SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 6 Days Ago
Questions Answered: 7559
Tutorials Posted: 7341

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Information Systems Posted 28 Apr 2017 My Price 12.00

IT 659 Information Technology Risk Analysis and Cyber Security Policy Part 2,Submit the Case Analysis and Incident Impacts portion of the final project. In this assignment, you will analyze the ethical issues and determine the legal compliance issues with

Submit the Case Analysis and Incident Impacts portion of the final project. In this assignment, you will analyze the ethical issues and determine the legal compliance issues within the organization, as well as the social and cultural impacts of these compliance issues. You will be expected to address the impact the incident may have had on the ethical and legal IT regulations at the time. The connection between the industry standards and the standards for informational technology should be determined, as well as the influence of the cultural impact on IT and cyber-communication or commerce. 



RUBIC

 



 

In the second portion of this assessment, you create an organizational cyber-security policy using the information that was identified in the risk analysis paper.

Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that

occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy.

Specifically the following critical elements must be addressed:

1. Compose an organizational security policy that protects the confidentiality, integrity, and availability of the organization’s data.

2. Evaluate the current U.S. cyberlaws; state statutes; and criminal, civil, private, and public laws and compare them with the organizational security policy to ensure compliance.

3. Assess the network cyber-security policy to determine if the policy is able to minimize risks and vulnerabilities.

4. Develop security policy sections that identify acceptable use for users pertaining to privacy, social media, email usage, and internet usage in the workplace.

Guidelines for Submission: Your paper must be submitted as a three- to five-page Word document with double spacing, 12-point Times New Roman font, one inch margins, and at least three sources cited in APA format.

Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information

Answers

(118)
Status NEW Posted 28 Apr 2017 07:04 AM My Price 12.00

IT -----------659----------- In-----------for-----------mat-----------ion----------- Te-----------chn-----------olo-----------gy -----------Ris-----------k A-----------nal-----------ysi-----------s a-----------nd -----------Cyb-----------er -----------Sec-----------uri-----------ty -----------Pol-----------icy----------- Pa-----------rt -----------2-----------

Attachments

file 1493363464-IT 659 Information Technology Risk Analysis and Cyber Security Policy Part 2.docx preview (1336 words )
R-----------isk----------- An-----------aly-----------sis----------- an-----------d C-----------ybe-----------r S-----------ecu-----------rit-----------y P-----------oli-----------cy -----------Par-----------t 2----------- I-----------T65-----------9 C-----------ybe-----------r l-----------aw -----------and----------- Et-----------hic-----------s -----------Pro-----------fes-----------sor----------- N-----------ame----------- D-----------ate----------- ----------- Or-----------gan-----------iza-----------tio-----------nal----------- Se-----------cur-----------ity----------- Po-----------lic-----------y -----------Kee-----------pin-----------g i-----------n m-----------ind----------- th-----------e e-----------nd -----------goa-----------l t-----------o k-----------eep----------- up----------- an----------- ab-----------nor-----------mal----------- st-----------ate----------- of----------- se-----------cur-----------ity----------- in-----------sid-----------e t-----------he -----------ass-----------oci-----------ati-----------on,----------- cl-----------ien-----------t a-----------cce-----------ss -----------to -----------cer-----------tai-----------n l-----------ong----------- ra-----------nge----------- in-----------for-----------mal----------- co-----------mmu-----------nic-----------ati-----------on,----------- me-----------dia----------- an-----------d e-----------mai-----------l l-----------oca-----------les----------- wi-----------ll -----------be -----------res-----------tri-----------cte-----------d. -----------Acc-----------ess----------- to----------- th-----------ese----------- lo-----------cal-----------es -----------mig-----------ht -----------be -----------all-----------owe-----------d o-----------n a-----------n u-----------nco-----------mmo-----------n n-----------eed----------- ne-----------ces-----------sit-----------y d-----------esi-----------re -----------in -----------lig-----------ht -----------of -----------the----------- in-----------div-----------idu-----------al
Not Rated(0)