SlideShare a Scribd company logo
Straver CIS 438 Week 6 Case Study 2 Data
Breaches and Regulatory Requirements
NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-438-
strayer/cis-438-week-6-case-studv-2-data-
breaches-and-regulatorv-requirements-new
For more classes visit
www.assignmentcloud.com
www.assignmentcloud.com/
CIS 438 Week 6 Case Study 2 Data
Breaches and Regulatory Requirements
Case Study 2: Data Breaches and
Regulatory Requirements
Due Week 6 and worth 120 points
The National Institute of Standards and
Technology (NIST) provides an extensive
amount of information, resources, and
guidance on IT and information security
topics. The Federal Information Security
Management Act (FISMA) provides
standards and guidelines for establishing
information security within federal
systems. However, there have been, and
WVcontinues to be, numerous security
incidents including data breaches within
federal systems. Review the information
about FISMA at the NIST Website, located
at
http://csrc.nist.gov/groups/SMA/fisma/i
n dex.html. Additionally, review the
information, located at
http://www.govtech.com/blogs/lohrmann
-on-cybersecurity/Dark-Clouds-Over-
Technology-042212.html, about the data
breaches within government systems.
Select one (1) of the data breaches
mentioned to conduct a case analysis, or
select another based on your research,
and research more details about that
incident to complete the following
assignment requirements.
Write a three to five (3-5) page paper on
your selected case in which you:
the primary causes of the data breach.
2.Analyze how the data breach could
have been prevented with better
adherence to and compliance with
regulatory requirements and guidelines,
including management controls; include
an explanation of the regulatory
requirement (such as from FISMA,
HIPAA, or others).
3.Assess if there are deficiencies in the
regulatory requirements and whether
they need to be changed, and how they
need to be changed, to mitigate further
data breach incidents.
4.Use at least three (3) quality
resources in this assignment. Note:
Wikipedia and similar Websites do not
qualify as quality
resources.
Your assignment must fo
WWW*
•Be typed, double spaced, using Times
New Roman font (size 12), with one-inch
margins on all sides; references must
follow APA or school-specific format.
Check with your professor for any
additional instructions.
•Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required page
length.
The specific course learning outcomes
associated with this assignment are:
•Describe legal compliance laws
addressing public and private institutions.
•Examine the principles requiring
governance of information within
www.assorganizations
-
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.
date. The cover page and the reference
page are not included in the required page
length.
The specific course learning outcomes
associated with this assignment are:
•Describe legal compliance laws
addressing public and private institutions.
•Examine the principles requiring
governance of information within
www.assorganizations
-
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.

More Related Content

What's hot

Academic Discourse 2020
Academic Discourse 2020Academic Discourse 2020
Academic Discourse 2020
pvhead123
 
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web SearchII-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
Dr. Haxel Consult
 
Open science as roadmap to better data science research
Open science as roadmap to better data science researchOpen science as roadmap to better data science research
Open science as roadmap to better data science research
Beth Plale
 
Alain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersAlain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersIncisive_Events
 
RDA-NISO data and privacy implications of data sets Plenary 11
RDA-NISO data  and privacy implications of data sets Plenary 11 RDA-NISO data  and privacy implications of data sets Plenary 11
RDA-NISO data and privacy implications of data sets Plenary 11
National Information Standards Organization (NISO)
 
Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...
Richard Huffine
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
EDINA, University of Edinburgh
 
II-SDV 2016 Minesoft
II-SDV 2016 MinesoftII-SDV 2016 Minesoft
II-SDV 2016 Minesoft
Dr. Haxel Consult
 
dkNET ESP Meeting - February 2016
dkNET ESP Meeting - February 2016dkNET ESP Meeting - February 2016
dkNET ESP Meeting - February 2016
dkNET
 
FundRef, or Name That Funder!
FundRef, or Name That Funder!FundRef, or Name That Funder!
FundRef, or Name That Funder!Crossref
 

What's hot (10)

Academic Discourse 2020
Academic Discourse 2020Academic Discourse 2020
Academic Discourse 2020
 
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web SearchII-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
II-SDV 2016 Aleksandar Kapisoda, Klaus Kater - Deep Web Search
 
Open science as roadmap to better data science research
Open science as roadmap to better data science researchOpen science as roadmap to better data science research
Open science as roadmap to better data science research
 
Alain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersAlain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producers
 
RDA-NISO data and privacy implications of data sets Plenary 11
RDA-NISO data  and privacy implications of data sets Plenary 11 RDA-NISO data  and privacy implications of data sets Plenary 11
RDA-NISO data and privacy implications of data sets Plenary 11
 
Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...Overview of Emerging Requirements for Data Management of Federally Funded Res...
Overview of Emerging Requirements for Data Management of Federally Funded Res...
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
 
II-SDV 2016 Minesoft
II-SDV 2016 MinesoftII-SDV 2016 Minesoft
II-SDV 2016 Minesoft
 
dkNET ESP Meeting - February 2016
dkNET ESP Meeting - February 2016dkNET ESP Meeting - February 2016
dkNET ESP Meeting - February 2016
 
FundRef, or Name That Funder!
FundRef, or Name That Funder!FundRef, or Name That Funder!
FundRef, or Name That Funder!
 

Similar to Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements-new

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4
infinityend3
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh61
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
Stephenson03
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Robinson068
 
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2
infinityend3
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
infinityend3
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
shyaminfo18
 
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyStrayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacy
infinityend3
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
infinityend3
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
LindaAdams2017
 
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newStrayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
infinityend3
 
CIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.comCIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.com
McdonaldRyan39
 
CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
Robinson075
 
Cis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.comCis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.com
Stephenson06
 
Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1
infinityend3
 
Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1
shyaminfo105
 
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceStrayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-compliance
infinityend3
 
CIS 513 Entire Course NEW
CIS 513 Entire Course NEWCIS 513 Entire Course NEW
CIS 513 Entire Course NEW
shyamuopfive
 
CIS 560 Success Begins / snaptutorial.com
CIS 560 Success Begins / snaptutorial.comCIS 560 Success Begins / snaptutorial.com
CIS 560 Success Begins / snaptutorial.com
Robinson075
 
CIS 560 Massive Success--snaptutorial.com
CIS 560 Massive Success--snaptutorial.comCIS 560 Massive Success--snaptutorial.com
CIS 560 Massive Success--snaptutorial.com
santricksapiens62
 

Similar to Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements-new (20)

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
 
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyStrayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacy
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
 
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newStrayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
 
CIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.comCIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.com
 
CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
 
Cis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.comCis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.com
 
Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1
 
Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1
 
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceStrayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-compliance
 
CIS 513 Entire Course NEW
CIS 513 Entire Course NEWCIS 513 Entire Course NEW
CIS 513 Entire Course NEW
 
CIS 560 Success Begins / snaptutorial.com
CIS 560 Success Begins / snaptutorial.comCIS 560 Success Begins / snaptutorial.com
CIS 560 Success Begins / snaptutorial.com
 
CIS 560 Massive Success--snaptutorial.com
CIS 560 Massive Success--snaptutorial.comCIS 560 Massive Success--snaptutorial.com
CIS 560 Massive Success--snaptutorial.com
 

More from infinityend3

Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
infinityend3
 
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchStrayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-research
infinityend3
 
Strayer cis-505-all-assignments
Strayer cis-505-all-assignmentsStrayer cis-505-all-assignments
Strayer cis-505-all-assignments
infinityend3
 
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
infinityend3
 
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1
infinityend3
 
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newStrayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
infinityend3
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theft
infinityend3
 
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3
infinityend3
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
infinityend3
 
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newStrayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-new
infinityend3
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
infinityend3
 
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperStayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paper
infinityend3
 
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2
infinityend3
 
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4
infinityend3
 
Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3
infinityend3
 
Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2
infinityend3
 
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
infinityend3
 
Cis 421-week-10-term-paper
Cis 421-week-10-term-paperCis 421-week-10-term-paper
Cis 421-week-10-term-paper
infinityend3
 
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
infinityend3
 
Cis 421-week-4-case-study-1-software-requirement-specification-new
Cis 421-week-4-case-study-1-software-requirement-specification-newCis 421-week-4-case-study-1-software-requirement-specification-new
Cis 421-week-4-case-study-1-software-requirement-specification-new
infinityend3
 

More from infinityend3 (20)

Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
 
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchStrayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-research
 
Strayer cis-505-all-assignments
Strayer cis-505-all-assignmentsStrayer cis-505-all-assignments
Strayer cis-505-all-assignments
 
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
 
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1
 
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newStrayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theft
 
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
 
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newStrayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-new
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperStayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paper
 
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2
 
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4
 
Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3
 
Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2
 
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
 
Cis 421-week-10-term-paper
Cis 421-week-10-term-paperCis 421-week-10-term-paper
Cis 421-week-10-term-paper
 
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
 
Cis 421-week-4-case-study-1-software-requirement-specification-new
Cis 421-week-4-case-study-1-software-requirement-specification-newCis 421-week-4-case-study-1-software-requirement-specification-new
Cis 421-week-4-case-study-1-software-requirement-specification-new
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements-new

  • 1. Straver CIS 438 Week 6 Case Study 2 Data Breaches and Regulatory Requirements NEW To purchase this material click below link http://www.assignmentcloud.com/cis-438- strayer/cis-438-week-6-case-studv-2-data- breaches-and-regulatorv-requirements-new For more classes visit www.assignmentcloud.com www.assignmentcloud.com/ CIS 438 Week 6 Case Study 2 Data Breaches and Regulatory Requirements Case Study 2: Data Breaches and Regulatory Requirements Due Week 6 and worth 120 points
  • 2. The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and WVcontinues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located at http://csrc.nist.gov/groups/SMA/fisma/i n dex.html. Additionally, review the information, located at http://www.govtech.com/blogs/lohrmann -on-cybersecurity/Dark-Clouds-Over-
  • 3. Technology-042212.html, about the data breaches within government systems. Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements. Write a three to five (3-5) page paper on your selected case in which you: the primary causes of the data breach. 2.Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).
  • 4. 3.Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents. 4.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must fo WWW* •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the
  • 5. date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are: •Describe legal compliance laws addressing public and private institutions. •Examine the principles requiring governance of information within www.assorganizations - •Use technology and information resources to research legal issues in information security. •Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.
  • 6. date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are: •Describe legal compliance laws addressing public and private institutions. •Examine the principles requiring governance of information within www.assorganizations - •Use technology and information resources to research legal issues in information security. •Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.