Review the hhs information security program

Assignment Help Computer Network Security
Reference no: EM131218133

Project: Effect of Legislation on Organizations

The purpose of this is assignment is to 1) conduct research related to the impact of legislation on the HHS security program and 2) write a research paper.

Learning Objective - At the completion of this project students should 1) be familiar with current cyber legislation (passed and proposed), 2) be able to discuss their organization's information security program, and 3) be able to discuss the impacts of cyber legislation on the information security program.

Media - Students will use the Internet and Microsoft Word. The HHS relevant web sources are available in Webliography/Internet. Students will also use information contained in the May 2011 Cyber Security Legislative Proposal and the proposed Cyber Security Act of 2012.

Deliverable - Your research paper should be at least three full pages, single spaced, 1-inch margins, New Times Roman 12-Pitch font, include a cover page (names, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the three-page minimum. Papers not meeting the three full-page minimum will lose points. You must have at least three scholarly sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.

Detailed Description of Learning Activity -

1. Review the May 2011 Cyber Security Legislative Proposal and the proposed Cyber Security Act of 2012.

2. Review the HHS information security program.

3. Select three to five points of analysis from the proposal (#1 above). Your points of analysis must be specific items from the legislative proposal or the legislation, which if became law, would impose cyber security requirements on HHS.

4. Research the impacts of your selections from #3 above the HHS information security program.

5. Write your research paper. At a minimum, the paper should include: a. An introduction that includes the purpose of your paper and describing HHS mission, b. The Points of Analysis section that describes your points and why you picked them, c. The Analysis section relating your Points of Analysis with your research and the HHS information security program, and d. A conclusion that summarizes what you wrote.

6. Use Spell and Grammar Checker before submitting. It is also a good idea to have someone else read your paper. You should also review the below grading rubric to ensure you have all the graded components.

7. Submit the project to the appropriate TurnItIn assignment area by the due date.Only one team member is required to submit the paper on behalf of the team.

8. USING THE ATTACHED TEMPLATE IS MANDATORY. You will earn zero points if you do not use the template.

Reference no: EM131218133

Questions Cloud

Recommendations to the it steering committee : Write a 350- to 700-word memo, individually, based on your Week Five Learning Team Collaborative discussion, with your recommendations to the IT Steering Committee. Include the following content in your paper:
Total amount of a meal purchased at a restaurant : Tip, Tax, and Total Design a program that calculates the total amount of a meal purchased at a restaurant. The program should ask the user to enter the charge for the food, and then calculate the amount of a 15 percent tip and 7 percent sales tax...
Construct a budget that provide a breakdown : Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Find a polynomial function that has zeros : Identify the left-hand and right-hand behavior of the graph of the polynomial function f(x) = 6x3- 5x + 4. Find a polynomial function that has zeros at -3, -1, and -2. Do not leave it in factored form, but multiply out your answer.
Review the hhs information security program : Review the HHS information security program. Select three to five points of analysis from the proposal (#1 above). Your points of analysis must be specific items from the legislative proposal or the legislation.
Occupancy rate for floor : Write a program that calculates and display the occupancy rate for each floor and the entire hotel. The program should start by asking for the number of floors in the hotel.
Does it appear that movie critics like high-budget movies : Using regression, does it appear that critics and audience members agree on what a movie should be rated? Why or why not?
Responses in the form of a term paper : Select one (1) of the following topics in which you will base your responses in the form of a term paper:
Two figures from the humanities : Write a paper and include two figures from the Humanities.-  compare and contrast their achievements.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Data encryption as a method of protecting data

Which one of the following statements is most correct about data encryption as a method of protecting data

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  How message segmentation can reduce end-to-end delay

What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?

  Calculate cost of goods sold

How would you calculate cost of goods sold? What items make up cost of goods sold? How does beginning and ending inventory affect cost of goods sold?

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Conduct a partial as-is audit of the healthy body wellness

You will be required to conduct a partial as-is audit of the Healthy Body Wellness Center organization - Create two additional question sets (The category and questions). Tip: Use two of the ISO 27002 controls. Create a policy, procedure and practi..

  What is a firewall

What is a firewall. How does a VLAN and firewall combination assist you in achieving the desired goal

  Cyber security in business organizations

Cyber Security in Business Organizations.

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  What are some ideas you have about possible research topics

Considering your Program (DM/DCS) your concentration, and your interests, what are some ideas you have about possible research topics? Please add in these yourself

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd