Analyze the compliance and regulatory issues

Assignment Help Computer Network Security
Reference no: EM13863846

IT Controls and Countermeasures

Objective: Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

Competencies: Critical thinking, decision making

In 8-10 double-spaced pages, each student analyzes the policies, vulnerabilities, risks and internal controls for a French bank that was a victim of a large scale fraud and recommends improvements to the company's IT security policies. Relate the identified policies, vulnerabilities, risks and internal controls to the technical material and vulnerability identification & exploitation materials presented in the Erickson and Weidman texts.

This assignment calls for a systematic analysis of an organization's policies, vulnerabilities, risks, and internal controls as well as their relationship to current vulnerability identification and exploitation technologies. Many scientific, engineering, information, and accounting disciplines advocate general steps to problem solving utilizing a systems approach. At this point in your academic career, you should be proficient at applying such a general approach to solving specific problems. Select and adapt such an approach with which you are most comfortable from your prior professional and academic experiences to apply to this assignment. Suggested steps to the general systems approach to problem solving are as follows:

1. Define the problem
2. Identify evaluation criteria/measures of effectiveness
3. Identify alternatives/solutions
4. Evaluate/analyze alternatives utilizing analytical techniques consistent with step 2 criteria/measures
5. Select and display preferred alternative(s)/solution(s) consistent with the analysis in step 4
6. Implement and monitor step 5 solution(s)


Refer to the French Bank in the following URLs
• https://www.spiegel.de/international/business/0,1518,530673,00.html
• https://www.msnbc.msn.com/id/22818054/ns/business-world_business/t/french-bank-blames-trader-billion-fraud/
• https://www.cbsnews.com/stories/2008/02/04/business/main3785088.shtml

and your specific readings regarding security controls, audits, inspections, risk assessment, and countermeasures. Utilizing an appropriate methodology for analysis (which may be adapted from the above 6 steps), identify a set of 7-10 recommendations toward solving the fraud issue of the French Bank. The systems analysis approach as applied within the areas of risk analysis, vulnerability assessment, internal audits, and policy analysis should yield adequate justification for your recommendations.

There are three additional things to keep in mind. First, defining the problem or issue will require a data gathering stage. Second, problem solving is not a once-through sequence of steps always performed in a specified order. It is full of iteration and feedback loops. Finally, you will not be able to implement and monitor your recommendations in this assignment. Perhaps that means provisions for implementation and monitoring should be part of your evaluation criteria. It does not help the client to offer solutions that are prohibitively costly to implement.

The students

• identify and discuss the policies, vulnerabilities, risks and internal controls for the French bank

• evaluate the weaknesses and impact on secure bank operations

• recommend and discuss 7-10 security controls and countermeasures for mitigating problems in and improving the bank's security posture.

• discuss the methods that organizations can use to effectively achieve the adoption and implementation of the security policies, controls and countermeasures.

Prepare your paper in either Word or PDF format as your instructor requires. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count.

Verified Expert

Reference no: EM13863846

Questions Cloud

Define the journalize the transactions : Journalize the transactions
What are the benefits from incorporating turbochargers : What are the benefits from incorporating turbochargers in 2-stroke slow- speed engines, and what are the potential safety hazards arising from their operation?
Enzymes and temperature : Describe the relationship between temperature and the enzymatic activity of lactase. Of the three temperatures tested, which is the optimal temperature for enzyme activity?
What is the audit opinion that the statements receive : What creates the US federal government-wide financial statements? Who audits the statements? What is the audit opinion that the statements receive? What do most federal (and non-federal) entities receive?
Analyze the compliance and regulatory issues : Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.
Average cost of ending inventory using average cost method : Given the following data calculate the cost of ending inventory using the average cost of ending inventory using the average cost method. Round all calculations to the nearest two decimals places.
Are unions important to acme : Assume that Acme is an average US (federal civilian) agency, in regards to unions. Are unions important to acme?   What role would unions have in acme? Acme employs 200,000 people. How many would be members of a union?
Hypothetical two-dimensional environment : The graph below represents a hypothetical two-dimensional environment, temperature along the x-axis and moisture along the y-axis. The A locus affects fitness with respect to temperature, the B locus affects fitness with respect to moisture. The t..
Prepare bid to audit the allnet financial statements : Luther King works for a CPA firm and eventually hopes to make partner. Allnet Company invites him to prepare a bid to audit the Allnet financial statements. In discussing the audit fee, Allnet suggests a fee structure in which the fee depends on the ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Instructions of research paper

The instructions of research paper is to write about steganography techniques and applications - types and techninques of steganography and then discuss in-depth how is is used, which technique is popular, include Figures of how the technique is us..

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  Change the php script to prevent such attacks

Briefly explain each rule in the rule - How would James need to change the PHP script to prevent such attacks?

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  Fundamental principles in both the bell-lapadul bipa

describe the fundamental principles in both the bell-lapadula and biba security models. for each explain what sort of

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd