Analyze proper physical access control safeguards

Assignment Help Management Information Sys
Reference no: EM132049816

Assignment : Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist.

The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building.

Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records.

The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records.

The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five page paper in which you:

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

Recommend the proper audit controls to be employed in the registrar's office.

Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132049816

Questions Cloud

What are the weights of each of its capital components : A company currently has 2000 bonds issued with a par value of $1000 and a price of $750, What are the weights of each of its capital components?
How is the rate of glycolysis controlled : Mention the reaction steps and corresponding enzymes that are subjected to regulation and the biochemical and thermodynamic basis of glycolysis control.
What is the present value of the given amount to be recieved : What is the present value of the following amount $318,102 to be recieved 12 years from now discounted back to the present at 7 percent compounded annually.
Some people claim meditation has a wide range of benefits : Some people claim meditation has a wide range of benefits. What are some of the benefits that can be supported by scientific evidence?
Analyze proper physical access control safeguards : Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.
Explain the anatomical mechanism that could cause : Can you explain the anatomical mechanism that could cause this ineffectiveness?
What are swank interest tax saving from the issuance of debt : Presently, H. Swank, Inc. does not use any financial leverage and has total financing equal to $1.1 million. It is considering refinancing and issuing $499,000.
What is the expected return on this stock : Waffle House Inc. has a beta of 1.2, the expected return on the market is 13, and the risk-free rate is 2.8. What is the expected return on this stock?
Calculate the predetermined overhead rate : Calculate the predetermined overhead rate for 2014, assuming Degelman Company estimates total manufacturing overhead costs of $1,049,850

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Why did siemens create an open innovation initiative

Why did Siemens create an open innovation initiative and what metrics should be used by Siemens to assess the effectiveness of open innovation?

  Explain the mobile computing and its business implications

Select a topic from the following list on which you would like to conduct an in-depth investigation: Information systems infrastructure: evolution and trends .

  Review articles on group information dependence problem

Develop power presentation of the 4 articles. Support your presentation with appropriate references. Use APA format throughout.

  Explain in detail why you believe the risk management

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization. Draft a one (1) page Executive Summary that details your strategies and recommendations to..

  Provide health screening for high blood pressure

Maintain an email server for employee email communication and communication with other business partners and customers.

  Provide an overview of the server-side and client-side

Provide an overview of the server-side and client-side hardware and software requirements of your information system (Defense Travel System).

  Network solutions inc nsi provides network services

network solutions inc nsi provides network services to...network solutions inc nsi provides network services to large

  Find system development tools or techniques

Information Systems - SDLC Principles - With that in mind, use the Cybrary to research and find system development tools or techniques that are available and popular today.

  Define wireless technologies and mobile technologies

Determine the wireless technologies and mobile technologies that Delta has implemented.Define wireless technologies and mobile technologies.

  Show the concept of environmental sustainability

The three teleological frameworks and the three deontological frameworks. What are the merits and demerits of each? Of these six frameworks, with which one do you most associate?

  How many will get an inappropriate medication

Two medications are used to treat a disease. One is appropriate 90% of the time, the other is appropriate just 10% of the time.

  Describe the four components of an information system

Describe the four components of an information system. Why is it important to consider each of them when designing and installing an information system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd