Analyze proper physical access control safeguards

Assignment Help Management Information Sys
Reference no: EM132212940

Assignment

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist.

The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building.

Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records.

The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five page paper in which you:

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

Recommend the proper audit controls to be employed in the registrar's office.

Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132212940

Questions Cloud

Determine the number of equivalent units : Lake Surf Company uses an automated process to clean and polish its merchandise items. For March 2017, the company conducted the following activities.
Which method should be used to best reflect the performance : The management of Hil is wondering how the increase in ownership will affect the reporting of the investment in Ton. Will Hil continue to classify.
Define the scope of an it compliance audit : Define the scope of an IT compliance audit that would verify whether or not this organization is in compliance with the laws you identified.
Determine design techniques and guidelines to help deter : Describe how the concepts of territoriality and natural surveillance can help determine design techniques and guidelines to help deter crime.
Analyze proper physical access control safeguards : Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.
Having awareness of how people are motivated is component : Having an awareness of how people are motivated is a component of ______. In the CAPP Strengths model, weaknesses are ______.
Describe the communication barriers in working with client : Demonstrate clear understanding of the communication skills required for effectively communicating with the elderly. Describe the communication barriers
Explain the costs involved in the creation of the system : Describe the ongoing maintenance that will be required. Provide a workflow diagram in Visio or equivalent software to illustrate how the system will work.
What was the likely root cause of this failure : Technical projects fail when they deliver significantly late, substantially over budget, and/or with significant features missing or unusable.

Reviews

Write a Review

Management Information Sys Questions & Answers

  The security aspects of social networking

Ethical issues associated with certain information security law or regulation (can be at international, national, state, or organizational level)

  Propose improvements to the business process

Propose improvements to the business process. Draw a revised process diagram/model that reflects the improved business process.

  Describe how information systems can be utilized

Information System Management (COMP1006) - Describe how information systems can be utilized to enhance external environment in any business process.

  Discuss the pros and cons of cloud computing

Explain how cloud computing can be used for business continuity and disaster recovery. Discuss the pros and cons of cloud computing.

  The relationship between those being observed

Students must describe the environment and the people being observed, i.e., age, gender, dress, etc.

  Identify management and single sign on systems

Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?

  Describe rapid application development

Describe rapid application development in your own words. In your answer, include key terms, advantages, and disadvantages.

  Why adhering to the four fundamental design principles

Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness. Support your answer by using a specific business sector or industry (i.e., manufacturing, distribution, govern..

  How are you ensuring that your problem is research worthy

Why do you think scholars, researchers & graduate student research papers include literature reviews?

  How to prepare a security plan that would be contained

Prepare a 260-word minimum outline using Microsoft Word focused on how to prepare a security plan that would be contained within a Business Continuity Plan.

  Explain the competitive advantage of a real business

Write a 2 page paper where you explain the competitive advantage of a real or imagined business.Describe the business in detail.

  Identify the computers operating system

Identify the computer's operating system, version of operating system, processor, and total memory (RAM) installed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd