security management case study

timer Asked: Oct 20th, 2018
account_balance_wallet $9.99

Question Description

Hi please read the Attached there is a question and case study please present the answers in a clear and logical order, develop coherent paragraph articulate your argument and purpose clearly. with no plagiarism please

Unformatted Attachment Preview

Assignment For the below question and case study, I expect you to present your answers in a clear and logical order, develop coherent paragraph articulate your argument and purpose clearly. 1- Discuss FISMA (Federal Information Security Management Act of 2002) and the Sarbanes-Oxley Act of 2002. Also, talk about their relevance to cybersecurity. 2- CASE STUDY: There is a new phenomenon in the cybersecurity domain called: “Bring Your Own Device (BYOD)” where employees can bring their personal devices at work and connect using the Wi-Fi to the organization’s network. Many employers are allowing their employees to use their personal mobile device for enterprise functions such as corporate email, work applications, etc. While this may save the company costs, the organization’s network remains vulnerable. A company can only monitor so much that’s on an employee personal device; Assess the threats, the vulnerabilities, and the impacts on an organization’s information systems posed by the use of mobile devices at work. What can be done to fix it at the policy level, technology level, and infrastructure level? Additional information: A threat is an undesirable events that can cause harm. A vulnerability is a weakness in an organization’s systems or security policies that can be exploited to cause damage. Impacts are the severity of the consequences if a threat indeed causes damage by exploiting a vulnerability. An information systems are combinations of hardware, software, telecommunications network, data, and people. ...
Purchase answer to see full attachment

Tutor Answer

School: Purdue University






Federal Information Security Management Act of 2002

Federal Information Security Management Act of 2002 (FISMA) was a framework that
was designed to protect government information, assets, and operations against any form of
threat. It was later signed into law and became part Electronic Government Act of 2002 (Dacey
& United States. (2002). This act assigned different agencies with the responsibility to ensure
that all government data was secure through conducting annual reviews of all government
information security program. The main objective of this act was to reduce the risk of leaking
government data far below acceptable levels in an efficient manner and in a cost-effective way.
The act provided all categories of information that greatly required to be put under protection,
selected baseline controls, security plans, authorization and processing of date, and monitoring of
security risks on a continuous basis (Singer & Friedman, 2013). This measure ensures that
government data is not breached and that all security measures are observed in handling
government data.
Sarbanes-Oxley Act of 2002
The Sarbanes-Oxley Act of 2002 was a measure by the government to protect investors
from fraudulent accounting activities that were being exercised by corporations. This is the
reason it is also referred to as corporate responsibility act (Dacey & United States. (2002). This
act introduced strict reforms including the requirement that corporations disclose their financial
position in order to prevent fraud. The act addressed among other issues; corporate
responsibility, accounting regulations, increased criminal punishment, and new protection. IT
departments were required to ensure that corporate electronic records were protected as per the
set standards. The act specified the period at which corporate information should be stored,
protected, and even clearance levels one had to go through before accessing such data (Sin...

flag Report DMCA

Top quality work from this guy! I'll be back!

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors