Sensitive data classification

Assignment Help Basic Computer Science
Reference no: EM132365514

Respond to the following in a minimum of 175 words:

Organizations need to know the value of their data to find the best way to protect it. The data must be categorized according to the organization's level of concern for confidentiality, integrity, and availability. The potential impact on assets and operations should be known in case data, systems, and/or networks are compromised (through unauthorized access, use, disclosure, disruption, modification, or destruction).

Choose an organization that you are familiar with from the Manufacturing, Retail, Health Care, Finance, or Education sectors to study throughout this course. You can use your own employer or another organization. I do encourage you to choose one that you have some experience with as there are differences between the different vertical markets.

Based on your chosen organization, ensure you:

Discuss the organization's data. What types of data does it have? Is any of the data subject to regulatory security requirements (FERPA, HIPPA, GDPR, etc.) Is some of the data used or generated outside of the US?

Discuss the organization's categorization of the data based on the Standards for Security Categorization of Federal Information and Information Systems.

Note: You will use information from this discussion in this week's assignment Encryption Methodologies to Protect an Organization's Data.

Reference no: EM132365514

Questions Cloud

What purpose does the us department of education serve : The executive branch of the government is responsible for the U.S. Department of Education. What purpose does the U.S. Department of Education serve?
Engagement added value to the policy making process : The author presented several benefits and an analysis of five cases in which stakeholder engagement added value to the policy making process.
List the principles of palliative care : HLTENN010 Apply a Palliative Approach in Nursing Practice Assignment, Southern Cross Education Institute, Australia. List the principles of palliative care
What are the components of the graduate program : Write a 10-page, APA-formatted paper on your experiences in the graduate program at. You must reflect on the following points: the nature and extent of your.
Sensitive data classification : Discuss the organization's categorization of the data based on the Standards for Security Categorization of Federal Information and Information Systems.
Define new ways to think about assessment in the digital : Rapid changes in online instruction have challenged educators/employers in many ways. There are the obvious infrastructure issues, including the initial.
How teachers can use standards and achievement data : Respond to at least one of your classmates. With the emergence of the need for more intelligent accountability systems and a greater recognition.
Implemented to protect the organization sensitive data : Describe how the encryption methodologies that should be implemented to protect the organization's sensitive data.
Describe an incident that could occur in your local area : Imagine that you have been asked to present to your local community about the importance of local organizations that help to support the community if a threat.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Bitmapped images and vector images

(a) Identify the advantages and disadvantages of bitmapped images and vector images.

  The result is in the domain n

Find the truth set for the following predicates: Hint: answer should be a { set } A) 8/x where x is an integer,the result is in the domain N

  Loops without using the for each

Rewrite the following loops without using the "for each" (enhanced for loop) construct. Here, values have the type double.

  What are purpose active directory folders and limitatation

What are purpose of Active Directory folders (not share folder)

  Explaining service strategy or service design

Select a topic that most interests you from Service Strategy or Service Design and then write a paper around that topic. Try to use as much of your own creativity and originality when writing the paper.

  Linear search and the binary search

Describe the difference between the linear search and the binary search. Give a real-world example of each type of search used in everyday life.

  Evaluate a major factor relating to market failure

Question for Assignment: "Evaluate a major factor relating to market failure which could be applied to the pharmaceutical industry in Australia

  Program that manipulates a database of product records

program should allow the user to add a record, find a record that matches a product name, and change the price and quantity of a product by a given amount.

  What is behind change in demand

What is behind change in demand? What is behind change in quantity demanded? Write down the factor(s) affecting each change?

  Differentiate between security architecture

Question 1: Differentiate between Security Architecture & Design and Information Security Architecture & Design Question 2: What is the CIA Triad (define each component)?  What is Defense-in-depth?  In order to meet both criteria, what are the mini..

  Write a class called student that will keep track of student

Write a class called Student that will keep track of a student and a grade.

  Problem regarding the middle frequency

The resulting output from the modulation process is known as the middle frequency (MF) signal. True or false?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd