Security-related legal-regulatory compliance

Assignment Help Basic Computer Science
Reference no: EM131427448

You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department.

Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

  • Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing
  • Compliance with privacy related laws and regulations
  • Adequacy of security policies and security awareness training
  • Identification of security related risks/threats

Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format:

  • Area: From the list above
    • Example: Security related risks/threats
  • Potential Risk to be Reviewed: Describe the risk
    • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data
  • Evaluation of Tools and Methods: Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
    • Example: Determine whether anti-virus software is in use
    • Example: Determine whether virus signatures are periodically updated
    • Example: Determine whether periodic virus scans are performed
  • Criteria/Measures to be Used: Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
    • Example: 100% of servers and PCs have virus software installed
    • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
    • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly

Your grade on the assignment will be based on how well you address:

  • The identification of potential ethical, legal/regulatory, privacy, and security related issues (20%)
  • The evaluation of the tools and methods used to mitigate any ethical, legal/regulatory, and privacy related issues identified, as well as the tools and methods used to perform the review steps (20%)
  • The evaluation of the tools and methods used to mitigate any security-related issues identified, as well as the tools and methods used to perform the review steps (25%)
  • Criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., how will you determine that the risk has been mitigated to an acceptable level) (20%)
  • Quality of written communication
  • Use of APA format/style

Include a 1/2- to 1-page executive summary and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.

Reference no: EM131427448

Questions Cloud

Software-application software : In your own words.Computers have both system software and application software installed. What is the difference between system software and application software?
What are the mean and the standard deviation : What is the probability that between 9 and 15 of them became your friends because you asked them? Include the possibilities of 9 and 15 in your calculations.
How the three trucking companies should account for it : Explain how Lifschultz can report negative book value and, at the same time, have its shares so highly valued in the stock market.
Discuss single interesting or surprising thing you learned : Discuss the single most interesting or surprising thing you learned in the BBA program, as well as what made it so.
Security-related legal-regulatory compliance : Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:
Demonstrate your awareness of building control legislation : CPCCSV5013A: Assessment - This task has been designed to enable you to demonstrate your awareness of building control legislation relevant to Energy Efficiency in your State or Territory.
Discuss philip morris’s disclosure and accrual : the potential economic consequences associated with the disclosure and accounting treatment.
How you will use the lessons learned in your bba program : Discuss how you will use the lessons learned in your BBA program to be more productive in your current (or future) career. Provide specific examples to support your response.
Compare function must have arguments for a and b : Write a compare function that returns 1 if a > b , 0 if a == b , and -1 if a

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd