Information Governance Week -3 Discussion

 

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.  Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective. 

For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.

500 words and Research Paper (Check attachment)

Bank Enterprise Information Security Policy

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel
· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers
· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer
o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel
· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking
Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures
Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]
RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.  

Assessment 3: Digital Forensic Report This document supplies detailed information on assessment tasks for this unit.

Students should demonstrate their ability to review and critique the digital forensic hackathons hosted in recent

years and their write-ups. Understanding these digital forensic tasks and their technical solutions will significantly

help students deepen the understanding of the industry’s standard practice and general expectations of forensic

abilities in the job market. Hackathon experiences and achievements have been valuable in the cybersecurity

industry. Students will identify, investigate, and evaluate six forensic hackathon tasks and the associated write-ups.

Students will be assessed on their ability to identify the appropriate tasks and write-ups, reproduce the technical

solutions, justify the technical findings, reflect on the learning experiences, and present a professionally written

essay.

Instructions

Students are required to independently write an essay of approximately 4,000 words and exhibits to support the

findings and a bibliography. This essay should consist of the following parts:

• a professionally made title page with student name and student ID

• an abstract of 200 words capturing the highlights of the findings

• a non-technical section summarizing the six identified hackathon tasks and brief descriptions of their

write-ups along with justifications of their digital forensic relevance

• a non-technical section critiquing the issues of the existing write-ups of each hackathon task in multiple

perspectives

• a technical section reproducing the solutions of the six hackathon tasks by using proper digital forensic

tools with supporting evidence (screenshots)

• a non-technical section reflecting personal learning experiences towards solving these tasks and aligning

these to our curriculum

• conclusion (around 150 words)

• reference (Harvard style)

IA week13 DB

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

What are some of the industry standard certifications that exists.  Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?

Your post should be at least 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Final Paper 12/03

 

Final Paper Assignment: 

Write a 3-4 page APA formatted paper comparing your organization’s disaster recovery and business continuity plans with the best practices outlined in your course text.  Content should include, but not be limited to:  selecting the DR. team, assessing risks and impacts, prioritizing systems and functions for recovery, data storage and recovery sites, developing plans and procedures, procedures for special circumstances, and testing the disaster recovery plan. 

Your paper should include an abstract and a conclusion and a reference page with 3-5 references:

EH week8 DB

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism