Analyze proper physical access control safeguards

Assignment Help Management Information Sys
Reference no: EM132049816

Assignment : Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist.

The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building.

Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records.

The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records.

The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five page paper in which you:

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

Recommend the proper audit controls to be employed in the registrar's office.

Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132049816

Questions Cloud

What are the weights of each of its capital components : A company currently has 2000 bonds issued with a par value of $1000 and a price of $750, What are the weights of each of its capital components?
How is the rate of glycolysis controlled : Mention the reaction steps and corresponding enzymes that are subjected to regulation and the biochemical and thermodynamic basis of glycolysis control.
What is the present value of the given amount to be recieved : What is the present value of the following amount $318,102 to be recieved 12 years from now discounted back to the present at 7 percent compounded annually.
Some people claim meditation has a wide range of benefits : Some people claim meditation has a wide range of benefits. What are some of the benefits that can be supported by scientific evidence?
Analyze proper physical access control safeguards : Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.
Explain the anatomical mechanism that could cause : Can you explain the anatomical mechanism that could cause this ineffectiveness?
What are swank interest tax saving from the issuance of debt : Presently, H. Swank, Inc. does not use any financial leverage and has total financing equal to $1.1 million. It is considering refinancing and issuing $499,000.
What is the expected return on this stock : Waffle House Inc. has a beta of 1.2, the expected return on the market is 13, and the risk-free rate is 2.8. What is the expected return on this stock?
Calculate the predetermined overhead rate : Calculate the predetermined overhead rate for 2014, assuming Degelman Company estimates total manufacturing overhead costs of $1,049,850

Reviews

Write a Review

Management Information Sys Questions & Answers

  Approaches of the organization for solving the problems

Provide a background of the organization and fully describe six components of the organization's supply chain. Examine the potential problems related to each of the components described and explain the approaches of the organization for solving th..

  Write an essay about the evolution of e-commerce marketing

Write an essay about the evolution of E-commerce marketing. Use an appropriate number of references to support your position, and defend your arguments.

  How aggregate functions help the organization understand

Synthesize how aggregate functions help the organization understand employee performance.

  Explain information security threats and vulnerabilities

Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology and Explain information security threats and vulnerabilities in plain English to small business owners

  What factors use the it professionals use

Explain the candidates research to other students, potential committee members etc..What factors use the IT professionals use to determine the purchase?

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks.

  Assess all key business processes and it compliance factors

Assess all key business processes and IT compliance factors and link to all business processes to develop an aggregate vision of IT compliance.

  Elements of walmarts strategy

Elements of Walmart's strategy have evolved in meaningful ways since the company's founding in 1962

  Describe the information that can be discovered in email

Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Yahoo! System.

  Implement lean supply chain management

Customer base in North America with the suppliers located in China, it is possible to implement lean supply chain management.

  Write your proposal as a memo to review c- suite

Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better.

  Show challenges associated with requirement elicitation

What are some of the challenges associated with requirement elicitation and How

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd