Analyze the compliance and regulatory issues

Assignment Help Computer Network Security
Reference no: EM13863846

IT Controls and Countermeasures

Objective: Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

Competencies: Critical thinking, decision making

In 8-10 double-spaced pages, each student analyzes the policies, vulnerabilities, risks and internal controls for a French bank that was a victim of a large scale fraud and recommends improvements to the company's IT security policies. Relate the identified policies, vulnerabilities, risks and internal controls to the technical material and vulnerability identification & exploitation materials presented in the Erickson and Weidman texts.

This assignment calls for a systematic analysis of an organization's policies, vulnerabilities, risks, and internal controls as well as their relationship to current vulnerability identification and exploitation technologies. Many scientific, engineering, information, and accounting disciplines advocate general steps to problem solving utilizing a systems approach. At this point in your academic career, you should be proficient at applying such a general approach to solving specific problems. Select and adapt such an approach with which you are most comfortable from your prior professional and academic experiences to apply to this assignment. Suggested steps to the general systems approach to problem solving are as follows:

1. Define the problem
2. Identify evaluation criteria/measures of effectiveness
3. Identify alternatives/solutions
4. Evaluate/analyze alternatives utilizing analytical techniques consistent with step 2 criteria/measures
5. Select and display preferred alternative(s)/solution(s) consistent with the analysis in step 4
6. Implement and monitor step 5 solution(s)

Refer to the French Bank in the following URLs

and your specific readings regarding security controls, audits, inspections, risk assessment, and countermeasures. Utilizing an appropriate methodology for analysis (which may be adapted from the above 6 steps), identify a set of 7-10 recommendations toward solving the fraud issue of the French Bank. The systems analysis approach as applied within the areas of risk analysis, vulnerability assessment, internal audits, and policy analysis should yield adequate justification for your recommendations.

There are three additional things to keep in mind. First, defining the problem or issue will require a data gathering stage. Second, problem solving is not a once-through sequence of steps always performed in a specified order. It is full of iteration and feedback loops. Finally, you will not be able to implement and monitor your recommendations in this assignment. Perhaps that means provisions for implementation and monitoring should be part of your evaluation criteria. It does not help the client to offer solutions that are prohibitively costly to implement.

The students

• identify and discuss the policies, vulnerabilities, risks and internal controls for the French bank

• evaluate the weaknesses and impact on secure bank operations

• recommend and discuss 7-10 security controls and countermeasures for mitigating problems in and improving the bank's security posture.

• discuss the methods that organizations can use to effectively achieve the adoption and implementation of the security policies, controls and countermeasures.

Prepare your paper in either Word or PDF format as your instructor requires. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count.

Verified Expert

Reference no: EM13863846

Develop and enforce operational procedures

Countermeasures to consider for your responses: Fix known exploitable software flaws Develop and enforce operational procedures and access controls (data and system) Provide

Enterprise network design and network size

In small networks, the web of router links is not complex, and paths to individual destinations are easily deduced. However, in large networks, the resulting web is highly c

Describe how bob can recover the message

FIT3031 - Information & Network Security - Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in CBC mode and describe how Bob can rec

Explain what the control helps mitigate in a scada system

Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system?

Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what

How many intermediate authorities do they employ

How many intermediate authorities do they employ? How many certificates have they signed? Do not limit yourself to these questions, but provide a thorough overview of how th

Anti-virus applications

Should an organization's anti-virus policy specify that anti-virus applications will be configured to quarantine infected files instead of deleting them automatically? Why or

Critical to information security in the modern day

When considering the most critical to information security in the modern day, one of the most credible is one that has seen a recent increase in occurrence over the past dec


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd