Legal Regulation, Compiance and Investigation: Lab Assessment

User Generated

xhznequbaqv2123

Computer Science

Description

You must complete the assignment in a Word document and then upload it to the assignment area for grading. Remember, you must cite and reference sources. Your answer must be a minimum of 2 full pages in length following APA guidelines.

Please read the below article titled “VA Ignores Cybersecurity Warnings”

https://www.pcworld.com/article/126093/article.html

Note: When reading the article, place yourself in the position of the person called to prevent the situation from happening again. Where do the vulnerabilities begin?

Discuss the following questions:

  • What laws have been violated?
  • What do you think contributed to the problems that could lead to a violation of these laws?
  • What are the implications to the individual and organization of these violations?
  • What are some security controls and mitigation strategies for handling future violations? (Name three to five)
  • How does privacy law differ from information systems security?

Unformatted Attachment Preview

Lab Assessment #2 – Lab Report File You must complete the assignment in a Word document and then upload it to the assignment area for grading. Remember, you must cite and reference sources. Your answer must be a minimum of 2 full pages in length following APA guidelines. Please read the below article titled “VA Ignores Cybersecurity Warnings” https://www.pcworld.com/article/126093/article.html Note: When reading the article, place yourself in the position of the person called to prevent the situation from happening again. Where do the vulnerabilities begin? Discuss the following questions: 1. What laws have been violated? 2. What do you think contributed to the problems that could lead to a violation of these laws? 3. What are the implications to the individual and organization of these violations? 4. What are some security controls and mitigation strategies for handling future violations? (Name three to five) 5. How does privacy law differ from information systems security?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: VA IGNORES CYBERSECURITY WARNINGS

VA Ignores Cybersecurity Warnings
Name
Institution
Date

1

VA IGNORES CYBERSECURITY WARNINGS

2

In the case of “VA Ignores Cybersecurity Warnings,” the privacy and security laws were
violated. According to the announcement made by the Veteran Affairs, 26.5 million American
army and partners information had been stolen. The information had been kept by one of the data
analysts in VA on a personal laptop and a hard drive at home. The analyst was not allowed to
take the information at home, and thus he breached the security law in the Department.
The violation of the laws was prompted by lack of properly established laws in the
Veteran Affairs department on the employees ...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags