Beruflich Dokumente
Kultur Dokumente
You are part of a team has been selected by the Chief Information
Officer (CIO) to perform an audit of the HR Department.
Include a minimum of two audit steps for each of the areas listed above.
The audit steps should follow the following format:
Your grade on the assignment will be based on how well you address:
---------------------------------------------------------------------------------
Authenticity
Accountability
---------------------------------------------------------------------------------
Define ethics.
---------------------------------------------------------------------------------
Explain why public corporations have the same privacy issues (for
intellectual property) as people do (for personal information)
Conclude your assignment with ideas regarding how each law can
be improved
---------------------------------------------------------------------------------
Include how the formula for risk can be applied to the organization.
System characterization
Threat identification
Vulnerability identification
Control analysis
Likelihood determination
Impact analysis
Risk determination
---------------------------------------------------------------------------------
Firewalls
Access control
---------------------------------------------------------------------------------
Social engineering
Mobile computing
Write a 3 full page evaluation (not including the title and reference
pages) of security technologies and methodologies that can be used to
mitigate each of the above information security risks. Support your
paper with appropriate references and follow APA format.
Submit your assignment and Turnitin report using the Assignment Files
tab.
---------------------------------------------------------------------------------
Complete the "Security Policy Documents and Life Cycle" topic of the
Skillsoft course "SSCP Domain: Security Operations and
Administration Part 1."
---------------------------------------------------------------------------------
Complete the "Security Policy Documents and Life Cycle" topic of the
Skillsoft course "SSCP Domain: Security Operations and
Administration Part 1."
---------------------------------------------------------------------------------
Review of steps unique to the security life cycle, not in common with
SDLC