Analyze the compliance and regulatory issues

Assignment Help Management Information Sys
Reference no: EM131725312

Individual Assignment : IT Controls and Countermeasures

Objective: Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

Competencies: Critical thinking, decision making

Individual Assignment

In 9-10 double-spaced pages, each student analyzes the policies, vulnerabilities, risks and internal controls for a French bank that was a victim of a large scale fraud and recommends improvements to the company's IT security policies.

Relate the identified policies, vulnerabilities, risks and internal controls to the technical material and vulnerability identification & exploitation materials presented in your readings and research.

This assignment calls for a systematic analysis of an organization's policies, vulnerabilities, risks, and internal controls as well as their relationship to current vulnerability identification and exploitation technologies.

Many scientific, engineering, information, and accounting disciplines advocate general steps to problem solving utilizing a systems approach. At this point in your academic career, you should be proficient at applying such a general approach to solving specific problems.

Select and adapt such an approach with which you are most comfortable from your prior professional and academic experiences to apply to this assignment.

Suggested steps to the general systems approach to problem solving are as follows:

Define the problem

Identify evaluation criteria/measures of effectiveness

Identify alternatives/solutions

Evaluate/analyze alternatives utilizing analytical techniques consistent with step 2 criteria/measures

Select and display preferred alternative(s)/solution(s) consistent with the analysis in step 4

Implement and monitor step 5 solution(s) and your specific readings regarding security controls, audits, inspections, risk assessment, and countermeasures.

Utilizing an appropriate methodology for analysis (which may be adapted from the above 6 steps), identify a set of 7-10 recommendations toward solving the fraud issue of the French Bank.

The systems analysis approach as applied within the areas of risk analysis, vulnerability assessment, internal audits, and policy analysis should yield adequate justification for your recommendations.

There are three additional things to keep in mind. First, defining the problem or issue will require a data gathering stage. Second, problem solving is not a once-through sequence of steps always performed in a specified order.

It is full of iteration and feedback loops. Finally, you will not be able to implement and monitor your recommendations in this assignment.

Perhaps that means provisions for implementation and monitoring should be part of your evaluation criteria. It does not help the client to offer solutions that are prohibitively costly to implement.

The students

identify and discuss the policies, vulnerabilities, risks and internal controls for the French bank;

evaluate the weaknesses and impact on secure bank operations;

recommend and discuss 7-10 security controls and countermeasures for mitigating problems in and improving the bank's security posture; and

discuss the methods that organizations can use to effectively achieve the adoption and implementation of the security policies, controls and countermeasures.

Prepare your paper in either Word format as your instructor requires. It should be double-spaced with one-inch margins all around.

The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Title page, Abstract, Table of Contents and References are NOT included in the page count.

Identity the page title as page #1.

The paper must have a Table of contents and Abstract sections at the beginning of the paper.

The paper must have a Summary and Conclusion section as the last section of the paper.

The paper must have at least eight (8) professional/scholarly quality references (professional journal or refereed academic conference) or more.

Provide originality report.

Reference no: EM131725312

Questions Cloud

The chapter describes scale for altruistic volunteerism : The chapter describes a scale for altruistic volunteerism, How would you argue against this statement?
Discuss approaches to environmental protection : The 2004 Environmental Liability Directive has proven to be a largely pointless exercise in EU legal harmonisation - largely pointless exercise in EU legal
Measurements of economic growth and development : How do you as a business leader utilize 'Measurements of Economic Growth and Development' in order to assist you with making long term decisions?
Develop an interesting focused thesis on othello : Develop an interesting, focused thesis on Othello in a paper employing one critical perspective, using at least four relevant scholarly sources, including both
Analyze the compliance and regulatory issues : Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies .
Current affordable care act repeal efforts and proposals : Describe social implications and provide an analysis with reference to current Affordable Care Act (ACA) repeal efforts and proposals.
How does twice nat ensure that translations are consistent : Read about a variant of NAT called twice NAT that allows communication to be initiated from either side of the NAT box at any time.
What is bench-marking in quality management : What is bench-marking in quality management and why is it important for management to understand?
Ability for a monopoly firm : 1. The ability for a monopoly firm to increase its price depends mainly on?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the concepts of information systems security

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. Explain the means attackers use to compromise systems and networks, and defenses used by organizations. Explain the role of access controls in implementing a se..

  Importance of mis in relation to data-driven decisions

Explain the importance of MIS in relation to data-driven decisions. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools

  Recommendation to improve job satisfaction

What if your manager approached you to make a recommendation to improve job satisfaction for you and others in your company? Please share what you will recommend to improve job satisfaction?

  Show the impacts the future of organizations

Summarize the main points of the author and why you believe it impacts the future of organizations.

  Review typical workflow processes within health organization

Determine the main advantages and disadvantages of the adoption of The HITECH (the Health Information Technology for Economic and Clinical Health) Act for health care professionals. Next, suggest one (1) strategy that the medical staff members cou..

  Discuss challenges they feel they face in collecting data

Identify an acute care facility and a non-acute health care facility in your area. Arrange to speak to the health information management professional at each facility and discuss the challenges they feel they face in collecting data, the type of d..

  Discuss some of the iot strategies and technologies

In the health care industry, IoT is being deployed to advance health care security applications that will allow data to be accessed via mobile devices.

  What areas of the web page were designed well

Review 15 different web pages. The type of web pages does not matter....ensure they are school appropriate. Explain what the web page is for, i.e. a sporting

  Operations management - processes and supply chain

Identify processes that one can personally evaluate and impact within the relatively short duration of time, say about 6 weeks and Describe each process in terms.

  Organization expect from its information systems

Information systems in business and What should an organization expect from its information systems?

  Explain how apple achieved business success

Assignment: Management Information System. Explain how Apple achieved business success through the use of information, information technology, and people.

  Description of the it security information related to case

SIT182 Introduction to Computer Security Assignment - Teamwork Report. This report should consist of: Description of the IT security information related to the case, List of major security problems and Analysis and presentation of solutions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd