IT 253 3-2 Activity
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
253
Subject
Business
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by BailiffMusic8488
Jewell 1
Emily Jewell
November 11, 2023
IT- 253
Southern New Hampshire University
3-2 Activity
Jewell 2
Influence of Law or Regulation
Most government agencies are subject to laws and regulations on information security. Laws like
the Federal Information Security Modernization Act (FISMA) and regulations like NIST standards often shape the development of information security policies for federal agencies. These agencies must set up regulations on how they’re going to go about securing their information and maintaining that security. These policies should be regularly updated to conform
with current threats technology faces.
IT Roles and Responsibilities
In large organizations such as the EPA, roles and responsibilities would be well defined to ensure
security had a broad range of coverage. Some of the roles could include security officers, network administrators, system administrators, etc. Responsibilities include setting up firewalls and detection systems and security training. You’d also want to ensure there was a position in charge of keeping up with technological changes in order to keep up to date with policies and requirements as well as possible threats to their security. Intended Audience
The intended audience of these policies are usually employees who have access and will be handling sensitive information, including the IT staff as well as non-technical staff. Security compliance with these policies is applicable and crucial to everyone in the organization.
Policy Enhancements
Policies can be enhanced by frequent, periodic reviews and adjustments depending on the current
technological world we find ourselves in. It’s imperative that we align with the evolving security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
You are required to assess key functions including risk management and compliance for J.P Morgan Chase, and present a written report based on J.P Morgan Chase on the following in 2,000 words:
Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the J.P Morgan Chase (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used.
Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, J.P Morgan Chase approaches/ strategies to combat money laundering and terrorist financing issues.
Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that J.P Morgan Chase must be compliant with.
arrow_forward
Suppose your college or organization is considering a project to develop an information system that would allow all employees, students, and customers to access and maintain their own human resources information, such as address, marital status, and tax information. The main benefits of the system would be a reduction in human resources personnel and more accurate information. For example, if an employee, student, or customer had a new telephone number or e-mail address, he or she would be responsible for entering the data in the new system. The new system would also allow employees to change their tax withholdings or pension plan contributions. Identify five potential risks for this new project, and be sure to list some negative and positive risks. Provide a detailed description of each risk and propose strategies for addressing each risk. Document your results in a short paper.
arrow_forward
List and decsribe internal (building) information security risks and mitigation tactics and how they will affect decision making strategies.
arrow_forward
You are required to assess key functions including risk management and compliance for the Bank of America. You are to present a written report based on the Bank of America on the following:
Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the institution (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used.
Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, the institution’s approaches/ strategies to combat money laundering and terrorist financing issues.
Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that the financial institution must be compliant with.
arrow_forward
Suppose your company has an e-commerce Website for selling different types of goods and services. Discuss the followings:
i) Ethical concerns associated with storing and analyzing user data?
ii) How would you use intrusion detection system to control security threats that face this website?
arrow_forward
Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of the many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.
Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .
arrow_forward
Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of thePage 3 of 3many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .
arrow_forward
The Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…
arrow_forward
The Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…
arrow_forward
Discuss the three types of information security policy proposed by NIST SP 800-14.
arrow_forward
Explain the PESTEL Analysis of Blackberry Data Security Sector.
arrow_forward
Data needs to be secured in three states: at rest, in use, and in motion. Select one state of data and describe its security challenges. What are some of the best practices securing data in that state?
arrow_forward
33-ChoicePoint is a company that gathers data from police, criminal and motor vehicle records credit and employment historiescurrent and previous addresses and insurance claims to assemble and maintain electronic dossiers on almost every adult in the USA. ChoicePoint is an example of: O a. Interpol O bProfiling System O c. Data aggregator O d. Insurance company
arrow_forward
Scenario
You have recently been hired as a business analyst for the chief financial officer (CFO) of a small direct-to-consumer organization. The company is growing and is looking for ways to gain efficiency by automating some processes. The CFO has asked you to perform an analysis of the current payroll onboarding function within the organization. Through this analysis of the current onboarding functions, you will determine the benefits and drawbacks of how employee information flows through an AIS and how using an AIS will improve the payroll onboarding process.
Provide a high-level overview of the payroll onboarding process.
Explain how the payroll onboarding processes function within accounting information systems.
Identify inputs and outputs of the payroll onboarding processes within an accounting information system.
Identify how key transaction cycles are automated. Include the following details in your response: a) Identify steps in the payroll process from paper approval…
arrow_forward
The National Incident Management System (NIMS) is a federal system that has a core set of doctrines, principles, and organizational processes. NIMS is routinely updated and is primarily focused on developing a consistent, nationwide template to enable which of the following?
Federal government organizations to work with nongovernmental organizations and the private sector to respond and recover from the effects of incidents regardless of their size
Federal, state, tribal, and local governments, nongovernmental, and the private sector to work together to respond and recover from the effects of incidents that are considered significant and that impact large areas or populations
Federal, state, tribal, and local governments, nongovernmental, and the private sector to work together to respond and recover from the effects of incidents regardless of their size
Only the federal, state, tribal, and local governments to work together to respond…
arrow_forward
The way we handle privacy and security is a vital part of our responsibility to our customers and essential to the success of our business.
Privacy and security are often viewed by organisations merely as compliance or risk management responsibilities, but we see significant opportunities for Vodafone to differentiate what we offer and strengthen our reputation through our efforts in these areas.
Our customers trust us with their personal information and their privacy. Protecting that information and respecting their privacy is fundamental to maintaining that trust. Our privacy and security programmes govern how we collect, use and manage customers’ information – from ensuring the confidentiality of their personal communications and respecting their permissions and preferences, to protecting and securing their information.
Personal data also has enormous potential to create economic and social value, both for the individuals concerned and for the businesses who serve them. In order to…
arrow_forward
Analyze the retail environment in which the organization operates, including the current protocols and policies in place related to information assurance.
b) Evaluate the threat environment of the organization.
c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
d) Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.
arrow_forward
Consider the below scenario “ Mr. Ahmed the manager of CISCO protects personal privacy and proprietary of Mr. Ali who is an employee working in CISCO “ , Name this security service.
a.
Confidentiality
b.
Authentication
c.
Availability
d.
Integrity
arrow_forward
MGMT Software Solutions (MSS) is a Barbadian company that works with young clients toincrease their popularity on various social networks. After all, likes and views can be a ticketto fame for upcoming artists. That is, they like to follow friends; retweets are the social currencyof the 21st century.MSS also negotiates with clients to have them wear, advertise, or use a product or brand oreven interact with a celebrity to increase their online visibility.MGMT Software Solutions collects as much data as possible from its clients' fans. Thisdata is generated when a fan retweets, clicks “Like,” or creates a comment, thus creatinga demographic profile of that fan. For example, MSS has clients Collins, Acadia, Julia,and Tyler.When Collins’ friends like his profile picture, Facebook tracks who his most popular friendsand family are. Why? Those persons, in turn, ‘like’ products, services, and celebrities –information valuable to those advertisers.When Acadia ‘likes’ dozens of brands on…
arrow_forward
MGMT Software Solutions (MSS) is a Barbadian company that works with young clients toincrease their popularity on various social networks. After all, likes and views can be a ticketto fame for upcoming artists. That is, they like to follow friends; retweets are the social currencyof the 21st century.MSS also negotiates with clients to have them wear, advertise, or use a product or brand oreven interact with a celebrity to increase their online visibility.MGMT Software Solutions collects as much data as possible from its clients' fans. Thisdata is generated when a fan retweets, clicks “Like,” or creates a comment, thus creatinga demographic profile of that fan. For example, MSS has clients Collins, Acadia, Julia,and Tyler.When Collins’ friends like his profile picture, Facebook tracks who his most popular friendsand family are. Why? Those persons, in turn, ‘like’ products, services, and celebrities –information valuable to those advertisers.When Acadia ‘likes’ dozens of brands on…
arrow_forward
What role should a business manager play in helping determine the computer hardware that the organization will use?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Related Questions
- You are required to assess key functions including risk management and compliance for J.P Morgan Chase, and present a written report based on J.P Morgan Chase on the following in 2,000 words: Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the J.P Morgan Chase (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used. Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, J.P Morgan Chase approaches/ strategies to combat money laundering and terrorist financing issues. Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that J.P Morgan Chase must be compliant with.arrow_forwardSuppose your college or organization is considering a project to develop an information system that would allow all employees, students, and customers to access and maintain their own human resources information, such as address, marital status, and tax information. The main benefits of the system would be a reduction in human resources personnel and more accurate information. For example, if an employee, student, or customer had a new telephone number or e-mail address, he or she would be responsible for entering the data in the new system. The new system would also allow employees to change their tax withholdings or pension plan contributions. Identify five potential risks for this new project, and be sure to list some negative and positive risks. Provide a detailed description of each risk and propose strategies for addressing each risk. Document your results in a short paper.arrow_forwardList and decsribe internal (building) information security risks and mitigation tactics and how they will affect decision making strategies.arrow_forward
- You are required to assess key functions including risk management and compliance for the Bank of America. You are to present a written report based on the Bank of America on the following: Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the institution (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used. Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, the institution’s approaches/ strategies to combat money laundering and terrorist financing issues. Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that the financial institution must be compliant with.arrow_forwardSuppose your company has an e-commerce Website for selling different types of goods and services. Discuss the followings: i) Ethical concerns associated with storing and analyzing user data? ii) How would you use intrusion detection system to control security threats that face this website?arrow_forwardInsecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of the many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic. Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .arrow_forward
- Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of thePage 3 of 3many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .arrow_forwardThe Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…arrow_forwardThe Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…arrow_forward
- Discuss the three types of information security policy proposed by NIST SP 800-14.arrow_forwardExplain the PESTEL Analysis of Blackberry Data Security Sector.arrow_forwardData needs to be secured in three states: at rest, in use, and in motion. Select one state of data and describe its security challenges. What are some of the best practices securing data in that state?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education