Describe the main elements of sarbanes-oxley act

Assignment Help Computer Engineering
Reference no: EM131143903

Computer Ethics

E-Activity

The Sarbanes-Oxley Act (SOX) was enacted to protect shareholders from fraudulent activities. Likewise, there are controls, including IT controls, which organizations need to implement to be complaint with SOX. Review the elements of SOX using the information, located at https://www.soxlaw.com/, and be prepared to discuss.

Discussion 1

"SOX" Please respond to the following:

• From the e-Activity, describe the main elements of SOX and identify the controls organizations need to implement to be compliant with SOX.

• From the e-Activity, choose the element of SOX you believe is most difficult or challenging for organizations to implement and explain why. Suggest the controls organizations should implement to mitigate the issue you chose.

eActivity

The Federal Information Security Management Act (FISMA) provides many standards and guidance for implementing effective security management programs. Review the information, located at https://csrc.nist.gov/groups/SMA/fisma/index.html, and be prepared to discuss.

Discussion 1

"FISMA and NIST" Please respond to the following:

• From the e-Activity, describe the main elements of FISMA in the management and governance of federal information systems.

• From the e-Activity, examine how FISMA and NIST work together to provide guidance and direction to organizations and agencies.

Info Systems

Discussion 1

"Patterns of Behavior" Please respond to the following:

• Give your opinion as to whether "Heat Seekers" and "Followers" could coexist within the same organization. State the negatives and positives associated with both patterns of behavior.

Discussion 2

"Getting to Know the Industry" Please respond to the following:

• Evaluate the competitive applications of technology. List and describe two applications and how these can be applied to the information systems industry.

Discussion 1

"ITPM Best Practices" Please respond to the following:

• Assess the systems development life-cycle (SDLC) and explain how the life cycle, when executed properly, can maximize business value. Note: All stakeholders point of view should be considered.

Discussion 2

"Service Delivery Models" Please respond to the following:

• Determine how a company's selection of a Service Delivery Model could impact business value (positive and negative). Provide an example to justify your response.

Reference no: EM131143903

Questions Cloud

What is the total manufacturing cost : Redman Company manufactures customized desks. The following pertains to Job No. 978: - What is the total manufacturing cost for Job No. 978?
Determine the shearing stress at points a and b : A torque T = 750 kN.m is applied to the hollow shaft shown that has a uniform 8-mm wall thickness. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Prepare a cost of goods sold section for the year ending : Prepare a cost of goods sold section for the year ending August 31 (periodic inventory).
Estimate the first three natural frequencies : Estimate the first three natural frequencies of a clamped-free bar of length l in torsional vibration by using a lumped-mass model and four elements.
Describe the main elements of sarbanes-oxley act : From the e-Activity, describe the main elements of SOX and identify the controls organizations need to implement to be compliant with SOX.
How contractor operations could adversely affect heath : Most organizations hire contractors in some capacity, either to aid in production work or to provide ancillary services, such as cleaning, maintenance, remodeling, and food service. Discuss how a contractor's operations could adversely affect the ..
Compute the missing amounts : Presented below is financial information for two different companies.
Determine the shearing stress at points a and b : A 750-N.m torque is applied to a hollow shaft having the cross section shown and a uniform 6-mm wall thickness. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Determine the cost of goods available for sale : Determine the cost of goods available for sale. - Determine the ending inventory and- Determine the cost of goods sold under each of the assumed cost flow methods.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the probability that the contention ends on round

Two CSMA/CD stations are each trying to transmit long (multiframe) files. After each frame is sent, they contend for the channel using the binary exponential backoff algorithm. What is the likely that the contention ends on round , for k What is t..

  Plan the diagram using visio or word

You would develop the entity relationship diagram (ERD) for your project database based on the initial data requirements.

  Fnd out two blogs which describe web site design trends

question 1 find two blogs that discuss web site design trends. on each site find blog entries on a specific

  Give one huge advantage of using javascript

One huge advantage of using JavaScript is you can accept input from the visitors to your site. As a visitor adds information to your form, what would you do to control inappropriately entered values.

  Questionalgorithm secreta0n - 1input an array a0n - 1 of n

questionalgorithm secreta0..n - 1input an array a0..n - 1 of n real numbersminval larr a0 maxval larr a0for i larr 1 to

  Suppose password, email, name and address, max score

the password should not be same as employee ID and must contain 4-6 characters

  Make a phonebook application using c++

make a Phonebook application using C++ STL (standard template library). Use the telephone number as the key and the name as the value.

  Categorizing the threat

Download a password cracker developed for your operating system. Run the cracker on your system. Describe the results from cracker.

  A power plant is analyzed as a simple rankine cycle with a

a power plant is analyzed as a simple rankine cycle with a boiler operating at a pressure of 7 mpa. steam leaves the

  Market adoption technical architecture technical support

virtualization is generally defined as the creation of a virtual version of a computer object. the computer objects may

  Identifying the information security problem

In relation to the project management tools, discuss and give two examples or scenarios in order to demonstrate how the work breakdown structure could recognize and plan an information security problem or issue in the organisation.

  How many function of three variable are there of n variables

There exist four Boolean functions of a single variable and 16 functions of two vari- ables. How many functions of three variables are there? Of n variables?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd