SlideShare a Scribd company logo
Running head: MOBILE APPLICATION SECURITY
1
MOBILE APPLICATION SECURITY
2
Mobile Application Security
Student’s Name
Institutional Affiliation
Audit Requirements for Finance Systems (Sarbanes-Oxley,
GLBA Compliance)
Introduction
When considering audit requirements for finance system, the
right place to start to make this examination will be to consider
the Sarbanes-Oxley (SOX) Act. This act was developed and
enacted as a result of turmoil in the US corporate world. At this
time Enron and WorldCom experienced a very public collapse
causing investors to loose billions of dollars not to mention
them loosing fundamental trust in US corporations. With the
downfall of Arthur Anderson – one of the largest public
accounting firms in the US, it was clear that the need address
the emerging challenges in corporate governance. .
The Sarbanes-Oxley Act was thus a response aimed at restoring
and renewing investor trust in addition to them understanding
public corporation financial reporting in order to achieve
reports that were reliable and useful. This is indeed capture in
section 302 – Corporate responsibility for financial reports, and
section 404 – management assessment of internal controls.
These sections empowered and make gate keepers central to the
generation of truthful and factual reports by public organisation.
The top leadership could no longer get away with claiming that
they did not know. They were personally and individually
responsible for the integrity of the public organizations reported
financial information.Research Summary for the Selected Policy
Topic
The requirement for US corporations to comply with SOX
requirements is meant to ensure that they achieve accuracy,
integrity and security specifically with respect to financial
information that is in their domain. To achieve this, the
systems espoused and enforced by the Sarbanes-Oxley Act rely
heavily on ‘gate keepers’. This was meant to ensure the people
at the very top of the organisation take personal responsibility
to ensure is truthful and accurate with regards to the
information being relayed.
Compliance with Sarbanes-Oxley act by corporations is
determined by examination of SOX compliance audit reports.
These reports are generated as a result of automation of SOX
302 and 404. With this, the need to ensure compliance of the
system in securing corporate network security, incessant
monitoring of the network with responses and/or alerts with
regards to unauthorized and authorized data access and systems
integrity has become critical. It is a self defeating act to wait
until the end of the financial period to address these reports.
Thus IT allows a daily and timely generation of reports to allow
for a swift and judicious intervention where gaps or loop holes
are identified or found.
To circumvent the monotony that can be synonymous with
managing and analyzing daily log in details in to the system,
one of the possible solutions is to use an automated log
management solution. This enables for rapid and timely
generation of predefined reports which greatly contribute quick
SOX compliance. These reports are meant to enable for almost
on-time monitoring of all actions that might compromise the
integrity of the financial information. It must thus collect,
analyze, correlate and archive all log data from the various
sources across the network. It has emerged that for those with
the responsibility of ensuring stronger governance, the
continuous monitoring of log data will thus empower them to
guarantee security and integrity of confidential data. Instead of
having to react a long time after the infringement was
committed, they can react and undertake remedial measures
within a short time of the infringement being committed. This
reduces the risk and losses to the organizations in addition to
strengthening the public organizations’
management.Identification and Discussion of Policy Issues
It is an SOX requirement under section 302 (A) (4), (C) and (D)
that all users who access the system must be recorded. In
addition to their details being recorded, their activities must be
monitored to ensure there is no abuse of the system. It thus
becomes an organization’s policy to only allow access to
authorized personnel. The reports generated will show all
successful and failed logons and logoffs. It also allows for the
real time flagging on any unauthorized access. This monitoring
should be across the network and must not exclude access and
activities of privileged users.
The next policy concerns object access. Compliance with SOX
demands that the user be identified when a particular specific
object or file or folder is accessed, that the operations that have
been performed on the object, file or folder are captured – it
could be read, write, delete or modify, whether the access was
successful and the individual who performed the action. This
policy is designed and intended to ensure that the integrity of
the system is maintained and protected. It covers even
confidential data.
The next policy is with regard to sessions any terminal is in use.
Adherence with SOX requirements will require connection,
reconnection and disconnection of terminal server sessions be
captured and analyzed. This is meant to assist in the tracking of
the hose session status.
When an audit policy is changed, this is must be captured. This
particular log will allow for rapid determination of which
changes have been effected, when they were recommended and
who affected them. Specifically, they provide insights on the
security level changes to the audit policies.
Finally the user and computer account changes policy guides the
organization in ensuring complete network security. This
policy is critical in monitoring privileged user accounts and
security configuration settings such as adding and removing a
user account to an administrative group. By tracking all users
and their computer account management changes, this policy
allows for real time alerts when critical security configurations
changes are effected.Recommendations for Improving Policy
Implementation
Sarbanes-Oxley Act is critical if public organizations are to
generate information that is useful and makes sense to
investors. When this is achieved, investor confidence is raised
since they are confident that the information generated is both
truthful and factual and can be relied upon to make informed
investment decisions. To improve policy implementations some
factors must be in place. These factors have been identified as
contributing directly and positively to the development and
implementation of those policies that solidify proper
governance. The solidification of proper governance thus
allows the top management to be on top of all aspects of the
public organisation and be able to identify and rectify
deviations from the expected.
First, all system users must be sold to the idea of the policy
being implemented. Secondly, the organisation has to provide
with adequate resources to make the policy implementation
unencumbered. Thirdly, the benefits of the policy have to be
broken down so each individual can relate to them and thus
work towards achieving their part. Fourthly, executives will
use the parameters provided by the policy to constantly monitor
its implementations. Finally, the management will be liable for
the policy implementation and success in the organisation. This
thus makes it critical that executives achieve improved policy
implementation.
References:
SANS Institute (2004) An Overview of Sarbanes-Oxley for the
Information Security Professional, accessed February 6, 2016
from https://www.sans.org/reading-
room/whitepapers/legal/overview-sarbanes-oxley-information-
security-professional-1426
Noblett, T (2008) Business for IT: Understanding Regulatory
Compliance, accessed February 6, 2016 from
https://technet.microsoft.com/en-
us/magazine/2006.09.businessofit.aspx
Thornburgh D and Missal, M. J (2007) Improve Corporate
Governance: Protecting Investors by Strengthening Gatekeepers
Roles, accessed February 6, 2016 from
http://www.brookings.edu/research/papers/2007/02/28corporate
governance-opp08
Davis, J (2015) Capital Markets and Jo creation in the 21st
Century, accessed February 6, 2016 from
http://www.brookings.edu/~/media/research/files/papers/2015/1
2/30-21st-century-job-creation-davis/capital_markets.pdf
Jonathan V. Hall and Alan B. Krueger (2015), “An Analysis of
the Labor Market for Uber’s Driver-Partners in the United
States,” January 22, 2015,
http://dataspace.princeton.edu/jspui/bitstream/88435/dsp010z70
8z67d/5/587.pdf
Michael Dambra, Laura Casares Field, and Matthew T.
Gustafson (2015), “The JOBS Act and IPO volume: Evidence
that disclosure costs affect the IPO decision.” Journal of
Financial Economics 116: 121-143.
Antonio Davila, George Foster, Xiaobin He, and Carlos Shimizu
(2015), “The rise and fall of startups: Creation and destruction
of revenue and jobs by young companies.” Australian Journal of
Management 40: 6-35
Gerald F. Davis (2009), Managed by the Markets: How Finance
Re-shaped America. Oxford
Policy Research Paper: Mobile Application Security
Research and write a 5-pageacademic research paper on one of
the following policyrelated topics. Your research paper should
fully address your chosen topic and be suitable for use as a
policy brief distributed to an executive audience whose
members are meeting to discuss IT Governance issues and
policy needs within their respective organizations.
Your paper must present a summary of your research, discuss
the applicability to IT governance, present a discussion of five
or more policy issues related to the topic, and provide
compelling reasons as to why busy executives should become
more informed about these issues.
Your summary for the paper must address the question: How
can this information be used to improve policy implementation?
The summary should include five or more recommendations,
which you developed from your research.Preapproved Topics
· Assessment and Authorization Requirements for IT Systems
· Audit Requirements for Finance Systems (Sarbanes-Oxley,
GLBA Compliance)
· Change Management (Configuration Control) for information
systems and infrastructures.
· Implementing the NIST Risk Management Framework
· Information Security Metrics and Measurements (Audits
and/or Governance)
· Information Sharing for Threats, Warnings, and Indicators
(legal ramifications)
· Mobile Application Security
· Product Liability for Cybersecurity Products and Services
If you wish to research a policy topic not on this list, you must
ASK FIRST (email your instructor or use the specified LEO
discussion forum).
Requirements:
1. Your paper must be based upon 5 or more authoritative
sources obtained from peer reviewed journals, published
dissertations and theses, reports from public policy research
organizations (e.g. Brookings, CSIS, PEW, etc.) or published
government documents (not including Web pages). These
authoritative sources must have been published within the last
ten years.
2. Use the UMUC library databases and the Cybersecurity
research guide http://libguides.umuc.edu/cybersecurity (in the
OneSearch box, type “policy” and then check the boxes for
“Full-text Only” and Scholarly journals only”)
3. You must submit your paper to Turn It In for originality
checking. You must ensure that you have properly paraphrased
and cited information obtained from your authoritative sources.
Do not construct your paper by gluing together quotations.
4. Your paper must meet the APA formatting requirements as
shown in the sample papers provided in the LEO classroom. See
Course Resources > APA Resources and Course Resources >
Writing Resources for more information.
Criteria, Steps and Rubric to follow (Below in bold are
subheadings)
***Please make sure three reference sites per
subheading.***Introduction
Provided an excellent introduction section, which clearly and
concisely identified the selected cybersecurity policy topic and
included a brief overview of three or more major policy issues
related to this topic. Appropriately used information from 3 or
more authoritative sources.Research Summary for the Selected
Policy Topic
Provided an excellent discussion, which clearly, concisely, and
accurately summarized the student's research for the topic.
Appropriately used 5 or more authoritative sources obtained
from peer-reviewed journals, published dissertations and theses,
reports from public policy research organizations (e.g.
Brookings, CSIS, PEW, etc.) or published government
documents (not including Web pages). These authoritative
sources were published within the last ten years.Identification
and Discussion of Policy Issues
Provided an excellent discussion, which clearly, concisely, and
accurately discussed five or more policy issues related to the
selected cyber security topic. Explained why these issues are
important in the context of IT Governance and provided a
compelling case as to why executives should become informed
about these issues (at least five specific and compelling
reasons). Appropriately used 5 or more authoritative sources
obtained from peer-reviewed journals, published dissertations
and theses, reports from public policy research organizations
(e.g. Brookings, CSIS, PEW, etc.) or published government
documents (not including Web pages). These authoritative
sources were published within the last ten
years.Recommendations for Improving Policy Implementation
Presented an excellent summary of the research, which clearly
and concisely explained how executives can use this
information to improve policy implementation. Provided 5 or
more specific and relevant recommendations for improving
policy implementation.Appropriately used information from 3
or more authoritative sources.Quality of Research
Used 10 or more authoritative sources to support the paper. At
least five of these sources were obtained from peer-reviewed
journals, published dissertations and theses, reports from public
policy research organizations (e.g. Brookings, CSIS, PEW, etc.)
or published government documents (not including Web pages).
At least 10 authoritative sources were published within the last
ten years.Work contains a reference list containing entries for
all cited resources. Reference list entries and in-text citations
are correctly formatted using the appropriate APA style for each
type of resource.No formatting, grammar, spelling, or
punctuation errors.

More Related Content

Similar to Running head MOBILE APPLICATION SECURITY .docx

Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
IOSR Journals
 
Case study Allianz RAS
Case study Allianz RASCase study Allianz RAS
Case study Allianz RAS
it Consult
 
Auditing Organizational Information Assurance (IA) Governance Practices
Auditing Organizational Information Assurance (IA) Governance PracticesAuditing Organizational Information Assurance (IA) Governance Practices
Auditing Organizational Information Assurance (IA) Governance Practices
Mansoor Faridi, CISA
 
4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester
GIEDEEAM SOLAR and Gajanana Publications, LIC
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007
Slava Gorbunov
 
G1803044045
G1803044045G1803044045
G1803044045
IOSR Journals
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
Muhammad Azmy
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Habib Ullah Qamar
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
Rabia Jabeen
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
Rick Lemieux
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
Ebere Ikerionwu
 
Sox regulation and Analytics
Sox regulation and AnalyticsSox regulation and Analytics
Sox regulation and Analytics
brunomase
 
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
JAMES OKARIMIA
 
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
JAMES OKARIMIA
 
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
JAMES OKARIMIA
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
Protected Harbor
 
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
JAMES OKARIMIA
 
SOX compliance - Understanding Sarbanes-Oxley
SOX compliance - Understanding Sarbanes-OxleySOX compliance - Understanding Sarbanes-Oxley
SOX compliance - Understanding Sarbanes-Oxley
Amarnath Gupta
 
Data as a Hidden Gem in Compliance Programs
Data as a Hidden Gem in Compliance ProgramsData as a Hidden Gem in Compliance Programs
Data as a Hidden Gem in Compliance Programs
Jamal Ahmad, Esq., CPA, CFF, CFE
 
Aligning finance , risk and compliance
Aligning finance , risk and complianceAligning finance , risk and compliance
Aligning finance , risk and compliance
JAMES OKARIMIA
 

Similar to Running head MOBILE APPLICATION SECURITY .docx (20)

Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
Case study Allianz RAS
Case study Allianz RASCase study Allianz RAS
Case study Allianz RAS
 
Auditing Organizational Information Assurance (IA) Governance Practices
Auditing Organizational Information Assurance (IA) Governance PracticesAuditing Organizational Information Assurance (IA) Governance Practices
Auditing Organizational Information Assurance (IA) Governance Practices
 
4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007
 
G1803044045
G1803044045G1803044045
G1803044045
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Sox regulation and Analytics
Sox regulation and AnalyticsSox regulation and Analytics
Sox regulation and Analytics
 
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
James Okarimia - Aligning Finance, Risk and Data Analytics in Meeting the Req...
 
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
 
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
 
SOX compliance - Understanding Sarbanes-Oxley
SOX compliance - Understanding Sarbanes-OxleySOX compliance - Understanding Sarbanes-Oxley
SOX compliance - Understanding Sarbanes-Oxley
 
Data as a Hidden Gem in Compliance Programs
Data as a Hidden Gem in Compliance ProgramsData as a Hidden Gem in Compliance Programs
Data as a Hidden Gem in Compliance Programs
 
Aligning finance , risk and compliance
Aligning finance , risk and complianceAligning finance , risk and compliance
Aligning finance , risk and compliance
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
charisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
charisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
charisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
charisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
charisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
charisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
charisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
charisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
charisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
charisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
charisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
charisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
charisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
charisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
charisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
charisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
charisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
charisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
charisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
charisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 

Running head MOBILE APPLICATION SECURITY .docx

  • 1. Running head: MOBILE APPLICATION SECURITY 1 MOBILE APPLICATION SECURITY 2 Mobile Application Security Student’s Name Institutional Affiliation Audit Requirements for Finance Systems (Sarbanes-Oxley, GLBA Compliance) Introduction When considering audit requirements for finance system, the right place to start to make this examination will be to consider the Sarbanes-Oxley (SOX) Act. This act was developed and enacted as a result of turmoil in the US corporate world. At this time Enron and WorldCom experienced a very public collapse causing investors to loose billions of dollars not to mention them loosing fundamental trust in US corporations. With the downfall of Arthur Anderson – one of the largest public accounting firms in the US, it was clear that the need address the emerging challenges in corporate governance. . The Sarbanes-Oxley Act was thus a response aimed at restoring and renewing investor trust in addition to them understanding public corporation financial reporting in order to achieve reports that were reliable and useful. This is indeed capture in section 302 – Corporate responsibility for financial reports, and section 404 – management assessment of internal controls. These sections empowered and make gate keepers central to the generation of truthful and factual reports by public organisation. The top leadership could no longer get away with claiming that
  • 2. they did not know. They were personally and individually responsible for the integrity of the public organizations reported financial information.Research Summary for the Selected Policy Topic The requirement for US corporations to comply with SOX requirements is meant to ensure that they achieve accuracy, integrity and security specifically with respect to financial information that is in their domain. To achieve this, the systems espoused and enforced by the Sarbanes-Oxley Act rely heavily on ‘gate keepers’. This was meant to ensure the people at the very top of the organisation take personal responsibility to ensure is truthful and accurate with regards to the information being relayed. Compliance with Sarbanes-Oxley act by corporations is determined by examination of SOX compliance audit reports. These reports are generated as a result of automation of SOX 302 and 404. With this, the need to ensure compliance of the system in securing corporate network security, incessant monitoring of the network with responses and/or alerts with regards to unauthorized and authorized data access and systems integrity has become critical. It is a self defeating act to wait until the end of the financial period to address these reports. Thus IT allows a daily and timely generation of reports to allow for a swift and judicious intervention where gaps or loop holes are identified or found. To circumvent the monotony that can be synonymous with managing and analyzing daily log in details in to the system, one of the possible solutions is to use an automated log management solution. This enables for rapid and timely generation of predefined reports which greatly contribute quick SOX compliance. These reports are meant to enable for almost on-time monitoring of all actions that might compromise the integrity of the financial information. It must thus collect,
  • 3. analyze, correlate and archive all log data from the various sources across the network. It has emerged that for those with the responsibility of ensuring stronger governance, the continuous monitoring of log data will thus empower them to guarantee security and integrity of confidential data. Instead of having to react a long time after the infringement was committed, they can react and undertake remedial measures within a short time of the infringement being committed. This reduces the risk and losses to the organizations in addition to strengthening the public organizations’ management.Identification and Discussion of Policy Issues It is an SOX requirement under section 302 (A) (4), (C) and (D) that all users who access the system must be recorded. In addition to their details being recorded, their activities must be monitored to ensure there is no abuse of the system. It thus becomes an organization’s policy to only allow access to authorized personnel. The reports generated will show all successful and failed logons and logoffs. It also allows for the real time flagging on any unauthorized access. This monitoring should be across the network and must not exclude access and activities of privileged users. The next policy concerns object access. Compliance with SOX demands that the user be identified when a particular specific object or file or folder is accessed, that the operations that have been performed on the object, file or folder are captured – it could be read, write, delete or modify, whether the access was successful and the individual who performed the action. This policy is designed and intended to ensure that the integrity of the system is maintained and protected. It covers even confidential data. The next policy is with regard to sessions any terminal is in use. Adherence with SOX requirements will require connection, reconnection and disconnection of terminal server sessions be captured and analyzed. This is meant to assist in the tracking of
  • 4. the hose session status. When an audit policy is changed, this is must be captured. This particular log will allow for rapid determination of which changes have been effected, when they were recommended and who affected them. Specifically, they provide insights on the security level changes to the audit policies. Finally the user and computer account changes policy guides the organization in ensuring complete network security. This policy is critical in monitoring privileged user accounts and security configuration settings such as adding and removing a user account to an administrative group. By tracking all users and their computer account management changes, this policy allows for real time alerts when critical security configurations changes are effected.Recommendations for Improving Policy Implementation Sarbanes-Oxley Act is critical if public organizations are to generate information that is useful and makes sense to investors. When this is achieved, investor confidence is raised since they are confident that the information generated is both truthful and factual and can be relied upon to make informed investment decisions. To improve policy implementations some factors must be in place. These factors have been identified as contributing directly and positively to the development and implementation of those policies that solidify proper governance. The solidification of proper governance thus allows the top management to be on top of all aspects of the public organisation and be able to identify and rectify deviations from the expected. First, all system users must be sold to the idea of the policy
  • 5. being implemented. Secondly, the organisation has to provide with adequate resources to make the policy implementation unencumbered. Thirdly, the benefits of the policy have to be broken down so each individual can relate to them and thus work towards achieving their part. Fourthly, executives will use the parameters provided by the policy to constantly monitor its implementations. Finally, the management will be liable for the policy implementation and success in the organisation. This thus makes it critical that executives achieve improved policy implementation. References: SANS Institute (2004) An Overview of Sarbanes-Oxley for the Information Security Professional, accessed February 6, 2016 from https://www.sans.org/reading- room/whitepapers/legal/overview-sarbanes-oxley-information- security-professional-1426 Noblett, T (2008) Business for IT: Understanding Regulatory Compliance, accessed February 6, 2016 from https://technet.microsoft.com/en- us/magazine/2006.09.businessofit.aspx Thornburgh D and Missal, M. J (2007) Improve Corporate Governance: Protecting Investors by Strengthening Gatekeepers Roles, accessed February 6, 2016 from http://www.brookings.edu/research/papers/2007/02/28corporate governance-opp08 Davis, J (2015) Capital Markets and Jo creation in the 21st Century, accessed February 6, 2016 from http://www.brookings.edu/~/media/research/files/papers/2015/1 2/30-21st-century-job-creation-davis/capital_markets.pdf Jonathan V. Hall and Alan B. Krueger (2015), “An Analysis of the Labor Market for Uber’s Driver-Partners in the United States,” January 22, 2015, http://dataspace.princeton.edu/jspui/bitstream/88435/dsp010z70 8z67d/5/587.pdf
  • 6. Michael Dambra, Laura Casares Field, and Matthew T. Gustafson (2015), “The JOBS Act and IPO volume: Evidence that disclosure costs affect the IPO decision.” Journal of Financial Economics 116: 121-143. Antonio Davila, George Foster, Xiaobin He, and Carlos Shimizu (2015), “The rise and fall of startups: Creation and destruction of revenue and jobs by young companies.” Australian Journal of Management 40: 6-35 Gerald F. Davis (2009), Managed by the Markets: How Finance Re-shaped America. Oxford Policy Research Paper: Mobile Application Security Research and write a 5-pageacademic research paper on one of the following policyrelated topics. Your research paper should fully address your chosen topic and be suitable for use as a policy brief distributed to an executive audience whose members are meeting to discuss IT Governance issues and policy needs within their respective organizations. Your paper must present a summary of your research, discuss the applicability to IT governance, present a discussion of five or more policy issues related to the topic, and provide compelling reasons as to why busy executives should become more informed about these issues. Your summary for the paper must address the question: How can this information be used to improve policy implementation? The summary should include five or more recommendations, which you developed from your research.Preapproved Topics · Assessment and Authorization Requirements for IT Systems · Audit Requirements for Finance Systems (Sarbanes-Oxley,
  • 7. GLBA Compliance) · Change Management (Configuration Control) for information systems and infrastructures. · Implementing the NIST Risk Management Framework · Information Security Metrics and Measurements (Audits and/or Governance) · Information Sharing for Threats, Warnings, and Indicators (legal ramifications) · Mobile Application Security · Product Liability for Cybersecurity Products and Services If you wish to research a policy topic not on this list, you must ASK FIRST (email your instructor or use the specified LEO discussion forum). Requirements: 1. Your paper must be based upon 5 or more authoritative sources obtained from peer reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources must have been published within the last ten years. 2. Use the UMUC library databases and the Cybersecurity research guide http://libguides.umuc.edu/cybersecurity (in the OneSearch box, type “policy” and then check the boxes for “Full-text Only” and Scholarly journals only”) 3. You must submit your paper to Turn It In for originality checking. You must ensure that you have properly paraphrased and cited information obtained from your authoritative sources. Do not construct your paper by gluing together quotations. 4. Your paper must meet the APA formatting requirements as shown in the sample papers provided in the LEO classroom. See Course Resources > APA Resources and Course Resources > Writing Resources for more information. Criteria, Steps and Rubric to follow (Below in bold are subheadings)
  • 8. ***Please make sure three reference sites per subheading.***Introduction Provided an excellent introduction section, which clearly and concisely identified the selected cybersecurity policy topic and included a brief overview of three or more major policy issues related to this topic. Appropriately used information from 3 or more authoritative sources.Research Summary for the Selected Policy Topic Provided an excellent discussion, which clearly, concisely, and accurately summarized the student's research for the topic. Appropriately used 5 or more authoritative sources obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources were published within the last ten years.Identification and Discussion of Policy Issues Provided an excellent discussion, which clearly, concisely, and accurately discussed five or more policy issues related to the selected cyber security topic. Explained why these issues are important in the context of IT Governance and provided a compelling case as to why executives should become informed about these issues (at least five specific and compelling reasons). Appropriately used 5 or more authoritative sources obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources were published within the last ten years.Recommendations for Improving Policy Implementation Presented an excellent summary of the research, which clearly and concisely explained how executives can use this information to improve policy implementation. Provided 5 or more specific and relevant recommendations for improving policy implementation.Appropriately used information from 3
  • 9. or more authoritative sources.Quality of Research Used 10 or more authoritative sources to support the paper. At least five of these sources were obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). At least 10 authoritative sources were published within the last ten years.Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.No formatting, grammar, spelling, or punctuation errors.