Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

• Assignment 1: Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two (2) assistant registrars, two (2) student workers, and one (1) receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar's office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar's office.

Write a three to five (3-5) page paper in which you:

1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

2. Recommend the proper audit controls to be employed in the registrar's office.

3. Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

o Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.

o Use technology and information resources to research issues in security strategy and policy formation.

o Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92017335
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Case study 1read the article in the attachmentan overview

Case Study 1 Read the Article in the attachment An overview of cyber-attack and computer network operations simulation Write a four to five (4-5) page paper in which you: Identify at least three (3) benefits or key knowl ...

Knowledge management systems and crmin answer to the

KNOWLEDGE MANAGEMENT SYSTEMS AND CRM In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the company chose to deploy a knowledge management system called OpenText Process Suite. Go on ...

Question how does the role of operations vary across the

Question : How does the role of operations vary across the four types of e-Businesses namely e-marketplace, e-service, e-retailers and wholesalers, and e-producers? Suggest some possible performance measures that could b ...

Individual projectusing proper apa format write 2 to 4

Individual Project Using proper APA format write 2 to 4 pages on the following • Search the Internet for an article where physical security failed • Propose and discuss possible changes in that organization's physical se ...

Question how are authentication and authorization alike and

Question : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Please write minimum of 200 words with 0 % plagiarism.

Write a 2- to 3-page paper evaluating the business

Write a 2- to 3-page paper evaluating the business operations and network design of your current organization or a previous employer. Include the following: What does the company do? Who are the customers? Types of emplo ...

Big data and data analytics are hot topics that are

Big data and data analytics are hot topics that are frequently in the media these days. Much of the application of these mathematical concepts is industry specific, and the information security industry is no exception. ...

Confidentiality integrity and availability or the cia triad

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

Please respond to student 150-250 words do you agree or

Please respond to student 150-250 words ...do you agree or disagree One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Inte ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As