UOTP Emerging Threats in Cybersecurity Smith Systems Consulting Audit Report

User Generated

gurerny0ar

Writing

University of the Potomac

Description

In the past five weeks, you have learned about information system security and cybercrimes. As you move ahead in your Criminal Justice career path, you will have access to information and networks. In Week 1 you worked with Riordan Manufacturing to review their network and provide some guidance. In this final assignment, you will work with Smith Systems Consulting. The company consults with organizations to incorporate technology and streamline processes. Every five years, the company hires an outside firm to run an audit to ensure they are safe and in compliance with regulatory organizations. You will review websites on the internet to acquire information on Smith Systems Consulting.

Write a 700- to 1,050-word report in which you address the following:

  • Choose at least two laws that Smith Systems Consulting must ensure compliance with. Explain your selections and how each law affects the distribution of information in an organization like Smith Systems Consulting.
  • Which of the six cyber elements of cyber readiness outlined on the https://www.cisa.gov/cyber-essentialspage would each law you selected support? Provide rationale.
  • Provide at least two recommendations for Smith Systems Consulting to include in a guide of best practices related to internal and external policies and procedures. Explain how these recommendations promote protection of the hardware, software, and data in the company’s information systems.

Format your report according to APA guidelines.

Please follow grading rubric attached and also no plagiarism. If more information is needed please let me know.

Unformatted Attachment Preview

Written Assignment Grading Form Content (70%) • All key elements of the assignment are covered in a substantive way. Major points are stated clearly; are supported by specific details, examples, or analysis. Points Earned: Comments: Use at least three academic sources, excluding your weekly readings. I highly suggest you submit each paper to WritePoint and TurnItIn to get the best possible grade. • The paper links theory to relevant examples and uses the vocabulary of the theory correctly. Organization (15%) • The tone is appropriate to the content and assignment. • The introduction provides a sufficient background on the topic and previews major points. • Paragraph transitions are present, logical, and maintain the flow throughout the paper. • The conclusion is logical, flows from the body of the paper, and reviews the major points. Points Earned: Comments: Mechanics (15%) • The paper—including tables and graphs, headings, title page, and reference page— is consistent with APA formatting guidelines and meets course-level requirements. • Intellectual property is recognized with in-text citations and a reference page. • Rules of spelling, grammar, usage, and punctuation are followed. • Sentences are complete, clear, concise, and varied. Points Earned: Comments: Total Point Earned: Comments: /150 09/24/2012 v1.0 1 Academic Operations & Training In the past five weeks, you have learned about information system security and cybercrimes. As you move ahead in your Criminal Justice career path, you will have access to information and networks. In Week 1 you worked with Riordan Manufacturing to review their network and provide some guidance. In this final assignment, you will work with Smith Systems Consulting. The company consults with organizations to incorporate technology and streamline processes. Every five years, the company hires an outside firm to run an audit to ensure they are safe and in compliance with regulatory organizations. You will review websites on the internet to acquire information on Smith Systems Consulting. Write a 700- to 1,050-word report in which you address the following: • Choose at least two laws that Smith Systems Consulting must ensure compliance with. Explain your selections and how each law affects the distribution of information in an organization like Smith Systems Consulting. • Which of the six cyber elements of cyber readiness outlined on the https://www.cisa.gov/cyber-essentialspage would each law you selected support? Provide rationale. • Provide at least two recommendations for Smith Systems Consulting to include in a guide of best practices related to internal and external policies and procedures. Explain how these recommendations promote protection of the hardware, software, and data in the company’s information systems. Format your report according to APA guidelines. Submit your assignment. 09/24/2012 v1.0 2 Academic Operations & Training
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Smith Systems Consulting Audit Report
A. APA formatted tittle page
B. Laws that Smith Systems Consulting must ensure compliance with
C. The six cyber elements of cyber readiness
D. Recommendations
E. APA formatted Reference page
References
Bourgeois, D. (2020). Chapter 12: The Ethical and Legal Implications of Information
Systems. Retrieved 10 January 2021, from
https://bus206.pressbooks.com/chapter/chapter-12-the-ethical-and-legal-implicationsof-information-systems/
Cyber Essentials | CISA. (2020). Retrieved 10 January 2021, from
https://www.cisa.gov/cyber-essentials
Gravrock, E. (2019). Here are the biggest cybercrime trends of 2019. Retrieved 31 July 2020,
from https://www.weforum.org/agenda/2019/03/here-are-the-biggest-cybercrimetrends-of-2019/
Jang-Jaccard, J., & Nepal, S. (2015). A survey of emerging threats in cybersecurity. Journal
of Computer and System Sciences, 80(5), 973-993. doi: 10.1016/j.jcss.2014.02.005
Wagner, S., & Dittmar, L. (2006). The Unexpected Benefits of Sarbanes-Oxley. Retrieved 10
January 2021, from https://hbr.org/2006/04/the-unexpected-benefits-of-sarbanesoxley


Running head: SMITH SYSTEMS CONSULTING AUDIT REPORT

Smith Systems Consulting Audit Report
Student’s Name
Institutional Affiliation

1

SMITH SYSTEMS CONSULTING AUDIT REPORT

2

Smith Systems Consulting Audit Report
There are several ethical and legal; concerns that firms in the information security
industry need to address. Ensuring...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags