Explain the security risks and applicable laws

Assignment Help Basic Computer Science
Reference no: EM13764348

You are an information security manager for a large retail sporting goods store. The sporting goods store is involved in the following in which they:

• Maintain an internal network and an intranet protected by a firewall

• Maintain a Web server in the DMZ that is protected by another firewall

• Accept credit card sales in the store and over the Web via e-Commerce transactions

• Maintain an email server for employee email communication and communication with other business partners and customers

• Maintain a wireless network within the store

• Use RFID for inventory and theft prevention

• Maintain a Facebook presence

• Provide health screening for high blood pressure, high cholesterol, and other potential health risks

The CEO is concerned about the amount of information that is being collected and maintained within the organization.

Write a three to five (3-5) page paper in which you:

1. Describe the major privacy issues facing organizations today.

2. Analyze the major privacy issues described above and compare that to the potential privacy risks facing the sporting goods store.

3. Explain the security risks and applicable laws that govern the privacy risk.

4. Describe the security measures that the organization needs to implement to mitigate the risks.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13764348

Questions Cloud

Leveraging power from batna : Assuming your Best Alternative to a Negotiating Agreement (BATNA) is letting a court sell the property, discuss how it may help you reach an agreement. Recommend other strategies that you could use to accomplish a successful negotiation.
Explanation of the nutritional theory : What? (A thorough explanation of the nutritional theory or concept on which you have chosen to write; this should pertain specifically to what you have gleaned from your study during the class.)
Was williamson''s intoxication sufficient to void mortgage : Wiliamson, an alcoholic who was threatened with foreclosure on her house entered into a contract to sell it for $17,000. Was Williamson's intoxication sufficient to void the mortgage
Executing a shell script : Use vim (Lab Manual, page 34) to create a file named short with the follow¬ing line in it: echo 'hi there'
Explain the security risks and applicable laws : Explain the security risks and applicable laws that govern the privacy risk. Describe the security measures that the organization needs to implement to mitigate the risks.
How would americans react to gay marriage today : How would Americans react to such a crime today? Consider current and proposed legislation (and attitudes) towards hate crimes, gay marriage, gay parenting, and gay rights.
What are the four requirements of a valid contract : What are the four requirements of a valid contract? Explain each requirement and why it is important. Who are the parties to this License Agreement? Is this a unilateral or bilateral contract? Is this a formal or informal contract? Is this an e..
Problems related to diseases : Identify any known risk factors; include any age groups, race, genders that are affected more than others.Describe any known prevention methods.
Produce the complete actual emergency operations plan : You are not required to produce the complete actual emergency operations plan, but you are expected to develop the categories of the plan, with corresponding bullet statements about the variety and depth of issues covered under each category

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Function that uses a switch statement

To locate nearest numbered cross street for a given avenue address, the following algorithm can be used: cancel last diget of the address, divide by two,

  Write an essay on turing machine explain with examples

Write an essay on turing machine explain with examples

  Write a method called sumarray

Write a method called sumArray that takes in as a parameter an array of integers x and returns an integer. Your method should return the sum of all the values stored in x .

  Explain the means of investigating trademark

Discuss and explain the means of investigating trademark and copyright infringement, sexual harassment incidents, and child pornography and laws concerning those incidents.

  The solution is some real number

Let P be a problem. For any instance x ∈ P, the solution is some real number f(x). Let A be a randomized algorithm for P, such that it gives a solution A(x) that lies in [1/2f(x), 2f(x)] with probability 2/3.

  Which address should be evicted at each replacement

An MRU replacement policy? Which address should be evicted at each replacement to maximize the number of hits? How many hits does this address sequence exhibit if you follow this optimal policy?

  Identify defragmentation problems

For these reasons, you should defragment your hard drive every week as part of a good maintenance plan. Defragmenting rearranges files on the drive into as few segments as possible. Identify defragmentation problems.

  Write a short code fragment to add the even numbers

1.Write a short code fragment to add the even numbers from 1 to 10 using an 8086 processor and the instructions given in the lecture. 2.Search the web for the programming model for a Zilog Z80 microprocessor and compare it with the programming m..

  Calculate the oil production rate

Calculate the oil production rate and calculate the well skin effect - Calculate oil rates of two wells in an undersaturated oil reservoir using generalized Vogel's equation.

  What is the current size of q

Suppose an initially-empty queue Q has performed a total of 32 enqueue operations, 10 front operations, and 15 dequeue operations, 5 of which generated QueueEmptyExceptions,

  Information assets to estimate for risk management

If organization has three information assets to estimate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first?

  Discuss the legal theories used by the plaintiff to recover

products liability research paper due week 10 and worth 250 points select a company that has been the subject of a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd