Information management security

Anonymous
timer Asked: Mar 27th, 2017
account_balance_wallet $5

Question Description

Data Breach Investigations

Learning Objective: Evaluate trends in recent data breaches.

Assignment Requirements

While planning for security, it is important to understand the various types of data breaches that organizations face. Review the Data Breach Reports that are linked in the Reading section. This might take a little while, and you may want to make notes to yourself while reading. Look for trends over the past four years.

  1. Watch the 3-minute video, Understanding the Real Risk of a Data Breach, by Verizon at https://www.youtube.com/watch?v=wsdDC7DbgLE#t=86.
  2. Summarize at least five major trends identified over the last three years.
  3. Why should we care about looking at these trends?
  4. Include your opinion on the trends. (e.g., Why they occurred? How to avoid? and etc.)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 2-3 pages (plus a cover sheet)
  • Proofread and edit for spelling, grammar, punctuation, proper wording, etc.

Tutor Answer

RyanTopTutor
School: Duke University

Attached.

Running Head: INFORMATION SECURITY MANAGEMENT

Information Security Management
Name
Instructor
Institutional Affiliation
Date

1

INFORMATION SECURITY MANAGEMENT

2

The NIST SP 800 series is basically a set of documents that describes the U.S federal
government computer security policies, guidelines and procedures. It should be noted that NIST
SP 800 series came as a result of elaborate research to come up with a workable and cost
effective methods for optimizing the computer information security. SP 800 covers all the NIST
publications that are recommended and has the criteria for assessing and documents the various
threats and vulnerabilities (Johnson et al., 2011). It covers important publication which is useful
in implementing security measures to minimize the various risks of adverse effects. The SP 800
series publication are also useful in providing guidelines for enforcing security rules and can
also be used as legal reference in cases of serious litigations that involves computer information
security violations. The following are some of the publications that are within NIST SP 800
series that are useful in providing computer security guidelines.
SP 800-100
The SP 800-100 series basically covers information security guidebook which is a guide
for managers as recommended by the National Institute of Standards and Technology (NIST). It
sets out a guide for developing information security guidelines including minimum requirements
for providing information security for all state agencies and other federal organs within the
United States. The aim of this guideline is to secure the information assets of all state agencies so
as to protect the interest of the public and the reputation of those agencies (Bowen, Hash &
Wilson, 2007).
SP 800-122
The SP 800-122 publication guide provides a guide to protecting the confidentiality of
the personal identifiable information (PII) as recommended by the National Institute of Standards
and Technology (NIST). The purpose of the SP 800-122 ...

flag Report DMCA
Review

Anonymous
Top quality work from this guy! I'll be back!

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors