Guidance provided by department of health and human services

Assignment Help Computer Network Security
Reference no: EM13758280

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Reference no: EM13758280

Questions Cloud

Perform a functional dependency analysis : Sample data and make any assumptions you need about the company. Make any comments about the approach that you are going to follow, as you see fit - Perform a functional dependency analysis, and include it as part of your deliverables, for every s..
Explain the regulatory compliance law : From the e-Activity, explain the regulatory compliance law that you researched, and ascertain the effect that information security could have on such a law
Deductive logic appear in all business communications : Inductive and deductive logic appear in all business communications that will give the basis of your argument. What other (5) considerations should also be made in the design of your message?
A plan for planning : Case: You are a consultant for a Fabric company that burned down, this company was the only source of income for many of the town people they all worked there, as a consultant to the owner how to rebuild the company to where it will be better than be..
Guidance provided by department of health and human services : Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements
Annual reports for the coca-cola company and pepsico : Using 2007 annual reports for The Coca-Cola Company and PepsiCo, Inc., answer the following questions. Write these up in a Word document, clearly identifying your response to each lettered item. Show supporting calculations for the items lettered ..
Discuss a preschool classroom and a classroom for children : Discuss a preschool classroom and a classroom for children five years old or more. Describe how the environments should use the principle of age appropriateness
Core competencies and network-based strategies : How does Procter and Gamble Company address change; consider the use of BPM/BPR and other change processes. How is Procter and Gamble Company using synergies, core competencies and network-based strategies to achieve competitive advantage?
What element of establishing an organizational strategy : Satisfying the customers of an organization is a requirement for business success. Therefore, customer perceptions matter when trying to decide what products and services the organization will offer. What element of establishing an organizational str..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

  Write a 2- to 3-page paper describing your companys

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Recognize the various ways that agency or organization

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  Case study on computer security

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Use the stream cipher discused in class

Use ECB mode with block length 3 and the permutation cipher for the following operation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd