Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

case 3 – 17

i need help

Module 3 – Case

Security Laws and Standards

Assignment Overview

Employees must be trained and kept aware of topics related to information security, not the least of which is the expected behaviors of an ethical employee. This is especially important in information security, as many employees may not have the formal technical training to understand that their behavior is unethical or even illegal. It is the responsibility of information security personnel to do everything in their power to deter illegal, immoral, or unethical behavior and to use policy, education and training, and technology to protect information and systems.
 Three general causes of unethical and illegal behavior are ignorance, accident, and intent.
  Deterrence is the best method for preventing illegal or unethical activity. Laws, policies, and technical controls are all examples of deterrents. Laws and policies and their associated penalties only deter if three conditions are present: fear of penalty
probability of being apprehended
and the
 probability of penalty being applied
Many professional organizations have established codes of conduct or codes of ethics that members are expected to follow.


Module 3 Video

Case Assignment

Discuss and prepare tables to compare the following certifications: Certified Information Systems Security Professional (CISSP), HealthCare Information Security and Privacy Practitioner (HCISPP), Certified Cyber Security Forensics Analyst (CSFA), Certified Secure Software Lifecycle Professional (CSSLP) certification. Use the Internet to identify the ethical rules that holders of each certification have agreed to follow. Also determine the knowledge requirements for each of these certifications.

Assignment Expectations

You will be assessed on your comparison of the certifications in terms of their knowledge requirements, ethical rules, and effectiveness for the individual in terms of future employment.

You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the 

Trident APA 7 Guide
 at proper formatting and style.

Module 3 – Resources

Security Laws and Standards

Required Reading 

(2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course. 


Finding Skillsoft Books

(2022). Cybersecurity Awareness: Exposure to Security Risks. 1st half of course. 


Finding Skillsoft Books

De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 2 and 3. 


Finding Skillsoft Books

Moschovitis, C. (2021). Privacy, Regulations, and Cybersecurity: The Essential Business Guide. Wiley-VCH. Chapters 1 – 3. 


Finding Skillsoft Books

Schreider, T. and Noakes-Fry, K. (2020). Cybersecurity Law, Standards and Regulations, 2nd Edition. Rothstein Publishing. Chapters 1 – 3. 


Finding Skillsoft Books

Optional Reading

Harris, S., & Maymi, F. (2018). CISSP all-in-one exam guide, seventh edition, 8th edition (7th ed.) McGraw-Hill, Chapter 1. 


Finding Skillsoft Books

Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 2

Read Chapters 10 to 12
Andress, Jason and Winterfeld, Steve (2014). Cyber warefare: Techniques, tactics and tools for security practitioners. Syngress, Waltham, Ma. (ISBN: 9780124166721). Available in the Trident Online Library. 

Read Chapters 8, 9, 10
Chappel, M. Ballad, B., Balad, T. and Bnks, E.K. (2014). Access control, authentication, and public key infrastructure. Jones and Barlett Learning, 2nd Edition

Read chapters 19 – 23
Dordal, Peter L. (2017).  



An introduction to computer networks


. Book under Creative Commons 

Chapters 4 and 5
Gordon, A. (2015). Official (ISC)2 guide to the CISSP CBK, Fourth Edition, CRC Press.

Read Chapter 3



Risk management for enterprises and individuals


 (2017)  Book under Creative Commons

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VI

see attached. 2 Complete the following activity after reading Chapter 13, the Unit VI Lesson, and participating in the Unit VI Live Lecture. You will develop a PowerPoint from the information below: Summarize the content for the Unit VI Lesson in 2 to 3 slides. Next, create a slide for

DP

see attached 2 LAN Domain controls consist mainly of technical controls, such as firewalls, as well as management or administrative controls, such as policies and procedures. Discuss the following questions: 1. Operational controls are implemented by people rather than systems. What is an example of an operational control in the

III

see attached. You are an IT consultant hired by ABC Tech Solutions, a small but growing technology firm specializing in software development. The firm has recently expanded its operations and is looking to ensure its IT infrastructure is secure and compliant with industry standards. As part of your engagement, you

How does an online port scanner check for open ports?

 I want to understand how an online port scanner works. How can it detect whether specific ports on my IP address are open or closed? Are there any tools that show both open ports and my public IP address in one place? 

CASE 3 – 80

I need your help please Module 3 – Case Creating Value Assignment Overview The Case Assignment for this module is about understanding the development of IT strategies that support and are supported by business strategy in a global economy. Given the large amount of investment in IT, companies need to

SLP 3 – 80

Please help me Module 3 – SLP Creating Value Read or listen to these resources on Dr. Michael Porter’s competitive strategies.  Porter, M. E. and Mauborgne, K. R., HBR’s 10 must reads on strategy. Ascent Hu. Audio book. Go to Library Access. In Additional Library Resources, select Skillsoft Books. In

Make, Buy, or Modify

  As a project manager, you may be given the choice to either a) build your system from scratch; b) buy an existing system; or c) buy an existing system and modify it. With regards to each option, explain the make or buy decision you would take. Justify your response.

Cloud

See attached Case Analysis #1 – Cloud Computing Choose a case study or story of a cloud sourcing event or project in an organization. Find an article online.. Then do a brief analysis of the project or services being sourced in the cloud.  Focus on the type of cloud service SaaS,

II

see attached. • Your initial post should be at least 200 words in length. Imagine that you have been promoted to the position of an IT manager in a mid-sized firm, SecureFunds Inc, which specializes in financial services and has recently undergone significant growth and adapted to the new conditions

Managing Risks

 Identify and discuss the common sources of risk for IT software development projects. What will be your plan to manage them? Justify your response. 

Communications

  Explain why you agree or disagree with some of the suggestions covered this week for improving project communications, such as creating a communications management plan, stakeholder analysis, or performance reports for IT software development projects. Justify your response. What other suggestions do you have?

Case 2 – 80

I need help  Module 2 – Case Information Technology Planning Assignment Overview Strategic planning is a process exercise where it is important to gather whatever strategic collateral the rest of the company has generated to understand what the CEO and board hope to do in the future through the enterprise-level

SLP 2 – 80

Please help me with my assignment Module 2 – SLP Information Technology Planning Xerox is a firm that has dominated the copier business. As the market for copiers continues to shrink, how will Xerox survive? Research the current business environment for Xerox by using Fortune.com and Forbes.com, etc. In your

PowerPoint

 The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information about the differences between the IEEE 802.11a and IEEE 802.11g standards so that their salespeople will be better equipped to

Journal VIII

see attached. 2 Identify a task that you would need to perform in your current career or future career, and explain in detail how you would apply the knowledge you have learned in this course to succeed at performing the task in a real-world scenario. Your submission should be in

SLP 1 – 80

I need help on my assignment  Module 1 – SLP Strategy and Strategic Planning Review this  comprehensive review of strategic planning . The website is the brain-child of Dr. Ross A. Wirth, who has extensive experience in management consulting. However, the website is about general strategic planning, rather than IT

Case 1 – 80

I need help please.  Module 1 – Case Strategy and Strategic Planning Assignment Overview The Case for this module starts us off by looking at why IT strategy matters.  Please view the following video: Please note that this link will open in a new window and may require activation of

Improving Quality

  You are committed to improving the quality of developing software applications. Identify and discuss three recommendations for improving quality in IT software development projects. Justify your response.