Explain how performing periodic security assessments

Assignment Help Business Law and Ethics
Reference no: EM13787187

1. From your computer workstation, create a new text document called Compliance Lab #4.

2. Review the following scenario:

Your organization is a governmental agency that serves a vital role in homeland security functions. In fact, your hiring took longer than you would have liked because it seemed as though the organization's managers wanted to know a lot about you before they gave you clearance to work. After a year at the job, your manager feels your progress has come a long way, so she is giving you more responsibility and has asked you to analyze the benefits of reporting risks, threats, and vulnerabilities in an IT assessment that is under way. Your manager would like for you to conduct research and report your findings about the type of vulnerabilities that require disclosure and when it is lawful or unlawful to conceal information produced by vulnerability assessments. She would also like for you to include some trends on current security threats and the types of responsible disclosure being performed by other organizations.

3. Launch your Web browser and type in the Web address https://www.sans.org. In the Custom Search box on the Web page's upper right corner, search for "How do we define Responsible Disclosure?" On the search results page, click on the top link labeled "How do we define Responsible Disclosure?" to open the pdf article. Read about the following topics:

a. Vulnerability Life Cycle
b. Types of Disclosure
c. Nondisclosure
d. Full Disclosure
e. Limited Disclosure
f. Responsible Disclosure
g. Existing Policies and Proposals

In your text document, note one relevant point about each section.

4. In your Web browser, open the document "Symantec Global Internet Security Threat Report" provided by Symantec Corporation at https://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. Review the Highlights section of the document that discusses the main concepts in each section. Then, review the following topics in the document:

a. Threat Activity Trends
b. Vulnerability Trends
c. Malicious Code Trends
d. Phishing, Underground Economy Servers, and Spam Trends
In your text document, note one relevant point about each section.

5. In your Web browser, type the Web address https://www.zerodayinitiative.com/advisories/published/. Review some of the links on the page provided by the respected security experts at TippingPoint DVLabs and others.

6. Research other available resources (Internet resources, your textbook, and so on) to validate how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organization achieve compliance.

7. In your text document, write an executive summary describing how security assessments throughout the seven domains of a typical IT infrastructure can help organizations achieve compliance by mitigating risks and threats.

8. Submit the text document to your instructor as a deliverable for this lab.

Reference no: EM13787187

Questions Cloud

Differences between allopathic pharmacists and professional : differences between allopathic pharmacists and professional herbalists.
Write a program that uses a recursive algorithm to compute : Write a program that uses a recursive algorithm to compute the determinant of a maxtrix. It should read a matrix, print it out, and compute and print the determinant.
About cam-application and caution : CAM-Application and Caution
Case study on organization behavior : Case study on Organization behavior
Explain how performing periodic security assessments : the seven domains of a typical IT infrastructure can help an organization achieve compliance. In your text document, explain how performing periodic security assessments throughout the seven domains of a typical IT infrastructure can help an organ..
An assignment on pdca cycle : PDCA Cycle
Record the bad debts expense : Management estimates that 1% is the sales percentage to use. What adjusting entry will Hahn Company make to record the bad debts expense?
Primary source of stockholders : A primary source of stockholders' equity is
Examine performance management issues and processes : Examine performance management issues and processes

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Describe the legal foundation of criminal procedures

Explain the legal foundation of criminal procedures, with reference to the definition and structure of law, the court system, federalism and the special role of the Supreme Court

  Jones wants to sue jennifer tours windell hotels inc and

1.jones wants to sue jennifer tours windell hotels inc and windell travel inc together in federal court for his

  Select a business contract transaction you are familiar

select a business contract transaction you are familiar with or can easily research. you may use a transaction

  You have been asked to explore the practical applications

you have been asked to explore the practical applications of biometrics in the public and private sector.nbspdescribe

  In anbsp1-2 page paper discussnbspfivenbspof the ten

in anbsp1-2 page paper discussnbspfivenbspof the ten following laws. explain why they were enacted. give a short

  When the company has filed

When the company has filed under chapter 11, can the creditors petition the court to order the company sold pursuant to a offer? What elements should the court take into consideration?

  Explain inside trading

Explain Inside trading and Alfred Newman worked in the publications department of Printers Press, a financial printer

  Marwan has worked at studio five theme park as a character

marwan has worked at studio five theme park as a character actor portraying a swash-buckling pirate. he does not have

  Critique on police officer bill of rights

Critique on Police Officer Bill of Rights, You are required to write a critique of the case study in the course based on the article provided in the assigned modules/weeks' Reading & Study folders

  What is the exclusionary rule what are the exceptions of

what is the exclusionary rule? what are the exceptions of the rule? how does the exclusionary rule apply to criminal

  Find all the stakeholders within the pharmacare scenario

Describe the key characteristics of a stakeholder and determine all the stakeholders within the PharmaCARE scenario. Assess PharmaCARE's environmental initiative against the backdrop of its anti-environmental lobbying efforts and Colberian activitie..

  Dancing in a white disco jacket to music performed

Playing a young working class Brooklyn man, whose life was centered around spending Saturday night at the disco. A memorable scene in the movie has Travolta dancing in a white disco jacket to music performed by the BeeGees.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd