i mentioned my question in attached file document

User Generated

zraqhnenivaqxhzne

Computer Science

ISOL 633

University of the Cumberlands

Description

please done it very quickly and do not plagarism the text


i mentioned my question in attached file document

Unformatted Attachment Preview

Lab Assessment #1 – Lab Report File In your Lab Report file, use the following table to identify three to five IT assets and insert them into the table. Indicate in which of the seven domains of an IT infrastructure the asset resides. Indicate if the asset accesses customer privacy data or contains customer privacy date. Finally, classify the IT asset as Critical, Major, or Minor, where the following defines each: • • • Critical – Generates revenues or represents intellectual property asset of organization Major – Contains customer privacy data Minor – Required for normal business functions and operations Explain how data classification standards are related to customer privacy data protection and security controls? IT Asset Description Seven Domains of Typical IT Privacy Data Impact Assessment (Critial-MajorMinor) Note: Pay attention to the descriptions of the various System/Application assets. Individual assets may fall into different assessment categories. The same certainly holds true for real-world environments you will assess. The guiding question should be “What does this asset do? Or “What sort of data does it hold?” Lab Assessment #2 – Lab Report File You must complete the assignment in a Word document and then upload it to the assignment area for grading. Remember, you must cite and reference sources. Your answer must be a minimum of 2 full pages in length following APA guidelines. Please read the below article titled “VA Ignores Cybersecurity Warnings” https://www.pcworld.com/article/126093/article.html Note: When reading the article, place yourself in the position of the person called to prevent the situation from happening again. Where do the vulnerabilities begin? Discuss the following questions: 1. What laws have been violated? 2. What do you think contributed to the problems that could lead to a violation of these laws? 3. What are the implications to the individual and organization of these violations? 4. What are some security controls and mitigation strategies for handling future violations? (Name three to five) 5. How does privacy law differ from information systems security?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

please take the l...

Similar Content

Related Tags