Describe the role of information systems security compliance

Assignment Help Management Information Sys
Reference no: EM131262562

• Assignment 1: Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two (2) assistant registrars, two (2) student workers, and one (1) receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five (3-5) page paper in which you:

1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

2. Recommend the proper audit controls to be employed in the registrar's office.

3. Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

o Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

o Use technology and information resources to research issues in security strategy and policy formation.

o Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131262562

Questions Cloud

Did the police have probable cause to arrest ayers : Did the police have probable cause to arrest Ayers? If they did have probable cause, should they have conducted the arrest?
Drawing on the material in the background readings : Does the paper fully address all Keys to the Assignment? Are the concepts behind the Keys to the Assignment addressed accurately and precisely using sound logic? Does the paper meet minimum length requirements?
Responsible for detecting fraud within an organisation : Who is responsible for detecting fraud within an organisation? What is the auditor’s responsibility? What should they do to meet their responsibility? Give specific examples.
Balance of the sales account in the general ledger : Freya started her business on 1 September. During September she made cash sales of $6,400 and issued credit sales invoices for $10,200 of which $8,600 had been paid. What would be the balance of the sales account in the general ledger at the end of S..
Describe the role of information systems security compliance : Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method. Analyze the means in which data moves within the organization and identify techniq..
How will your venture be socially responsible : You have invented a personal submarine that can operate at about 10-20 feet below the surface of the ocean or a lake. It has windows for viewing. Describe your strategy in one or two sentences that could be circulated to your employees and allies. 5...
What is the estimated raw materials inventory balance : Morganton Company makes one product and it provided the following information to help prepare the master budget for its first four months of operations: Forty percent of credit sales are collected in the month of the sale and 60% in the following mon..
Discuss the importance of services to the economy : Discuss the importance of services to the economy. - which gives the latest numbers for Business Employment Dynamics. What trends to you see? Do the numbers support the information?
Aspects of the scripps recruitment : Watch the video titled "Scripps," located in Week 5 of your Blackboard course. From the video, isolate one (1) of the many aspects of the Scripps recruitment and interview process that could be most attributable to Scripps' ample supply of registe..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify and discuss of the companies go-live readiness

Identify and critically discuss of the companies Go-Live readiness. Use the textbook material and the additional academic sources to back up your argument (in text citation).

  Important information about computer applications

Important information about Computer Applications and What is the difference between custom animation and transition effects? When are they appropriate?

  Identify key components of customer service operational crm

He plans to use a BI system that would advise him on the school programs that he could retain and the programs that he can suspend to meet his budget target. Sketch a BI architecture diagram, mentioning possible BI tools application he can use and,..

  Sales department use crm to improve operations

CRM and ERP - How can a sales department use CRM to improve operations?

  Step-wise answer to supply chain management700-1050-word

step-wise answer to supply chain management700-1050-word paper in which you outline the supply chain of your

  What is the purpose of an in-circuit emulator

Cloud Computingis used as a means to provide off-site computing power to an organization. Describe the three main types of Cloud Computing platforms. What is the purpose of the control unit in a channel architecture? What type of computer generall..

  Describe how the organization''s policies

Describe how the organization's policies and standards would be administered to meet the key requirements of accepted industry standards.

  Evaluate online tools for business collaboration

Create an online meeting presentation to evaluate online tools for business collaboration. Research and use each tool to collect details on the following evaluation parameters:

  Question onenbsp herbert simon and allen newell explored

question onenbsp herbert simon and allen newell explored human decision making management science and artificial

  Managing data security

Managing Data Security-Imagine you are part of a security policy development team. Compose four policies that could prevent threats to the information assets of an organization

  Prepare an implementation and management plan

Prepare an implementation and management plan for a wireless network including defining the organizational problem(s) like organization goals or communication issues

  How changing business environment has affected the decisions

Explain how the changing business environment has affected the decisions team members' organizations have made in their use of information technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd