Systems development life cycle and security life cycle

Assignment Help Basic Computer Science
Reference no: EM133086556

1. Safeguarding Against Security Threats

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Individuals and organizations today face a variety of security threats. To protect themselves from these threats, they usually take certain protective measures-commonly known as safeguards.

Select and research three common security threats (e.g., ransomware, phishing) and identify at least two safeguards that can mitigate the risks of each threat. Explain when the safeguards are effective and when they are not. Lastly, describe any disadvantages of the safeguards from the perspectives of the IT manager, as well as from employees at the organization.

2. GDPR

Access the EU's General Data Protection Regulation (GDPR) that went into effect on May 25, 2018. Review the requirements of the GDPR. Write a summary of the impact of the GDPR and then create recommendations on data protection for the United States. Consider the following questions as you create your recommendation:

What protections do European citizens have through the GDPR?

What are the advantages and disadvantages of the GDPR? Consider the perspectives of consumers as well as businesses.

Did the GDPR have a global impact? How did it impact US companies?

What information do companies collect on US citizens, including location information, search history, and social media posts? Think about what someone would know about you if they could see your entire search history.

Access and read Google's Privacy Policy. Is there anything in the privacy policy that makes you uncomfortable?

3. Digital Rights Management

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Explain the concept of digital rights management (DRM). Why do organizations use DRM technology to protect intellectual capital? What is a typical DRM application that can be used to manage access to digital content? What are the ethical and legal implications of DRM? What are the overall advantages and disadvantages of DRM?

4. Organizational policies and laws

As an IT manager, describe how you would use organizational policies, federal, state, and local laws, and ethics to guide how to set up your IT architecture, IT policies, and communications with employees. Express how each of those items will influence your decision-making. When necessary, cite specific policies, laws, or ethical frameworks.

5. Information Security Risks

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Describe the steps that an organization takes in order to manage information security risks and build a risk matrix. What is involved in each step of this process? Use a specific organization in your response.

6. Security Life Cycle Steps

Explain the differences between the systems development life cycle (SDLC) and the security life cycle. Include both management and non-management IT security positions that perform security life cycle steps and briefly describe their roles.

Reference no: EM133086556

Questions Cloud

Write a report outlining : Assume you are the CEO of a Canadian electric car company and you want to become a global player. This means that you sell to other countries, source products f
Characteristics of an effective supervisory relationship : How would you describe the approach that you, yourself, would take if you were in a supervisory position? What do you see as the most important characteristics
How cmc could take advantage of future vbp initiatives : Should VBP be incorporated into CMC's strategic planning process?
Explain well-designed templates : Explain why well-designed templates can be important to a business or organization that is looking for recognition for its "brand".
Systems development life cycle and security life cycle : Explain the differences between the systems development life cycle (SDLC) and the security life cycle.
Identify the relevant legislation : In the table below, identify the relevant legislation and/or enterprise guidelines that protects workers and customers from the inconsistent behaviour noted in
What is ip in a business context : What is I.P in a business context and how it is under threat globally? Please give 2 examples of what the threat is, how it can be manifested
What types of measurements might you use : What types of measurements might you use? What competencies would you seek - measure the competencies of current potential human service workers
What ways globalization has eased technology transfers : Technology and innovation: In what ways Globalization has eased technology transfers to other countries. Provide an example for each.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd