Describe the data breach incident

Assignment Help Basic Computer Science
Reference no: EM13919253

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located at https://csrc.nist.gov/groups/SMA/fisma/index.html. Additionally, review the information, located at https://www.govtech.com/blogs/lohrmann-on-cybersecurity/Dark-Clouds-Over-Technology-042212.html, about the data breaches within government systems.

Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.

Write a three to five (3-5) page paper on your selected case in which you:

Describe the data breach incident and the primary causes of the data breach.

Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).

Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.

Reference no: EM13919253

Questions Cloud

Type of activity that is used to proportionately distribute : Some item or type of activity that is used to proportionately distribute manufacturing overhead cost to the product being produced is known as:
Construct counterexamples to the following given statements : Construct counterexamples to the following statements: For x ∈ R: 'If x is not rational then χ - 1/ χ is not rational'. For p ∈ N: 'If p is prime then 2p - 1 or 2p + 1 is prime'
Features frequently used in web programming : In this assignment, you will experience some of the C# features frequently used in Web programming.  There isn't any client interaction in this assignment; rather, you statically construct some to-do item instances (you create a class named ToDoIt..
Dividends declared and paid during : Dividends declared and paid during 2014 totaled $5,700.
Describe the data breach incident : Write a three to five (3-5) page paper on your selected case in which you: Describe the data breach incident and the primary causes of the data breach.
Explain the installation process : Create a testing plan that includes unit integration and system testing. Ensure the criteria is carefully documented. Explain the installation process and include guidelines for all concerned.
Probability of getting heads on only one of your flips : You flip a coin three times. (a) What is the probability of getting heads on only one of your flips? (b) What is the probability of getting heads on at least one flip?
Working capital simulation in managing growth : Acting as the CEO of a small company, you will apply the principles of capital budgeting to invest in growth and cash flow improvement opportunities in three phases over 10 simulated years. Each opportunity has a unique financial profile and you m..
What is the breakeven point for solutions plus : What is the breakeven point for Solutions Plus? That is, how low can the company go on its bid without losing money?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Control aspects of speed and delivery of content

Currently, there are questions over whether it is permissible for ISP's (major U.S. providers include Comcast, Verizon and AT & T) to control aspects of speed and delivery of content on their netowrks to their subscribers. Many subscribers and sites ..

  Data encryption techniques

Write a four to five pg research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Setting up a successful help desk-physical considerations

One of the most critical problems faced by the information technology department in virtually every organization is how to provide effective help to end-users facing problems with the technology. The help desk is the point at which every frustrati..

  Write a recursive function line

Write a recursive function line(n) to display a line with n asterisks. Then write a recursive function histogram that plots a histogram using recursive calls of the function line.

  Floating point format has an n-bit frac field

Suppose a floating point format has an n-bit frac field and a k bit exp field. What is the smallest integer that can be represented exactly? Assume that k is large enough not to provide any limitations on the problem. What is the integer for IEEE-754..

  Different types of digital modulation schemes

How can we compare the performance of two or more different types of digital modulation schemes?

  Write a php script that computes the total cost

Write a PHP script that computes the total cost of the ordered light bulbs from above after adding 6.2 percent sales tax. The program must inform the buyer of exactly what was ordered, in a table.

  What is the value of the key and the new register

In the n-stage nonlinear feedback shift register (NLFSR), if the current register is 0010, function f is f(R3, R2, R1, R0) = R3 or R2 or R1 or R0,what is the value of the key and the new register?

  Migrate to the cloud

Migrate to the Cloud

  How do providing goods and services for government differ

How do providing goods and services for the government differ from providing goods and services for other organizations?

  Generate a recursive sequence

Given below is a small haskell function used to generate a recursive sequence. I'm getting a type error while using floor function. floor function is expecting RealFrac, I suppose. The code and error are given below.main = do

  Create a program to print a battleship grid to the console

Create a program to print a battleship grid to the console

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd