Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Case Study : Data Breaches and Regulatory Requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics.

The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems.

Review the information about FISMA at the NIST Website. Additionally, review the information, about the data breaches within government systems.

Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.

Write a three to five (3-5) page paper on your selected case in which you:

Describe the data breach incident and the primary causes of the data breach.

Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).

Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92684305
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Ch 7 control and accounting information systemson the other

Ch. 7: Control and Accounting Information Systems On the other hand, the evidence of fraud here seems strong. If this kind of behavior is not penalized, then the perpetrators may be encouraged to do itagain, with future ...

Singulation is the process by which an rfid reader

"Singulation" is the process by which an RFID reader identifies and communicates with a single RFID transponder. Two singulation methods are tree-walking and an Aloha MAC. Which method is preferable in a densly populated ...

Distributive bargainingany of the parties involved in the

Distributive Bargaining Any of the parties involved in the negotiation tries to get the maximum advantage by applying the tactics. According to Batra, generally, the negotiation processes are handled by using two approac ...

Please answer the question below with 250 words or

Please answer the question below with 250 words or more. Question1. Give an example of a project that is driven by each of the following needs. (Each need should have a different project described.) Marketing Demand Busi ...

Question suppose a computer using direct mapped cache has

Question : Suppose a computer using direct mapped cache has 2G Bytes of main memory and a cache of 512Blocks,where each cache Block has 8words,and word size is 2 Bytes a) How many blocks are in the main memory? b) What i ...

Assignmentdevelop an understanding of public policy and how

Assignment Develop an understanding of public policy and how it impacts IT from a business and development standpoint. Describe an example of: (1) a public policy that had a positive impact on IT, and (2) a public policy ...

Question suppose the daytime processing load consists of 65

Question : Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the system is slow. After doing some research, you have learned that you can upgrade ...

Q1 explain identification and assessment of emerging

Q1. Explain identification and assessment of emerging technologies? (APA format required, Turntin check required. Minimum 250 words essay) Q2. What criteria are used to rank current and emerging technology to get the bes ...

Assignment business rules and data modelssuppose a local

Assignment : Business Rules and Data Models Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and cou ...

Part a the university would like to encourage students to

Part A: The university would like to encourage students to pick up their tickets at the will call window to reduce mail costs. Revise the website program to reflect the following changes: Ask the student how many events ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As