Description
In the past five weeks, you have learned about information system security and cybercrimes. As you move ahead in your Criminal Justice career path, you will have access to information and networks. In Week 1 you worked with Riordan Manufacturing to review their network and provide some guidance. In this final assignment, you will work with Smith Systems Consulting. The company consults with organizations to incorporate technology and streamline processes. Every five years, the company hires an outside firm to run an audit to ensure they are safe and in compliance with regulatory organizations. You will review websites on the internet to acquire information on Smith Systems Consulting.
Write a 700- to 1,050-word report in which you address the following:
- Choose at least two laws that Smith Systems Consulting must ensure compliance with. Explain your selections and how each law affects the distribution of information in an organization like Smith Systems Consulting.
- Which of the six cyber elements of cyber readiness outlined on the https://www.cisa.gov/cyber-essentialspage would each law you selected support? Provide rationale.
- Provide at least two recommendations for Smith Systems Consulting to include in a guide of best practices related to internal and external policies and procedures. Explain how these recommendations promote protection of the hardware, software, and data in the company’s information systems.
Format your report according to APA guidelines.
Please follow grading rubric attached and also no plagiarism. If more information is needed please let me know.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached. Please let me know if you have any questions or need revisions.
Smith Systems Consulting Audit Report
A. APA formatted tittle page
B. Laws that Smith Systems Consulting must ensure compliance with
C. The six cyber elements of cyber readiness
D. Recommendations
E. APA formatted Reference page
References
Bourgeois, D. (2020). Chapter 12: The Ethical and Legal Implications of Information
Systems. Retrieved 10 January 2021, from
https://bus206.pressbooks.com/chapter/chapter-12-the-ethical-and-legal-implicationsof-information-systems/
Cyber Essentials | CISA. (2020). Retrieved 10 January 2021, from
https://www.cisa.gov/cyber-essentials
Gravrock, E. (2019). Here are the biggest cybercrime trends of 2019. Retrieved 31 July 2020,
from https://www.weforum.org/agenda/2019/03/here-are-the-biggest-cybercrimetrends-of-2019/
Jang-Jaccard, J., & Nepal, S. (2015). A survey of emerging threats in cybersecurity. Journal
of Computer and System Sciences, 80(5), 973-993. doi: 10.1016/j.jcss.2014.02.005
Wagner, S., & Dittmar, L. (2006). The Unexpected Benefits of Sarbanes-Oxley. Retrieved 10
January 2021, from https://hbr.org/2006/04/the-unexpected-benefits-of-sarbanesoxley
Running head: SMITH SYSTEMS CONSULTING AUDIT REPORT
Smith Systems Consulting Audit Report
Student’s Name
Institutional Affiliation
1
SMITH SYSTEMS CONSULTING AUDIT REPORT
2
Smith Systems Consulting Audit Report
There are several ethical and legal; concerns that firms in the information security
industry need to address. Ensuring...