Security-related legal-regulatory compliance

Assignment Help Basic Computer Science
Reference no: EM131427448

You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department.

Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

  • Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing
  • Compliance with privacy related laws and regulations
  • Adequacy of security policies and security awareness training
  • Identification of security related risks/threats

Include a minimum of two audit steps for each of the areas listed above. The audit steps should follow the following format:

  • Area: From the list above
    • Example: Security related risks/threats
  • Potential Risk to be Reviewed: Describe the risk
    • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data
  • Evaluation of Tools and Methods: Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
    • Example: Determine whether anti-virus software is in use
    • Example: Determine whether virus signatures are periodically updated
    • Example: Determine whether periodic virus scans are performed
  • Criteria/Measures to be Used: Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
    • Example: 100% of servers and PCs have virus software installed
    • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
    • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly

Your grade on the assignment will be based on how well you address:

  • The identification of potential ethical, legal/regulatory, privacy, and security related issues (20%)
  • The evaluation of the tools and methods used to mitigate any ethical, legal/regulatory, and privacy related issues identified, as well as the tools and methods used to perform the review steps (20%)
  • The evaluation of the tools and methods used to mitigate any security-related issues identified, as well as the tools and methods used to perform the review steps (25%)
  • Criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., how will you determine that the risk has been mitigated to an acceptable level) (20%)
  • Quality of written communication
  • Use of APA format/style

Include a 1/2- to 1-page executive summary and support your presentation with appropriate references.

Submit your assignment using the Assignment Files tab.

Reference no: EM131427448

Questions Cloud

Software-application software : In your own words.Computers have both system software and application software installed. What is the difference between system software and application software?
What are the mean and the standard deviation : What is the probability that between 9 and 15 of them became your friends because you asked them? Include the possibilities of 9 and 15 in your calculations.
How the three trucking companies should account for it : Explain how Lifschultz can report negative book value and, at the same time, have its shares so highly valued in the stock market.
Discuss single interesting or surprising thing you learned : Discuss the single most interesting or surprising thing you learned in the BBA program, as well as what made it so.
Security-related legal-regulatory compliance : Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:
Demonstrate your awareness of building control legislation : CPCCSV5013A: Assessment - This task has been designed to enable you to demonstrate your awareness of building control legislation relevant to Energy Efficiency in your State or Territory.
Discuss philip morris’s disclosure and accrual : the potential economic consequences associated with the disclosure and accounting treatment.
How you will use the lessons learned in your bba program : Discuss how you will use the lessons learned in your BBA program to be more productive in your current (or future) career. Provide specific examples to support your response.
Compare function must have arguments for a and b : Write a compare function that returns 1 if a > b , 0 if a == b , and -1 if a

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the pros and cons of thick or thin client char.

Explain the pros and cons of thick or thin client characteristics.

  Analyzing complex formulas using evaluate formula

In this project, you will finalize a gradebook by entering formulas to compute final grades and class statistics. Analyzing Complex Formulas Using Evaluate Formula

  Write one function that reads the input using alias paramete

Write one function that reads the input using alias parameters (reference parameters).Write a second function that calculates the pay amount. If the salesperson owes money, thereturn amount from the function is a negative number.

  How do you remember order of operations

How do you remember order of operations? If you use a calculator for computation, is order of operations still important? Why or why not? What are some of the possible outcomes when order of operations is ignored?

  Kb with the following rules

Suppose we have a KB with the following rules, use forward chaining or backward chaining to show S11 is true, i.e. when 7B00 and 7B10, the space 11 is not a trap and it is safe. "7" means "Not".

  Problem and proposed opportunity

Why is it important to keep your audience in mind as you determine what level of information and detail is appropriate? What role does the cost-benefit relationship play as you frame the problem and proposed opportunity?

  The basic sociological fact in buddhism

1. The basic sociological fact in Buddhism is _______. a. Karma b. Samgha

  How many times is the beq read instruction executed

Assume that the time taken to display each character is much less than the time between the entry of successive characters at the keyboard.

  Calculate the earliest start/earliest

Software Project Management- Assignment 2 Consider the RedBus project described Assignment 1. Now, perform additional project management analyses on this project:

  Numbers and pass them to the function

Write a C# function called Compare Numbers to compare two numbers and return a code that indicates their relationship: 0 if they are equal, 1 if the first number is larger, and -1 if the first number is smaller. Your main module should prompt the ..

  Write and test a version of selection sort for linked lists

Write and test a version of selection sort for linked lists. Write a program to test insertion sort for linked lists.

  What are the 3 different types of opcodes for the lc3

What are the 3 different types of opcodes for the LC3

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd