Cis 438 Assignment 1: Privacy Laws and Security Measures

In: Computers and Technology

Submitted By jesstsosie
Words 395
Pages 2
CIS 438 Assignment 1: Privacy Laws and Security Measures

http://homeworklance.com/downloads/cis-438-assignment-1-privacy-laws-and-security-measures/
CIS 438 Assignment 1: Privacy Laws and Security Measures Assignment 1: Privacy, Laws, and Security Measures
Due Week 3 and worth 100 points
You are an information security manager for a large retail sporting goods store. The sporting goods store is involved in the following in which they:
•Maintain an internal network and an intranet protected by a firewall
•Maintain a Web server in the DMZ that is protected by another firewall
•Accept credit card sales in the store and over the Web via e-Commerce transactions
•Maintain an email server for employee email communication and communication with other business partners and customers
•Maintain a wireless network within the store
•Use RFID for inventory and theft prevention
•Maintain a Facebook presence
•Provide health screening for high blood pressure, high cholesterol, and other potential health risks
The CEO is concerned about the amount of information that is being collected and maintained within the organization.
Write a three to five (3-5) page paper in which you:
1.Describe the major privacy issues facing organizations today.
2.Analyze the major privacy issues described above and compare that to the potential privacy risks facing the sporting goods store.
3.Explain the security risks and applicable laws that govern the privacy risk.
4.Describe the security measures that the organization needs to implement to mitigate the risks.
5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow…...

Similar Documents

Unit 10 Assignment 1: Examine Real-World Implementations of Security Standards and Compliance Laws

...UNIT 10 ASSIGNMENT 1: EXAMINE REAL-WORLD IMPLEMENATATIONS OF SECURITY STANDARDS AND COMPLIANCE LAWS CIPA stands for The Children's Internet Protection Act. It is a bill that was signed into law in December 2000, and was to be constitutional by the United States Supreme Court in June 2003. It requires schools K-12 and libraries to have internet filters to protect children from harmful online content that blocks access to “visual depictions” on the Internet that are obscene, child pornography or harmful to minors. Meaning any picture, image, graphic image file, or other visual depiction that has been taken as a whole and with respect to minors, appeals to an excessive interest in nudity, sex, or excretion; depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. The law also states that a school or library may disable the technology protection measures concerned, during use by an adult, to enable access for bona fide research or other lawful purpose. Public Schools and Public Libraries must comply with CIPA to be able to take advantage of E-rating discounts for telecommunication resources and LSTA grants for various programs. The act has several requirements......

Words: 502 - Pages: 3

Law Assignment 1

...Homework Assignment #1 One of the most important skills you will learn in this course is how to “brief” a case. Judges interpret the law to resolve a dispute between two parties in a civil trial. This interpretation is documented in an “opinion”. These opinions are indexed in volumes and online. Opinions can be complex and address a variety of issues in the plaintiff’s claims or claims. Using case “briefs” will help you to understand how the court interpreted the law and how that interpretation may apply to another situation. A brief of a case will contain the parties involved, the relevant facts of the case, the issue the court is deciding, the rule of law, and the courts conclusion and rationale. Instructions: Use the Temple’s online library to search for this citation: “88 F.Supp.2d 116” Access this database by following these steps: 1. Access TU Portal 2. From TU Portal, select TU Library link on the left 3. In TU Library, select Databases, and then All Databases A-Z 4. Open the LexisNexis Academic Database 5. Select Look up a Legal Case 6. Search for citation: 88 F.Supp.2d 11 This will allow you to access this cases opinion, read the opinion in entirety and answer the following questions. Question 1: What court is issuing this opinion? UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK Question 2: Provide a brief description of a plaintiff? Who is the plaintiff in this case? JOHN D.R. LEONARD is plaintiff.......

Words: 732 - Pages: 3

Cis 301 Assignment 1

...CIS 301 Assignment 1 http://homeworktimes.com/downloads/cis-301-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 301 Assignment 1 http://homeworktimes.com/downloads/cis-301-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 301 Assignment 1 http://homeworktimes.com/downloads/cis-301-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 301 Assignment 1 http://homeworktimes.com/downloads/cis-301-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 301 Assignment 1 http://homeworktimes.com/downloads/cis-301-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website :......

Words: 510 - Pages: 3

Cis 505 Assignment 1

...CIS 505 Assignment 1 http://homeworktimes.com/downloads/cis-505-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 505 Assignment 1 http://homeworktimes.com/downloads/cis-505-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 505 Assignment 1 http://homeworktimes.com/downloads/cis-505-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 505 Assignment 1 http://homeworktimes.com/downloads/cis-505-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website : http://homeworktimes.com/ Let us know if we can assist you with any thing else today Hit us Email at : Onlineeducationalservice@gmail.com Thank you CIS 505 Assignment 1 http://homeworktimes.com/downloads/cis-505-assignment-1/ click above Link to get this A Graded Assignment For More information visit our website :......

Words: 459 - Pages: 2

Cis 500 Assignment 3 Cyber Security

...innovative security processes and policies to decrease the threats and challenges inherited from new technologies, software applications, and network devices. Information, network equipment’s, transmission media, computer systems, and servers are subject to threats. “Yet the use of information and communication technologies has increased the incidents of computer abuse.” (Backhouse and Dhillon). Security measures and countermeasures are fixed to guard organization against different security assaults. To assure the safekeeping requirements of a given company, it is vital to be able to assess the current security demands of an organization as well as the measures taken to attain such requirements. Security weaknesses cause an adverse impact on organizations such as financial loss, reputations, and loss of customer confidence (Kumar, Park, and Subramaniam, 2008). The purpose of applying security measures, controls, and strategies is to protect information security objectives and information assets. Integrity, confidentiality, and availability are the primary concerns in categorizing information level of safety for Information Security purposes (Chen, Shaw and Yang, 2006, Johnson, 2008 and. Nyanchama, 2005). RED FLAGS The stealing of payment card information from over 40 million Target customer was not have prevented by Target. Target could have acted on the information they received from the cyber-security firm it hired to monitor its systems. Target security team should...

Words: 882 - Pages: 4

Cis 210 Assignment 1

...Vik Shingadia CIS 210 4/19/15 Week 2: Assignment 1 Mark Stone Contents Introduction: 4 The Required Equipments : 4 Maintenance : 6 The Total Cost involved In The Creation The System : 8 Workflow Diagram : 9 Conclusion : 10 References : 11 Introduction: During dinner my sister talked about how she was frustrated with having to manually tack and reorder high demand items. She asked me if I could help her with an automated system, but has a very small budget. These days particularly in the past 10 years, even many smaller businesses have understood that computerized inventory management systems are very useful, accurate and make their jobs much easier than doing the same things manually. Inventory control is important to assure control in businesses that handle transactions revolving around consumer goods. The inventory control system must be able to warn the vendor when one of the items in the store is going to be out of stock soon and make the person who handles this kind of thing reorder (if it is a good system of course), otherwise maybe one day some important items can be out of stock, affecting the business negatively. Simply saying “we don't have that stuff right now”, is somewhat less than fully professional. The Required Equipments : Inventory management technology is a mix of hardware and software designed to add reliability to inventory accounting, reduce incidents of theft and facilitate inventory audits. Individual...

Words: 1570 - Pages: 7

Cis 175 Assignment 1

...Strayer University Week 10 Assignment 3: Business Intelligence and Data Warehouses CIS175008VA016-1154-001 Intro to Networking Professor Obi Ndubuisi June 14, 2015   For the company DesignIT, I would use a LAN type of network (for local-area network). This networks several computers, a mail (exchange) server, a database server and a file share server in one building and interconnects with each switch or backbone. I chose this for this small space because it is less than 100 square feet and is all within a single dwelling. This way the employees can all share their resources with one another, an intranet, database and printers. This network only needs a single modem with wireless capabilities and an optional access point located at the opposite end. I would recommend the wireless access-point to serve the conference room in case the client wants to set up teleconferences. We can even create an interface that when their computer finds the wireless network, a page would come up asking for their employee ID and password. This would also provide access for vendors and customers so they can have temporary access in order to have access to their files on Cloud or DropBox in order to contribute to DesignIT during their visit. Most businesses have these similar services and use ring topology or mesh topology. With ring topology there is an extra layer created, if one device fails you can pin-point the failure but the entire network would go down.  DesignIT would only......

Words: 2878 - Pages: 12

Security and Privacy

...Security and Privacy Kate Cann HCS/533 August 10 Michael Gaul Security and Privacy According to Robin Rudowitz (September 2006), “before Hurricane Katrina struck in August 2005, New Orleans had a largely poor and African American population with one of the nation’s highest insurance rates, and many relied on the Charity Hospital system for care”. The safety net of New Orleans’s health care system was a distraught. A lot of people were left with no access to care for year after the Hurricane Katrina. On August 2005, the Hurricane destroyed a lot of homes and a lot of people were forced out of their homes leaving them homeless. Much of the city’s infrastructures were destroyed due to the Hurricane. The Hurricane did not only destroy people’s homes and the city’s infrastructures but also destroyed patient’s medical files that were stored in the basement of the hospital. The hospital had in place measure that allowed patients to obtain their medical records in order for them to be treated at a different hospital. Had the hospital not have prior measures in place, patients would have been stranded during the catastrophic event that took place in New Orleans Having the measures in place also helped them identify the people who lost their lives in the Hurricane Katrina. Management Plan A management plan is a blueprint for the way your organization is run, both day-to-day and over the long term. “It includes the standard methods for doing......

Words: 1859 - Pages: 8

Cis 438 Assignment 1: Privacy Laws and Security Measures

...CIS 438 Assignment 1: Privacy Laws and Security Measures http://homeworklance.com/downloads/cis-438-assignment-1-privacy-laws-and-security-measures/ CIS 438 Assignment 1: Privacy Laws and Security Measures Assignment 1: Privacy, Laws, and Security Measures Due Week 3 and worth 100 points You are an information security manager for a large retail sporting goods store. The sporting goods store is involved in the following in which they: •Maintain an internal network and an intranet protected by a firewall •Maintain a Web server in the DMZ that is protected by another firewall •Accept credit card sales in the store and over the Web via e-Commerce transactions •Maintain an email server for employee email communication and communication with other business partners and customers •Maintain a wireless network within the store •Use RFID for inventory and theft prevention •Maintain a Facebook presence •Provide health screening for high blood pressure, high cholesterol, and other potential health risks The CEO is concerned about the amount of information that is being collected and maintained within the organization. Write a three to five (3-5) page paper in which you: 1.Describe the major privacy issues facing organizations today. 2.Analyze the major privacy issues described above and compare that to the potential privacy risks facing the sporting goods store. 3.Explain the security risks and applicable laws that govern the privacy risk. 4.Describe the......

Words: 395 - Pages: 2

Law Assignment 1

...Part 1: Law in Society A) A responsible business person would set a comprehensive code of ethics and values to be met by employees and associates, and would make clear how this code is to be enforced and in what matter it will be followed-up. A legal risk plan will be outlined and the business person will make the decision to retain a lawyer or hire an on-staff lawyer to handle all legal issues that may arise, and to follow up on the legal risk plan ensuring it is implemented accordingly and adhered to. Every business requires a budget and projected cash flow, which goes along with recruiting investors. All creditors will want to know the debt collection plan in place so the company can collect on its debts owed by customers and buyers. Employees will need to be hired and trained, and requires a review schedule to be implemented, ensuring that employees are meeting levels of service, hitting all the targets for sales, abiding by the code of ethics and upholding the company values. A clear and concise business plan is really the starting point, because any investors will want to know the advertising strategy (including target market), product lines, manufacturing/purchasing plans, management hierarchy, inventory monitoring and management, and the accounting policy to be used (IFRS vs GAAP.) A stupid business person would hire anyone, qualified or not, provide little to no training, and would likely be ignorant of legal risks surrounding their enterprise. There would be a......

Words: 1783 - Pages: 8

Cis 111 Assignment 1

...Assignment 1: Business Rules and Data Models A database is an incorporated PC structure that stores end-user information and metadata (Leake, A.). Data is the raw format of information, which when structured properly, it can produce accurate, relevant, and timely information that is the key to making a good database management system. The true purpose of a database is to provide computer-based systems a way in which to store, manage, and retrieve data quickly. A local college has tasked me to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants me to make the database keep track of the instructors teaching each of the courses. The local college database, will be to store the data of enrolled students, the courses offered and class schedule, and the information of the instructors. The database will provide course matches for each student based off previous courses taken and pre-requisites obtained, as well as keep track of the instructors that are teaching the class. The database will provide the data a student needs to insure they are taking the correct courses and provide the college and the faculty general student information, such as student ID. Entities (Tables) are defined as a person, place, thing, or event in which data is collected and stored. Each entity is a unique object that may be a physical or abstract object within real life (for......

Words: 780 - Pages: 4

Cis 511 Week 1 Assignment 1

...CIS 511 WEEK 1 ASSIGNMENT 1 A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-511-week-1-assignment-1 Visit Our website: http://hwsoloutions.com/ Product Description CIS 511 Week 1 Assignment 1, Assignment 1: Integrated Case Study: Bandon Group, Inc. Assignment 1: Integrated Case Study: Bandon Group, Inc. Read the integrated case study on Bandon Group, Inc. starting on page 151. Review Table 1 on page 155 explaining the Activities, Documentation, and Things to Do. Complete the following: • Step 1: Purpose and scope of study • Step 2: Document high-level business direction • Step 3: Identify key information needs and measures • Step 4: Document detailed business requirements • Step 5: Document current IT situation – Internal o This paper should adhere to APA 5th edition style standards including the following: Double space, 1” margins, title page, in text citation of references, and a reference page. CIS 511 Week 1 Assignment 1, Assignment 1: Integrated Case Study: Bandon Group, Inc. Assignment 1: Integrated Case Study: Bandon Group, Inc. Read the integrated case study on Bandon Group, Inc. starting on page 151. Review Table 1 on page 155 explaining the Activities, Documentation, and Things to Do. Complete the following: • Step 1: Purpose and scope of study • Step 2: Document high-level business direction • Step 3: Identify key information needs and measures • Step 4: Document detailed business requirements • Step 5: Document......

Words: 378 - Pages: 2

Cis 417 Week 2 Assignment 1

...CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-2-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 2 ASSIGNMENT 1 – COMPUTER FORENSIC OVERVIEW Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: 1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information. 3. Discuss how computer forensics investigations pertain to the law and trying of cases. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 2 Assignment 1 – Computer Forensic Overview in order to ace their studies. CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit......

Words: 679 - Pages: 3

Cis 462 Wk 4 Assignment 1 It Security Policy Framework

...CIS 462 WK 4 ASSIGNMENT 1 IT SECURITY POLICY FRAMEWORK To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-4-assignment-1-it-security-policy-framework/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 4 ASSIGNMENT 1 IT SECURITY POLICY FRAMEWORK CIS 462 WK 4 Assignment 1 - IT Security Policy Framework Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to five (3-5) page paper in which you: 1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization. 2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations. 3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy......

Words: 793 - Pages: 4

Business Law Assignment 1

...“Jenson V. Eveleth Taconite Co.” Normarie Castellon Professor Lisa Browning Business Law – LEG 100 Spring Term 2012 Abstract In this paper, we will discuss the case of Jenson V. Eveleth Taconite Co. In August 1988, Lois Jenson and Patricia Kosmach filed a class action suit against Eveleth Mines alleging sex discrimination in violation of Title VII of the Civil Rights Act of 1964 (Title VII), 42 U.S.C. § 2000e-2, and the Minnesota Human Rights Act (MHRA), Minn.Stat. § 363.03, subd. 1(2). This case was the first sexual harassment class action to reach the federal court system, and was overseen by U.S. District Court Judge James Rosenbaum. We will look at this case and summarize the actions leading up to the lawsuit, discuss how management could have prevented the lawsuit, discuss ethical considerations, determine which sources of law would be most relevant, and finally make recommendations on what management could as alternate resolutions. “Jenson V. Eveleth Taconite Co.” Summarize the actions that lead to the lawsuit. This particular case was a very big lawsuit for its time and has been made into a movie we know as North Country. Almost from the beginning, according to court documents, Ms. Jenson and other women were subjected to sexual harassment, verbal abuse, threats, stalking, and intimidation. This behavior has since become known as "strategic" or "territorial harassment," in this case acts perpetrated by men in a predominately male workplace. ......

Words: 1300 - Pages: 6