CIS 438 Strayer University Security Regulation Compliance PPT & Paper

User Generated

qttbbqr

Computer Science

CIS 438

Strayer University

CIS

Description

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance.Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section1: Written Paper

  • Write a six to eight (6-8) page paper in which you:
    • Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:
      • FISMA
      • Sarbanes-Oxley Act
      • Gramm-Leach-Bliley Act
      • PCI DSS
      • HIP
      • Intellectual Property Law

The written paper must follow these formatting requirements:

  • Include page numbers.
  • Use 1-inch margins.
  • Use Times New Roman.
  • Use 12-point font size for the body of your text.
  • Spell out numbers (one, two, three, and so on). 
  • Use double spacing throughout the bod.
  • Use the point of view (first or third person) required by the question guidelines.
  • Section headings should be used to divide different each content areas (items a-d above). Align section headings (centered) on the page, be consistent, and include at least two section headings in the question.

?

Section 2: PowerPoint Presentation

  • Create a eight to ten (8-10) slide PowerPoint presentation in which you:
    • Include an overview of regulatory requirements and employee responsibilities, covering:
  • FISMA
  • Sarbanes-Oxley Act
  • Gramm-Leach-Bliley Act
  • PCI DSS
  • HIPAA
  • Intellectual Property Law

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Just winding up on the PowerPoint file, sending it to you soon.
Your work is complete. Please have a look at it and let me know if you need any correction before submitting it.The other file is just an outline on the same you can choose to ignore it.

Paper outline
Title: Security Regulation Compliance Paper
Introduction
This part is displayed in every section of the body paragraphs.
Body
This part provides an overview that will be delivered to senior management of regulatory
requirements the agency needs to be aware of, including:


FISMA



Sarbanes-Oxley Act



Gramm-Leach-Bliley Act



PCI DSS



HIP



Intellectual Property Law

Conclusion: It contains a detailed conclusion of the prompt and it is displayed in every part of
the paper.
References and Citations: They have been presented in APA format.


1

Running Head: CIS 438 WRITTEN PAPER

CIS 438: SECURITY REGULATION COMPLIANCE PAPER

Student's Name

Institution's Affiliation
Course
Instructor's Name
Date

2

The following pargraphs presents an overview that will be delivered to the senior management of
regulatory requirements the agency needs to be aware of.

1. FISMA

The major success of system security is getting a balance that exists between system
protection and user independence and suitability composed of abiding by the laws set. The
person who is responsible for ensuring this is usually the security manager. Security organization
consists of the development of a security-mindful organizational culture, evolving palpable
actions to sustenance security. The ignorance that company's posses towards the rules majorly
touching on software and technology have resulted in the loss of a lot of cash in payment of
fines. The following are some regulatory requirements in place regarding systems (Gikas, 2017).
The Federation Information security Management Act (FISMA) is a United States law
that got passed in the year 2002 that required all federal agencies to build, record and use the
non-information security system. It is part of the more significant E-Government Act of 2002,
whose main plan was to introduce and improve the organization of digital government services
and procedures. FISMA is a very critical guideline for national data security levels and rules. It
got presented to protect public information as well as check on spending by the government in
regards to information security. FISMA is lead by a set of guidelines and measures that most
government agencies have to cope with. FISMA over the years has grown to accommodate state
agencies such as Medicare. The requirements also affect those in the private sector but are in
business with the government, where every agency or individual working with the government
must have a list od every knowledge system used within the agency. Also, the companies must
show integrations between the knowledge system and other knowledge systems in place. All the

3

agencies should also group their operations in terms of risks to ensure that sensitive information
and the systems that access it gets given the highest attention degree of security. The FIPS 199
explains various risk levels that agencies may use in categorizing their knowledge systems.

FISMA also needs agencies to create...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags