1. Given the need for governance and compliance within the workplace, suggest two methods that an organization could employ to instill the importance of governance and compliance to employees.
Create a list of three points that you would emphasize when explaining this subject to employees. Justify your choices.2.Select an organization with which you are familiar. Identify the compliance laws that you believe would be most relevant to this organization. Justify your response.
Define the scope of an IT compliance audit that would verify whether or not this organization is in compliance with the laws you identified.3.Often, it is necessary to develop a hybrid framework of standards for use within a business. Identify the individual(s) within the company that should be involved in the decision-making process. Justify your choices.
Describe how the use of a unique set of standards might impact the auditing process.PLEASE ADD COVER AND REDERENCE PAGE FOR ESSY BELOWAssignment 1: Designing FERPA Technical SafeguardsImagine you are an Information Security consultant for a small college registrars office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrars office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrars office.-Write a three page paper in which you:
-Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrars office.
-Recommend the proper audit controls to be employed in the registrars office.
-Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
-Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
-Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]