Reference no: EM131941173
Assignment
Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.
Write a three to five page paper in which you:
1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.
2. Recommend the proper audit controls to be employed in the registrar's office.
3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
Why there is no constant intercept in the function
: Why it has to be a cubic function? Why there is no constant (intercept) in the function? Explain briefly in your own words.
|
Determining the expected market return
: What would be a firm's WACC if the risk free rate was 4%, the expected market return was 6%, the firm's marginal tax rate was 35%
|
Provide a specific example of a management judgment
: Provide a specific example of a management judgment, estimate, or choice that could decrease both balance sheet and earnings quality.
|
What is the internal rate of return on investment
: This year, he sold the it for $18,000. What is the internal rate of return on his investment?
|
Explain the means in which data moves within organization
: Explain the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
|
Appropriate estimate of the stock price
: What would be an appropriate estimate of the stock price today? (Answer to the nearest penny, i.e. 55.55 but do not use a $ sign).
|
Appropriate estimate of the stock price today
: What would be an appropriate estimate of the stock price today? (Answer to the nearest penny, i.e. 55.55 but do not use a $ sign).
|
Meant by term structure of interest rate
: Explain the shape of the yield curve based on Expectation, Liquidity Premium, and Preferred habitat (Segmentation) hypotheses.
|
What is meant by financial institution
: What is meant by Financial Institution (FIs)? What is the role of FIs in the Economy?
|