Describe policies standards processes and guidelines

Assignment Help Computer Network Security
Reference no: EM131230458

Computer Science

Select a company or any existing business. This can be the company you currently work for. If you cannot find information about the security infrastructure of a company, you may make up the details as realistic as possible. Over the next few weeks you will utilize this company for the main project.

Your company wishes to ensure that know and understand they various regulatory acts they are required comply with and understand. This first assignment will allow you to establish the Key Assignment Template that will be used throughout the class for all Individual Project Submissions.

First, you will start by providing an overview of the company you have chosen. Be sure to describe its current security infrastructure.

Second, explore the regulations applicable for Security Compliance. You will:

• Describe 5 different Federal Regulations your company needs to understand and have compliance
• Describe 2 different State Regulations your company needs to understand and have compliance
• Discuss how each of these regulations are applicable to the company

The template document should follow this format:

• Security Compliance Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Section 1- Company Overview
o Section 2 - Federal and State Regulations, Directives, and Acts
o Section 3 - Compliance Plan
o Section 4 - Acceptable Use Policy
o Section 5 - Certification and Accreditation
o Section 6 - Preparing for Certification

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Section 1 - Company Overview
• Section 2 - Federal and State Regulations, Directives, and Acts

o Identify and describe 5 Federal Regulations
o Identify and describe 2 State Regulations
o Describe how each apply to the specific company

• Section 3 - Compliance Plan

o Describe Policies, Standards, Processes and Guidelines
o Discuss the relationship between Controls and Audits
o The Sarbanes-Oxley Act
o The different implications Regulations have on Government and non-Government entities

• Section 4 - Acceptable Use Policy

o Global Regulations
o Safe Harbor
o Work Councils
o Acceptable Use Policy and Enforcement Ethics

• Section 5 - Certification and Accreditation

o Certification and Accreditation
o Certification and Accreditation Frameworks

• Section 6 - Preparing for Certification

o DIACAP
o ISO27002

Add the discussion about the Company Overview and the Federal and State regulations to the sections titled: Company Overview and Federal and State Regulations, Directives, and Acts.

Reference no: EM131230458

Questions Cloud

Think of viable business venture : Think of a viable business venture you could embark on and share your ideas using the following questions: Which niches can you own in this proposed venture? Of these which would be the most profitable?
How do these ideas relate to how you experience leadership : What are the key ideas that Simon Sinek presents in the beginning of his book. How do these ideas relate to how you experience leadership today? Describe the roles that E.S.D.O play in leadership. How can knowing this chemistry benefit a leader? What..
Describe the concept of due care and due diligence : Discuss the importance of the security professional to be knowledgeable with State and Federal Regulations, Directives, and Acts. Describe the concept of due care and due diligence.
Estimate long term fraction of time they have each cuisine : Suppose a dinner clubs eats out once a week, and the members have a choice of Chinese, Italian, or American cuisine. They never eat the same cuisine two weeks in a row. If they have American the first week, what is the probablility they have Chinese ..
Describe policies standards processes and guidelines : Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.
In pursuing opportunities in foreign markets : In pursuing opportunities in foreign markets, MNEs may choose to adopt either a global strategy or a multi-domestic strategy. What are the conditions under which either a global or a multi-domestic strategy will make most sense? Use examples to illus..
Describe policy issue for your selected role specialization : Describe a policy issue for your selected role specialization. Synthesize knowledge for values theory, ethics, and legal regulatory statutes, and develop a personal philosophy that will map out a policy strategy that uses a high degree of politica..
What are the problem solving processes you will embark on : Assume that you are the hospital administrator of a 150-bed hospital located in a smalltown. Your best friend Betty works for the local newspaper in town. One day Betty calls you and informs you about a rumor that one of the ER nurses in your hospita..
Which types of systems is each operating system most suited : Compare and contrast at least 2 network operating systems. For which types of systems is each operating system most suited, and why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain why shared accounts is considered bad practice

In your own words, explain why each of the following is considered bad practice:

  Include strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  Briefly describe the type of e-commerce

This assignment provides you with an opportunity to read an article about a current security threat (or attack) while also examining how security measures impact the customer experience.

  Security logic to specific forms in the web application

You will add additional security features to make the web application more secure. You will also add security logic to specific forms in the web application.

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption - Describe the common uses of the aforementioned selected cryptographic system and provide a real-world example of how it is used in securing networks, files, and / or communicati..

  Design a book publisher database from scratch

You will need to design a Book Publisher Database from scratch, create the database,create the relationships between the three tables, enter the given data into the appropriate tables and then query the database in order to provide required inform..

  Compare the various elements of our nation''s critical

Compare the various elements of our nation's critical infrastructure that are potentially vulnerable to cyberterrorism and/or information warfare.

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Determine plaintext and key from vigenere cipher

Below are ciphertext from Vigenere cipher. Determine plaintext and key. Give a clearly written description of steps you followed to decrypt each ciphertext.

  Exploit vulnerabilities in your systems

Describe common tools and techniques for identifying and analyzing threats and vulnerabilities - Explain the risks of challenging individuals to exploit vulnerabilities in your systems.

  Compare the different threats and vulnerabilities

Compare Different Threats and Vulnerabilities. Collaborative discussion, submit, individually, the different kinds of data breaches, the threats and vulnerabilities that lead to the breaches, and the severity of each.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd