Sarbanes-oxley act

Assignment Help Computer Network Security
Reference no: EM13759265

Security Regulation Compliance

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

Reference no: EM13759265

Questions Cloud

Cancer : Approaches to prevention and control of the disease.
Employees rights to freedom of expression on or off the job : To what extent do employees retain the right of freedom of speech on the job? Off the job? What about the freedom of expression? Are there limits to an employee's rights to freedom of expression on or off the job?
How would you integrate the different units of wilson : Given Wilson Sporting Goods company's geographically diverse locations, various sport categories, and multiple products it is important for them to have employees who specialize. For example Billy is a baseball equipment sales agent and Jeannie is in..
Analyze issue using social contract and rule utilitarianism : Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.
Sarbanes-oxley act : Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act
Means of verification of cash-inventory-office equipment : "The best means of verification of cash, inventory, office equipment, and nearly all other assets is a physical count of units; only a physical count gives the auditors complete assurance as to the accuracy of the amounts listed on the balance sheet"..
Discuss specific malware and social engineer : Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.
Compare multi-domestic-global and transnational strategies : Compare and contrast multi-domestic, global, and transnational strategies. What environmental factors influence a firm's international strategy? What are the benefits and risks of international diversification? What are the challenges of managing mul..
Monetary base and the banks reserve ratio : Calculate the monetary base and the banks reserve ratio. - Calculate the total money creation in the economy with the help of formula.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Consider now the inheritance of properties of new processes

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  Difference between enterprise and it architecture

What is the difference between enterprise architecture and IT architecture and should enterprise architecture really be called "IT" architecture?"

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Find the product cipher obtained by using the

1 if the two most common letters in a long ciphertext encrypted by an affine transformation c equiv ap b mod 26 are x

  Discuss some of the security threats a company could face

In 1 - 2 pages, discuss some of the security threats a company could face when adding wireless access points (WAPs) to its network. How could the company reduce these risks

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd