Lab 2 Questions IS4680 1. What is the difference between DITSCAP and DIACAP? It would be the way how information assurance can be part of as the most importance, when the security needs to be with the Automated Information Systems (AIS). 2. What is DCID 6/3, and why would you use DCID 6/3...
Compliance Laws Description of Compliance Law Rationale for Using this Law FISMA importance of the sound information security practices Security policies in place SOX it is the result of the public company account reform and investor protection act Is responsable to protect the companies about...
Lab #2 - Assessment Worksheet Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ ...
Original Statement Will the implementation of a government mandated gun buyback program have a significant enough impact on violent crimes to justify the abolishment of 2nd Amendment rights? Assumptions A proposed gun buyback program will be mandatory and cover all firearms rather than applying specific...
Executive Summary of Auditing IT Infrastructure Compliance Align Auditing Frameworks for a Business Unit within the DoD 2-3 Align an IT Security Assessment to Achieve Compliance 3-6 Define a Process for Gathering Information Pertaining to a GLBA Compliance Audit 6-9 Auditing the Workstation...
Question: I am the framework used to stay in compliance with SOX 404. Answer: COBIT Question: The difference between an Assessment and an Audit is that the assessment finds blame where an Audit does not. True or False Answer: False Question: This regulation ensures that organizations have sound...
1. SOX Section 404 mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting and must document test and maintain those controls and procedures to ensure their effectiveness. The purpose of SOX is to reduce the possibilities of corporate fraud...
1. From the results of lab #1 – Business Application impact analysis worksheet, what do you consider to be the greatest type of risk and why? The greatest risk is hackers having access to data because it can lead to identity theft. 2. Why is it critical to perform periodic web application vulnerability...
Maria Cervantes Unit 7 lab 7.1 Distance Considerations Week 7 Labs 7.1-7.4 LAN - Local Area Network WLAN - Wireless Local Area Network WAN - Wide Area Network MAN - Metropolitan Area Network SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes...
Unit 1 Assignment 1: Compliance Laws IS 4680 Anthony Brown Week 1 In order for a large public health care organization to stay operational, the organization must follow many compliance laws. There are many compliance laws set in place for many health care organizations. For a health...