Review the hhs information security program

Assignment Help Computer Network Security
Reference no: EM131218133

Project: Effect of Legislation on Organizations

The purpose of this is assignment is to 1) conduct research related to the impact of legislation on the HHS security program and 2) write a research paper.

Learning Objective - At the completion of this project students should 1) be familiar with current cyber legislation (passed and proposed), 2) be able to discuss their organization's information security program, and 3) be able to discuss the impacts of cyber legislation on the information security program.

Media - Students will use the Internet and Microsoft Word. The HHS relevant web sources are available in Webliography/Internet. Students will also use information contained in the May 2011 Cyber Security Legislative Proposal and the proposed Cyber Security Act of 2012.

Deliverable - Your research paper should be at least three full pages, single spaced, 1-inch margins, New Times Roman 12-Pitch font, include a cover page (names, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the three-page minimum. Papers not meeting the three full-page minimum will lose points. You must have at least three scholarly sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.

Detailed Description of Learning Activity -

1. Review the May 2011 Cyber Security Legislative Proposal and the proposed Cyber Security Act of 2012.

2. Review the HHS information security program.

3. Select three to five points of analysis from the proposal (#1 above). Your points of analysis must be specific items from the legislative proposal or the legislation, which if became law, would impose cyber security requirements on HHS.

4. Research the impacts of your selections from #3 above the HHS information security program.

5. Write your research paper. At a minimum, the paper should include: a. An introduction that includes the purpose of your paper and describing HHS mission, b. The Points of Analysis section that describes your points and why you picked them, c. The Analysis section relating your Points of Analysis with your research and the HHS information security program, and d. A conclusion that summarizes what you wrote.

6. Use Spell and Grammar Checker before submitting. It is also a good idea to have someone else read your paper. You should also review the below grading rubric to ensure you have all the graded components.

7. Submit the project to the appropriate TurnItIn assignment area by the due date.Only one team member is required to submit the paper on behalf of the team.

8. USING THE ATTACHED TEMPLATE IS MANDATORY. You will earn zero points if you do not use the template.

Reference no: EM131218133

Questions Cloud

Recommendations to the it steering committee : Write a 350- to 700-word memo, individually, based on your Week Five Learning Team Collaborative discussion, with your recommendations to the IT Steering Committee. Include the following content in your paper:
Total amount of a meal purchased at a restaurant : Tip, Tax, and Total Design a program that calculates the total amount of a meal purchased at a restaurant. The program should ask the user to enter the charge for the food, and then calculate the amount of a 15 percent tip and 7 percent sales tax...
Construct a budget that provide a breakdown : Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Find a polynomial function that has zeros : Identify the left-hand and right-hand behavior of the graph of the polynomial function f(x) = 6x3- 5x + 4. Find a polynomial function that has zeros at -3, -1, and -2. Do not leave it in factored form, but multiply out your answer.
Review the hhs information security program : Review the HHS information security program. Select three to five points of analysis from the proposal (#1 above). Your points of analysis must be specific items from the legislative proposal or the legislation.
Occupancy rate for floor : Write a program that calculates and display the occupancy rate for each floor and the entire hotel. The program should start by asking for the number of floors in the hotel.
Does it appear that movie critics like high-budget movies : Using regression, does it appear that critics and audience members agree on what a movie should be rated? Why or why not?
Responses in the form of a term paper : Select one (1) of the following topics in which you will base your responses in the form of a term paper:
Two figures from the humanities : Write a paper and include two figures from the Humanities.-  compare and contrast their achievements.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the big issue, namely privacy vs convenience

Discuss the big issue, namely privacy vs. convenience, from the perspective of marketing. What are the benefits? What are the ethical issues?

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy of DaimlerChrysler

  Explain the challenges of attribution

Explain the challenges of attribution and how you believe this impacts cyber intelligence. Would you rank cyber threats above those of terrorism? Why or why not

  Identify potential physical threats that require attention

Identify at least five potential physical threats that require attention. Determine the impact of at least five potential logical threats that require attention.

  Discuss the state secrets privilege and how it is used

Discuss the "state secrets" privilege and how it is used. What is the "third party" doctrine and explain how it has been applied in the cases we have read this term.

  What a great definition of cryptography

Timothy, what a great definition, cryptography is the science of decoding information with a key and like Timothy stated, these keys are both "public (lock) and private (unlock)."

  What is the purpose of the random nonces in ssl handshake

What is the difference between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Please be specific and justify your answer.

  Discuss the 7 vulnerabilities

Write 3 page paper that will discuss the 7 vulnerabilities, their risks to Riordan Manufacturing, how they ranked, and how the organization should prevent against them

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd