Guidance provided by department of health and human services

Assignment Help Computer Network Security
Reference no: EM13758280

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Reference no: EM13758280

Questions Cloud

Perform a functional dependency analysis : Sample data and make any assumptions you need about the company. Make any comments about the approach that you are going to follow, as you see fit - Perform a functional dependency analysis, and include it as part of your deliverables, for every s..
Explain the regulatory compliance law : From the e-Activity, explain the regulatory compliance law that you researched, and ascertain the effect that information security could have on such a law
Deductive logic appear in all business communications : Inductive and deductive logic appear in all business communications that will give the basis of your argument. What other (5) considerations should also be made in the design of your message?
A plan for planning : Case: You are a consultant for a Fabric company that burned down, this company was the only source of income for many of the town people they all worked there, as a consultant to the owner how to rebuild the company to where it will be better than be..
Guidance provided by department of health and human services : Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements
Annual reports for the coca-cola company and pepsico : Using 2007 annual reports for The Coca-Cola Company and PepsiCo, Inc., answer the following questions. Write these up in a Word document, clearly identifying your response to each lettered item. Show supporting calculations for the items lettered ..
Discuss a preschool classroom and a classroom for children : Discuss a preschool classroom and a classroom for children five years old or more. Describe how the environments should use the principle of age appropriateness
Core competencies and network-based strategies : How does Procter and Gamble Company address change; consider the use of BPM/BPR and other change processes. How is Procter and Gamble Company using synergies, core competencies and network-based strategies to achieve competitive advantage?
What element of establishing an organizational strategy : Satisfying the customers of an organization is a requirement for business success. Therefore, customer perceptions matter when trying to decide what products and services the organization will offer. What element of establishing an organizational str..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Describe the new method in details and theoretical basis

Analyze advantages and weaknesses of the new protection method (e. g. implementation cost, runtime, reliability, stability and etc.)

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Create a communication medium

Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd