Assignment 1: Designing FERPA Technical Safeguards
Due Week 2 and worth 50 points
Imagine you are an Information Security consultant for a small college registrar’s office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar’s office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar’s office.
Write a three to five page paper in which you:
Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar’s office.
Recommend the proper audit controls to be employed in the registrar’s office.
Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
Use technology and information resources to research issues in security strategy and policy formation.
Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
1. Describe the problem at IFG as succinctly as you can. Use this description to identify the main stakeholders.
2. IFG can’t afford the resources to identify, define, cleanse, and validate all of its data. On the other hand, building yet another data mart to address a specific problem worsens the data situation. Propose a solution that will enable IFG to leverage a key business problem/opportunity using their BI tools that does not aggravate their existing data predicament.
Hi I want A research paper on cyber forensics case on wanna cry ransomware in apa format and references of 6 pages with PowerPoint presentation it should include who when where
abdvthe forensic tools used to find the evidence in this case also that is important.
On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words.
Need a research paper(2000 words) and presentation(20 slides)
* why criminal profiling is important
* categorize with examples
* use of criminal profiling to categorize cyber criminals
* research paper with images
refer the links
Need a presentation mostly with images
**** Read the document below …must follow all the instructions
For this assignment, you will be creating a ten-slide PowerPoint presentation on the different types of threats organizations have to manage. Begin by identifying what a threat is and indicate the importance of a quick response when a threat has been identified. Provide a detailed description of each threat and how organizations can combat the threat. A short video that is directly related and/or clip art can be inserted within your presentation. The final slide of your presentation will be a summary of the importance of managing threats.
Note: If more slides are needed for the summary, your presentation can be longer than 10 slides, but the PowerPoint should be no longer than 15 slides.
For this assignment, you will define the term attitude. Within a two-to-three page paper complete the following tasks:
List five qualities of a good attitude and devise a scenario and consequence for each quality listed.
Explain the lasting benefits of having the following attitudes in the workplace and list at least three different outcomes for each:
How would a negative attitude affect how your boss relates to you?
How would a positive attitude affect how your boss relates to you?
How would a negative attitude affect how your fellow employees relate to you?
How would a positive attitude affect how your fellow employees relate to you?
How would a negative attitude affect how the end-user or customer relates to you?
How would a positive attitude affect how the end-user or customer relates to you?
Describe how a positive attitude could enhance your career.
How we can change a bad attitude into a good attitude?
Describe what it means to have a service attitude and give examples.
Explain how taking ownership of a problem or incident can eliminate frustration on the part of the end-user.
In your last paragraph, create a summary of your findings and how they relate to being an effective help desk specialist.
Data Visualization and Geographic Information Systems
As an IT manager, discuss how you would use the materials in Chapter 11 of your textbook communicating IT information to other department. Use APA throughout.
REFERENCES WITH CITATIONS
Strategic Tech and Enterprise Systems
Technology and Enterprise Resource Planning
As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout.
Management hierarchy: strategic, managerial and operational.
There are three levels of management hierarchy: strategic, managerial and operational.
Part 1: Review at least 4 academically reviewed articles on each management hierarchy. Summary the articles in your own words.
Part 2: Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.
Part 3: As an IT professional, how would you use information technology to improve the efficiency the three levels of management hierarchy?
PLEASE READ QUESTION CAREFULLY AND I WANT REFERENCES WITH CITATIONS