Systems development life cycle and security life cycle

Assignment Help Basic Computer Science
Reference no: EM133086556

1. Safeguarding Against Security Threats

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Individuals and organizations today face a variety of security threats. To protect themselves from these threats, they usually take certain protective measures-commonly known as safeguards.

Select and research three common security threats (e.g., ransomware, phishing) and identify at least two safeguards that can mitigate the risks of each threat. Explain when the safeguards are effective and when they are not. Lastly, describe any disadvantages of the safeguards from the perspectives of the IT manager, as well as from employees at the organization.

2. GDPR

Access the EU's General Data Protection Regulation (GDPR) that went into effect on May 25, 2018. Review the requirements of the GDPR. Write a summary of the impact of the GDPR and then create recommendations on data protection for the United States. Consider the following questions as you create your recommendation:

What protections do European citizens have through the GDPR?

What are the advantages and disadvantages of the GDPR? Consider the perspectives of consumers as well as businesses.

Did the GDPR have a global impact? How did it impact US companies?

What information do companies collect on US citizens, including location information, search history, and social media posts? Think about what someone would know about you if they could see your entire search history.

Access and read Google's Privacy Policy. Is there anything in the privacy policy that makes you uncomfortable?

3. Digital Rights Management

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Explain the concept of digital rights management (DRM). Why do organizations use DRM technology to protect intellectual capital? What is a typical DRM application that can be used to manage access to digital content? What are the ethical and legal implications of DRM? What are the overall advantages and disadvantages of DRM?

4. Organizational policies and laws

As an IT manager, describe how you would use organizational policies, federal, state, and local laws, and ethics to guide how to set up your IT architecture, IT policies, and communications with employees. Express how each of those items will influence your decision-making. When necessary, cite specific policies, laws, or ethical frameworks.

5. Information Security Risks

A reflection is meant to illustrate your understanding of the material and how it affects your ideas and possible practice in the future.

Describe the steps that an organization takes in order to manage information security risks and build a risk matrix. What is involved in each step of this process? Use a specific organization in your response.

6. Security Life Cycle Steps

Explain the differences between the systems development life cycle (SDLC) and the security life cycle. Include both management and non-management IT security positions that perform security life cycle steps and briefly describe their roles.

Reference no: EM133086556

Questions Cloud

Write a report outlining : Assume you are the CEO of a Canadian electric car company and you want to become a global player. This means that you sell to other countries, source products f
Characteristics of an effective supervisory relationship : How would you describe the approach that you, yourself, would take if you were in a supervisory position? What do you see as the most important characteristics
How cmc could take advantage of future vbp initiatives : Should VBP be incorporated into CMC's strategic planning process?
Explain well-designed templates : Explain why well-designed templates can be important to a business or organization that is looking for recognition for its "brand".
Systems development life cycle and security life cycle : Explain the differences between the systems development life cycle (SDLC) and the security life cycle.
Identify the relevant legislation : In the table below, identify the relevant legislation and/or enterprise guidelines that protects workers and customers from the inconsistent behaviour noted in
What is ip in a business context : What is I.P in a business context and how it is under threat globally? Please give 2 examples of what the threat is, how it can be manifested
What types of measurements might you use : What types of measurements might you use? What competencies would you seek - measure the competencies of current potential human service workers
What ways globalization has eased technology transfers : Technology and innovation: In what ways Globalization has eased technology transfers to other countries. Provide an example for each.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide a method to add the earned interest to the account

It is not possible to deposit additional funds into this account. Provide a withdraw method that removes the entire balance. Partial withdrawals are not allowed.

  How to disassembling and reassembling laptops

Identifying Purposes and Characteristics of Processors. Identifying Purposes and Characteristics of Memory. How to Disassembling and Reassembling Laptops. How to Installing and Configuring Expansion Cards

  Which exceptions can each of these instructions trigger

If there is a separate handler address for each exception, show how the pipeline organization must be changed to be able to handle this exception. You can assume that the addresses of these handlers are known when the processor is designed.

  What are the issues and challenges with circuit city

What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

  Multilayer user access control

Identify what implementation method(s) can be used to incorporate multilayer access control. Describe and how each method benefits multilayered access control.

  How do these relate to key OB concepts and theories

What are the people issues and how do these relate to key OB concepts and theories?

  What is the regulatory response thus far regarding bitcoin

What is the regulatory response thus far regarding bitcoin? How should Brown factor in potential regulation into his investment thesis?

  Provide how the knowledge of the course have been applied

Provide how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

  Formula without using a function

In cell G7, enter a formula without using a function that divides Joan's total bonus (cell E7) by her base salary (cell B7).

  Apparatuses of the united states

How you perceive the readiness of each of the security apparatuses of the United States (law enforcement, intelligence, and military).

  Write a report on ip tables installation configuration

Write a report on "IP Tables Installation Configuration"

  Explain possible sources of upward bias in the rate

Using the arguments presented in the chapter, explain possible sources of upward bias in the rate you calculate, relative to the actual trend of food prices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd