Standards relating to information security

Assignment Help Basic Computer Science
Reference no: EM132406173

Essay that fulfills the following criteria and guidelines below using the attached document.

A. Address ethical issues for cybersecurity by doing the following:

1. Discuss the ethical guidelines or standards relating to information security that should apply to the case study.

a. Justify your reasoning and cite examples of relevant ethical guidelines used by other organizations.

2. Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.

3. Discuss what factors at TechFite led to lax ethical behavior.

B. Describe ways to mitigate problems and build security awareness by doing the following:

1. Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.

2. Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.

a. Explain how the SATE program will be communicated to TechFite employees.

b. Justify the SATE program's relevance to mitigating the undesirable behaviors at TechFite.

- The discussion logically addresses the ethical guidelines or standards relating to information security that should apply to the case study.

- The justification logically addresses the reasoning of the ethical considerations or guidelines, and the examples of relevant ethical guidelines used by other organizations are logical and clear.

- The identification of the unethical behavior of individuals or groups is accurate.

- The discussion of the factors at TechFite that led to lax ethical behavior is clear and logical.

- The description contains 2 information security policies, specific to the case study that may have minimized the criminal activity, negligent acts, and threats to intellectual property.

- The description of key components of a SATE program that could be implemented at TechFite is relevant and applicable to the case study.

- The explanation of how the SATE program will be communicated to TechFite employees is logical.

- The justification of the SATE program's relevance to mitigating the undesirable behaviors at TechFite is logical.

- The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. Or the candidate does not use sources.

- Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.

Attachment:- Tech Fite Case Study.rar

Reference no: EM132406173

Questions Cloud

Cloud services for business continuity and disaster recovery : Define business continuity and disaster recovery. Explain new risks associated with using cloud services based on the functions of the business
Laws and regulations in complex it environment is difficult : Maintaining compliance with laws and regulations in a complex IT environment is difficult.
What is security baseline definition : Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? What is a security baseline definition?
The importance of stakeholder engagement in policymaking : Discussed the importance of stakeholder engagement in policymaking. The authors presented several benefits and an analysis of five cases
Standards relating to information security : Discuss the ethical guidelines or standards relating to information security that should apply to the case study.
Erm and risk : Mini-case studies on ERM and risk. Akawini management team on how they should promote and monitor the transformation of risk management in their business.
Combating proliferation of drugs : Explain how you would use data available to you to prepare a report for the Governor for the State Program "Combating Proliferation of Drugs."
Digital forensics professional must know basic it skills : A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills,
Some challenges to policy making in developing countries : Some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational and Analytical Center,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Competitive environment for zappos for substitutes

Explain and provide references on the competitive environment for Zappos for substitutes.

  Describe different types of session hijacking

Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session

  Point out which following functions exist and which cannot

Point out which of the following functions can exist and which cannot. Provide either reasons for functions that cannot exist, or examples for functions that can exist a. A bijection from Ø to 2^Ø b. A bijection from ? to ?

  Consists of several sub-budgets such as sales budget

The master budget consists of several sub-budgets such as sales budget, expense budgets, purchase budget, capital budget and so on.

  What is the test statistic for a sample proportion

To test H0: p = 0.500, what is the test statistic for a sample proportion 0.566 and sample size 70. Enter your answer with 3 decimal places.

  How large is the memory of the computer

Consider a computer that you have used or now use. (You may make an assumption on word size if needed.) How large is the memory of the computer?

  Implement the event-driven simulation of a bank

For example, the input fi le shown in the left columns of the following table should produce the output shown in the right column.

  Type of strategic approach

What type of strategic approach do they use? Explain.

  Based on the data analysis methods covered thus far

Based on the Data Analysis methods covered thus far, select four data analysis methods. identify how the way the element has been used can be improved.

  Project Management And SDLC

The purpose of project management and the SDLC is to increase successful software implementation.

  Why you believe this amount of resources is warranted

Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted.

  Inferential statistics in decision making

Inferential Statistics in Decision Making, have been applied or could be applied, in a practical manner to your current work environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd