to be Reviewed: Describe the risk
    • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data
  • Evaluation of Tools and Methods: Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
    • Example: Determine whether anti-virus software is in use
    • Example: Determine whether virus signatures are periodically updated
    • Example: Determine whether periodic virus scans are performed
  • Criteria/Measures to be Used: Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
    • Example: 100% of servers and PCs have virus software installed
    • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
    • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly

Your grade on the assignment will be based on how well you address:

  • The identification of potential ethical, legal/regulatory, privacy, and security related issues (20%)
  • The evaluation of the tools and methods used to mitigate any ethical, legal/regulatory, and privacy related issues identified, as well as the tools and methods used to perform the review steps (20%)
  • The evaluation of the tools and methods used to mitigate any security-related issues identified, as well as the tools and methods used to perform the review steps (25%)
  • Criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., how will you determine that the risk has been mitigated to an acceptable level) (20%)
  • Quality of written communication
  • Use of APA format/style

Include a 1/2- to 1-page executive summary and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.

Reference no: EM131427448

Questions Cloud

Software-application software : In your own words.Computers have both system software and application software installed. What is the difference between system software and application software?
What are the mean and the standard deviation : What is the probability that between 9 and 15 of them became your friends because you asked them? Include the possibilities of 9 and 15 in your calculations.
How the three trucking companies should account for it : Explain how Lifschultz can report negative book value and, at the same time, have its shares so highly valued in the stock market.
Discuss single interesting or surprising thing you learned : Discuss the single most interesting or surprising thing you learned in the BBA program, as well as what made it so.
Security-related legal-regulatory compliance : Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:
Demonstrate your awareness of building control legislation : CPCCSV5013A: Assessment - This task has been designed to enable you to demonstrate your awareness of building control legislation relevant to Energy Efficiency in your State or Territory.
Discuss philip morris’s disclosure and accrual : the potential economic consequences associated with the disclosure and accounting treatment.
How you will use the lessons learned in your bba program : Discuss how you will use the lessons learned in your BBA program to be more productive in your current (or future) career. Provide specific examples to support your response.
Compare function must have arguments for a and b : Write a compare function that returns 1 if a > b , 0 if a == b , and -1 if a

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Difference between an scm audit and a technical review

Can their function be folded into one review? What are the pros and cons?

  Determine the worth of this position.

Finish your report by stating if this job is eligible to be in the union. Explain why or why not.

  Describe basic computer hardware component standards

Describe basic computer hardware component standards. Describe basic hardware devices and their specifications. Describe characteristics of computer hardware device components.

  Need to provide a descriptive profile

Need to provide a descriptive profile of what an individual in this user  group would need when interacting with the district's networking infrastructure. Components could include:

  Demand function

Whe the price of meat Rp 30.000,00 / kg, the amount demanded 50 kg. At the time the price rose to USD 40,000.00 / kg the amount requested to be 30 kg. Demand function is

  Estimate the cost of the system

What capabilities beyond the minimum do you need now and so that your computer does not become obsolete, what additional features do you think you will need within the next 2 or 3 years?

  Show how many days are in the month

Complete the printMonth(int numDays, int startDay) method below to print a calendar month. The parameters numDays and startDay show how many days are in the month, and which day of the week the month starts on

  In an overview, describe the multics operating system

In an overview, describe the Multics operating system project which was under taken at MIT in the 1960's. Identify any impacts and influences Multics has had on modern day trends in developing secure and trusted software.

  Determine the mass flow rate of water flowing

The power dissipation of the box is 2 kW, which is removed entirely by water. If the box operates 24 hours a day, 365 days a year, determine the mass flow rate of water flowing through the box and the amount of cooling water used per year.

  Find the magnitude and the direction of the resultant force

Physics Two forces, one of 30 N and the other of 50 N, act on an object. If the angle between the forces is 40°, find the magnitude and the direction of the resultant force.

  For what type of matrices is the cg method suitable

How are search direction and step size (or step length) related to the methods of Section 7.4?

  Calculate the number of integers divisible

Calculate the number of integers divisible by 4 between 50 and 500, inclusive. Hexadecimal digits are formed using either a numeric decimal digit or a letter from A to F. How many possible digits can be chosen? Did you use the sum rule or the produ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd