Describe policies standards processes and guidelines

Assignment Help Computer Network Security
Reference no: EM131230458

Computer Science

Select a company or any existing business. This can be the company you currently work for. If you cannot find information about the security infrastructure of a company, you may make up the details as realistic as possible. Over the next few weeks you will utilize this company for the main project.

Your company wishes to ensure that know and understand they various regulatory acts they are required comply with and understand. This first assignment will allow you to establish the Key Assignment Template that will be used throughout the class for all Individual Project Submissions.

First, you will start by providing an overview of the company you have chosen. Be sure to describe its current security infrastructure.

Second, explore the regulations applicable for Security Compliance. You will:

• Describe 5 different Federal Regulations your company needs to understand and have compliance
• Describe 2 different State Regulations your company needs to understand and have compliance
• Discuss how each of these regulations are applicable to the company

The template document should follow this format:

• Security Compliance Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Section 1- Company Overview
o Section 2 - Federal and State Regulations, Directives, and Acts
o Section 3 - Compliance Plan
o Section 4 - Acceptable Use Policy
o Section 5 - Certification and Accreditation
o Section 6 - Preparing for Certification

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Section 1 - Company Overview
• Section 2 - Federal and State Regulations, Directives, and Acts

o Identify and describe 5 Federal Regulations
o Identify and describe 2 State Regulations
o Describe how each apply to the specific company

• Section 3 - Compliance Plan

o Describe Policies, Standards, Processes and Guidelines
o Discuss the relationship between Controls and Audits
o The Sarbanes-Oxley Act
o The different implications Regulations have on Government and non-Government entities

• Section 4 - Acceptable Use Policy

o Global Regulations
o Safe Harbor
o Work Councils
o Acceptable Use Policy and Enforcement Ethics

• Section 5 - Certification and Accreditation

o Certification and Accreditation
o Certification and Accreditation Frameworks

• Section 6 - Preparing for Certification

o DIACAP
o ISO27002

Add the discussion about the Company Overview and the Federal and State regulations to the sections titled: Company Overview and Federal and State Regulations, Directives, and Acts.

Reference no: EM131230458

Questions Cloud

Think of viable business venture : Think of a viable business venture you could embark on and share your ideas using the following questions: Which niches can you own in this proposed venture? Of these which would be the most profitable?
How do these ideas relate to how you experience leadership : What are the key ideas that Simon Sinek presents in the beginning of his book. How do these ideas relate to how you experience leadership today? Describe the roles that E.S.D.O play in leadership. How can knowing this chemistry benefit a leader? What..
Describe the concept of due care and due diligence : Discuss the importance of the security professional to be knowledgeable with State and Federal Regulations, Directives, and Acts. Describe the concept of due care and due diligence.
Estimate long term fraction of time they have each cuisine : Suppose a dinner clubs eats out once a week, and the members have a choice of Chinese, Italian, or American cuisine. They never eat the same cuisine two weeks in a row. If they have American the first week, what is the probablility they have Chinese ..
Describe policies standards processes and guidelines : Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.
In pursuing opportunities in foreign markets : In pursuing opportunities in foreign markets, MNEs may choose to adopt either a global strategy or a multi-domestic strategy. What are the conditions under which either a global or a multi-domestic strategy will make most sense? Use examples to illus..
Describe policy issue for your selected role specialization : Describe a policy issue for your selected role specialization. Synthesize knowledge for values theory, ethics, and legal regulatory statutes, and develop a personal philosophy that will map out a policy strategy that uses a high degree of politica..
What are the problem solving processes you will embark on : Assume that you are the hospital administrator of a 150-bed hospital located in a smalltown. Your best friend Betty works for the local newspaper in town. One day Betty calls you and informs you about a rumor that one of the ER nurses in your hospita..
Which types of systems is each operating system most suited : Compare and contrast at least 2 network operating systems. For which types of systems is each operating system most suited, and why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Content filtering and protection

How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  What is cryptanalysis

What is cryptanalysis. Give an example of a cryptanalytic problem. Describe the components of a digital stream cipher.

  The six principles of nclb

The six principles of NCLB

  Explain what the control helps mitigate in a scada system

Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system?

  Prepare an employee acceptable use policy

Employee IT Acceptable Use Policy Prepare an employee acceptable use policy for a real or fictional organization to address its information systems, technology and assets.

  Show that the given encryption system is perfectly secure

Show that the given encryption system is perfectly secure for , by checking the definition given in class for perfect security - version 1 (Note: you need to consider an arbitrary distribution on because the definition must hold for all possible d..

  Difference between enterprise and it architecture

What is the difference between enterprise architecture and IT architecture and should enterprise architecture really be called "IT" architecture?"

  Description of the task the pseudo-code

Create a Word document. The document should contain: a brief description of the task the pseudo-code associated with the task. Create a Visual Logic file to execute each of the tasks

  Case study- risk management policy

Case Study- Risk Management Policy, You have just been hired as an Information Security Engineer for a large, multi-international corporation.

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Information security

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge in addressing issues around security in the organisational environment. T..

  Security threats to mobile devices and counter measures

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd