Analyze the means in which data moves within organization

Assignment Help Business Management
Reference no: EM131572501

Assignment: Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five page paper in which you:

1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

2. Recommend the proper audit controls to be employed in the registrar's office.

3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
· Use technology and information resources to research issues in security strategy and policy formation.
· Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131572501

Questions Cloud

Draw a number line to help : Draw a number line to help you explain who is right and why. Do not just say which answer is numberically correct
Identify and discuss the basic factors of communication : Identify and discuss the basic factors of communication that must be considered in the presentation of this information
How many units must he produce on given day for bonus : A worker is promised a bonus if he can increase his productivity by 2 units a day every day for a period of 30 days. If on day 0 he produces 170 units.
Discuss an example of a public health -business partnership : Discuss the challenges to collaboration facing business and public health partnerships in relation to emergency preparedness.
Analyze the means in which data moves within organization : Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
How many people will have received copies of the letter : A chain letter works as follows: One person sends a copy of the letter to five friends, each of whom sends a copy to five friends, each of whom sends a copy.
Discuss what tool otto should use to organize : Create a Word or Rich Text Format (RTF) document.Discuss what tool Otto should use to organize and prioritize his business growth strategy.
How many operations does it execute with given size of input : A certain computer algorithm executes twice as many operations when it is run with an input of size k as when it is run with an input of size k - 1.
Discuss the government decreases government purchases : Suppose the government decreases government purchases, but everything else in the economy remains constant

Reviews

Write a Review

Business Management Questions & Answers

  To recruit the ceo from the inside seems to work well

To recruit the CEO from the inside seems to work well for Intel. Do you believe this is a sound policy? Why?

  Burger king advertising tactics

Illustrate what do you think of Burger King's advertising tactics? Is it OK to attract new customers while alienating others? Is Burger King's advertising ethical? Explain.

  Address the communication issue from the scenario

Address the communication issue from the scenario. Concentrate on the facts of the situation and avoid using overly emotional language.

  Explanation of key findings from pest analysis

Need to have these questions answered for Capella, Organizational Strategy 6024, Unit 4; Assignment 1. Title with introduction.

  Japanese v american culturejason is planning a business

japanese v. american culturejason is planning a business trip to japan and it is his first time doing business in that

  Explian what processes are indispensable to be performed

What processes are indispensable to be performed? What outcomes are required from these processes to achieve business objectives?

  Different types of securities

1. What are some different types of securities and why would an investor choose one over another?

  Role of a small-business consultant

Place yourself in the role of a small-business consultant. One of clients, Home Solutions, is considering opening two new stores. You know that businesses often experience cash flow problems due to continuous changes that occur in the industry, su..

  Competitive advantages over competitors

Using the same organization as above, what kinds of competitive advantages over competitors does the organization intend to try to build?  What do you think are the best strategies to build them and why?

  Does having a code of ethics guarantee ethical behavior

LDR-800: Does having a code of ethics guarantee ethical behavior within an organization? Why or why not? What happens to the organization when its ethics code fails to achieve ethical behavior within the organization?

  Solution to leader

Solution to leader - Find a leader that you have either worked with or read about - Is there one or more leadership models that are applicable to the situation

  Compensation for clerical or production workers

Discuss and provide examples of the two primary ways direct financial payments are made to employees. Compare compensation for managers and professionals with compensation for clerical or production workers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd