Explain how performing periodic security assessments

Assignment Help Business Law and Ethics
Reference no: EM13787187

1. From your computer workstation, create a new text document called Compliance Lab #4.

2. Review the following scenario:

Your organization is a governmental agency that serves a vital role in homeland security functions. In fact, your hiring took longer than you would have liked because it seemed as though the organization's managers wanted to know a lot about you before they gave you clearance to work. After a year at the job, your manager feels your progress has come a long way, so she is giving you more responsibility and has asked you to analyze the benefits of reporting risks, threats, and vulnerabilities in an IT assessment that is under way. Your manager would like for you to conduct research and report your findings about the type of vulnerabilities that require disclosure and when it is lawful or unlawful to conceal information produced by vulnerability assessments. She would also like for you to include some trends on current security threats and the types of responsible disclosure being performed by other organizations.

3. Launch your Web browser and type in the Web address https://www.sans.org. In the Custom Search box on the Web page's upper right corner, search for "How do we define Responsible Disclosure?" On the search results page, click on the top link labeled "How do we define Responsible Disclosure?" to open the pdf article. Read about the following topics:

a. Vulnerability Life Cycle
b. Types of Disclosure
c. Nondisclosure
d. Full Disclosure
e. Limited Disclosure
f. Responsible Disclosure
g. Existing Policies and Proposals

In your text document, note one relevant point about each section.

4. In your Web browser, open the document "Symantec Global Internet Security Threat Report" provided by Symantec Corporation at https://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. Review the Highlights section of the document that discusses the main concepts in each section. Then, review the following topics in the document:

a. Threat Activity Trends
b. Vulnerability Trends
c. Malicious Code Trends
d. Phishing, Underground Economy Servers, and Spam Trends
In your text document, note one relevant point about each section.

5. In your Web browser, type the Web address https://www.zerodayinitiative.com/advisories/published/. Review some of the links on the page provided by the respected security experts at TippingPoint DVLabs and others.

6. Research other available resources (Internet resources, your textbook, and so on) to validate how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance.

7. In your text document, write an executive summary describing how security assessments throughout the seven domains of a typical IT infrastructure can help organizations achieve compliance by mitigating risks and threats.

8. Submit the text document to your instructor as a deliverable for this lab.

Reference no: EM13787187

Questions Cloud

Differences between allopathic pharmacists and professional : differences between allopathic pharmacists and professional herbalists.
Write a program that uses a recursive algorithm to compute : Write a program that uses a recursive algorithm to compute the determinant of a maxtrix. It should read a matrix, print it out, and compute and print the determinant.
About cam-application and caution : CAM-Application and Caution
Case study on organization behavior : Case study on Organization behavior
Explain how performing periodic security assessments : the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organ..
An assignment on pdca cycle : PDCA Cycle
Record the bad debts expense : Management estimates that 1% is the sales percentage to use. What adjusting entry will Hahn Company make to record the bad debts expense?
Primary source of stockholders : A primary source of stockholders' equity is
Examine performance management issues and processes : Examine performance management issues and processes

Reviews

Write a Review

 

Business Law and Ethics Questions & Answers

  Why it is necessary or important to the recovery of inmates

You supervisor needs you to identify, describe, and justify the elements you will want to utilize in the program as well as a list of why it is necessary or important to the recovery of the inmates in your program. Use the following list as a guid..

  Bsed on the statutes you researched evaluate whether mere

1.explain your home states laws that prohibit conduct that would be considerednbspnbspnbspnbsp predatory.2.analyze the

  Was the principle of prudent person observed

Discuss if damages were awarded in the case. If damages were awarded, discuss why the judge/jury awarded the damages. If no damages were awarded, discuss why the judge/jury didn't award damages. Discuss the history of malpractice insurance and its cu..

  What characteristics does patricia hearst possess

What characteristics does Patricia Hearst possess that could sway a jury against her? As a result, what characteristics should the prosecuting attorney look for when selecting a jury

  What causes of action does steve have

Steve is renting a property from Billy. One evening Steve tripped and fell down the stairs. What causes of action does Steve have? What remedies does he have for the faulty heater?

  Write a 1050- to 1400-word paper describing the core

write a 1050- to 1400-word paper describing the core concepts of physical security security assessments and basic

  Benefits for a paralegal to be able to shepardize

Next, identify at least two (2) benefits for a paralegal to be able to shepardize in print form as well as online. Provide a rationale for your response

  How business leaders addressed the human impact of terrorist

Soft Target Case Study Analysis: Research the November 2008 Mumbai attacks, Assess how business leaders addressed the human impact of terrorist events

  Indecent language in various media far mor

Today children are likely to be exposed to indecent language in various media far mor eoften thtn they were in 1970, when the FCC first began sanction indecent speech. Does this mean that we need more stingent or less stingent regulation broadcast?

  Writenbspa 1050- to 1500-word paper comparing juvenile

writenbspa 1050- to 1500-word paper comparing juvenile courts with adult courts. include the following in your paperan

  What are some legal excuses for non performance or other

what is the difference between a material breach of contract and a non material breach of contract? what are some

  Brief comparison of jail and prison inmates

A brief comparison of jail and prison inmates, A brief comparison of male and female inmates' backgrounds, A brief comparison of state and federal inmates, including the difference between prison life in private and nonprivate prisons

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd