Premium Essay

Unit 10 Assignment 1: Examine Real-World Implementations of Security Standards and Compliance Laws

In:

Submitted By daboyd01
Words 502
Pages 3
UNIT 10 ASSIGNMENT 1: EXAMINE REAL-WORLD IMPLEMENATATIONS OF SECURITY STANDARDS AND COMPLIANCE LAWS

CIPA stands for The Children's Internet Protection Act. It is a bill that was signed into law in December 2000, and was to be constitutional by the United States Supreme Court in June 2003. It requires schools K-12 and libraries to have internet filters to protect children from harmful online content that blocks access to “visual depictions” on the Internet that are obscene, child pornography or harmful to minors. Meaning any picture, image, graphic image file, or other visual depiction that has been taken as a whole and with respect to minors, appeals to an excessive interest in nudity, sex, or excretion; depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. The law also states that a school or library may disable the technology protection measures concerned, during use by an adult, to enable access for bona fide research or other lawful purpose. Public Schools and Public Libraries must comply with CIPA to be able to take advantage of E-rating discounts for telecommunication resources and LSTA grants for various programs.

The act has several requirements for institutions to meet before they can receive government funds. Libraries and schools must provide reasonable public notice and hold at least one public hearing or meeting to address the proposed Internet safety policy. The meeting must address the purpose for this policy such as, actions to restrict a minor’s access to inappropriate or harmful materials on the Internet. Make sure security and

Similar Documents

Premium Essay

It255

...Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies...

Words: 4296 - Pages: 18

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Premium Essay

Global Business Strategies

...MGT/448 Global Business Strategies LSB04BSM09  REQUIRED TEXT/MATERIAL: Books 1. The World Is Flat A Brief History of the Twenty-first Century (Friedman) 2. International Business: Competing in the Global Marketplace, 5/e (Hill) 3. The Lexus and the Olive Tree: Understanding Globalization (Friedman) 4. Managing Cultural Differences (Harris, Moran) 5. Global E-Commerce Strategies for Small Business, (Da Costa, Laffont, Tirole) Scholarly Articles 1. International Business: Environments and Operations, (Daniels, Radebaugh, Sullivan) Journal of Political Economy 2. International Real Business Cycles, (Backus, Kehoe and Kyland) Journal of Political Economy 3. Going global: Using information technology to advance the competitiveness of the virtual, (Boudreau, Loch, Robey, Straub) Academy of Management Executive 4. Working with Americans, (Thompson) The FLAME of Claremont Graduate University Websites: 1. Economist.com (The Economist Magazine) 2. FT.com (Financial Times Newspaper) 3. cia.gov/cia/publications/factbook (CIA world Fact Book) 4. loc.gov/rr/international/portals.html (Library of Congress Country Info) 5. windowontheworldinc.com/countryprofile/index.html (Tips for Global Business Etiquette 6. transparency.org (Transparency International) 7. scholar.google.com (Google for academic search) INSTRUCTOR: Taj Ahmad Eldridge, MBA, Ph.D Int’l Political Economics & World Politics candidate WELCOME: Buenas noches, Banji mashite, Boa noite, Masaa...

Words: 3977 - Pages: 16

Free Essay

Bb Guideline

...Financial Intelligence Unit BANGLADESH BANK FOCUS GROUP Coordinator Mr. Md. Eskander Miah Deputy General Manager Bangladesh Financial Intelligence Unit Bangladesh Bank Member Mr. Rafiqul Islam Joint Director Bangladesh Financial Intelligence Unit Bangladesh Bank Mr. Kamal Hossain Deputy Director Bangladesh Financial Intelligence Unit Bangladesh Bank Mr. Md. Iqbal Hossain Deputy Director Department of Financial Institutions and Markets Bangladesh Bank Mr. Md. Ferdous Zaman Sardar Assistant Director Bangladesh Financial Intelligence Unit Bangladesh Bank Preface In response to the growing concern about money laundering and terrorist activities, the international community has acted on many fronts. The United Nations (UN) was the first international organization to undertake significant actions to fight against money laundering through adopting several conventions and resolutions. Following UN action, the Financial Action Task Force on Money Laundering (FATF) was formed by G-7 countries in 1989 as the first intergovernmental body which has recommended forty recommendations to combat money laundering in 1990. In October 2001, the FATF expanded its mandate to deal with the funding of terrorist acts and terrorist organization, and it took the important step of creating the Eight (later expanded to Nine) Special Recommendations on Terrorist Financing. These 40+9 Recommendations have been endorsed by over 180 countries and are universally recognized as international standard for AML/CFT program...

Words: 25043 - Pages: 101

Premium Essay

Mba Syllabus

...SRM UNIVERSITY (Under section 3 of UGC Act, 1956) FACULTY OF MANAGEMENT SCHOOL OF MANAGEMENT MBA FULL TIME CURRICULUM AND SYLLABUS - 2013-14 1 Code MB 13101 MB 13102 MB 13103 MB 13104 MB 13105 MB 13106 SRM University MBA - Revised Curriculum - 2013-14 Semester –I Thinking and Communication Skills (Practical) Accounting for Decision Making Philosophy for Management Economics for Managers Managerial Statistics Managerial Skills (Practical) Semester-II Financial Management Management Information System Marketing Human Resource Management Production And Operation Management Legal Aspects of Business Semester- III Summer Internship (8 weeks)(Practical) Entrepreneurship Strategic Management Business Analytics (Practical) Elective-1 Elective-2 Elective-3 Elective-4 Semester- IV Elective-5 Elective-6 Industrial Elective (Practical) Total Credit L 0 2 3 2 2 0 T 0 4 0 2 4 0 P 4 0 0 0 0 6 C 2 4 3 3 4 3 19 4 3 4 2 4 3 20 2 3 3 2 3 3 3 3 22 3 3 5 11 72 MB 13207 MB 13208 MB 13209 MB 13210 MB 13211 MB 13212 MB 13313 MB 13314 MB 13315 MB 13316 2 2 3 2 3 2 0 2 2 0 2 2 2 2 2 2 0 4 2 2 0 2 2 0 2 2 0 2 2 2 2 2 2 0 0 0 0 0 0 0 4 0 0 4 0 0 0 0 0 0 10 MB 13417 Functional Electives Marketing Finance Systems Human Resource Operations Vertical Electives Pharma Hospitality Enterprise Resource Planning Agriculture Hospital and Health Care Retailing Auto Industry Project Management Media and Communication Banking Financial Service Insurance   2 MB...

Words: 53231 - Pages: 213

Premium Essay

Administrative Code

...effectiveness of the Government will be enhanced by a new Administrative Code which incorporates in a unified document the major structural, functional and procedural principles and rules of governance; and WHEREAS, a new Administrative Code will be of optimum benefit to the people and Government officers and employees as it embodies changes in administrative structures and procedures designed to serve the people; NOW, THEREFORE, I, CORAZON C. AQUINO, President of the Philippines, by the powers vested in me by the Constitution, do hereby promulgate the Administrative Code of 1987, as follows: INTRODUCTORY PROVISIONS SECTION 1. Title. — This “Administrative Code of 1987.” Act shall be known as the SECTION 2. General Terms Defined. — Unless the specific words of the text, or the context as a whole, or a particular statute, shall require a different meaning: (1) Government of the Republic of the Philippines refers to the corporate governmental entity through which the functions of government are exercised throughout the Philippines, including, save as the contrary appears from the context, the various arms through which political authority is made effective in the Philippines, whether pertaining to the autonomous regions, the provincial, city, municipal or barangay subdivisions or other forms of local government. (2) National Government refers to the entire machinery of...

Words: 111254 - Pages: 446

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

Cams

...Study Guide for the Certification Examination Fifth Edition ACAMS.org ACAMS.org/español ACAMSToday.org MoneyLaundering.com Study Guide for the Certification Examination Fifth Edition a publication of the association of certified anti-money laundering specialists Study Guide for the Certification Examination Fifth Edition Executive Vice President John J. Byrne, CAMS Editor Robert S. Pasley, CAMS Co-Editor Kevin M. Anderson, CAMS Contributors Joyce Broome, CAMS Heather Brown, CAMS Aub Chapman, CAMS Vasilios Chrisos, CAMS David Clark, CAMS Jurgen Egberink, CAMS Michael D. Kelsey, CAMS Saskia Rietbroek, CAMS Nancy J. Saur, CAMS Mansoor Siddiqi, CAMS Daniel Soto, CAMS Timothy White CAMS Production Assistant Catalina Martinez We would like acknowledge the following individuals for their contributions to the CAMS Exam, and the Online and Live Preparation Seminars: Kevin M. Anderson, CAMS Joyce Broome, CAMS Aub Chapman, CAMS David Clark, CAMS Josue Garcia, CAMS Hoi Luk, CAMS Ira Morales Mickunas, CAMS Robert S. Pasley, CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights...

Words: 105184 - Pages: 421

Premium Essay

Business Case Studies

...VOLUME 2 Manual of Procedures for the Procurement of Goods and Services Page i MANUAL OF PROCEDURES FOR THE PROCUREMENT OF GOODS AND SERVICES.................................................................................................... 1 ABBREVIATIONS AND ACRONYMS ............................................................ VI INTRODUCTION .......................................................................................... 1 SCOPE OF VOLUME 2...................................................................................... 3 PREPARING FOR THE PROCUREMENT OF GOODS AND SERVICES ................. 5 PREPARING FOR THE PROCUREMENT OF GOODS AND SERVICES ................................. 7 PROCUREMENT PLANNING ............................................................................... 8 What are the factors to be considered in planning for the procurement of Goods? ............ 8 What are “Technical Specifications”? ........................................................................ 10 What are the considerations in setting the technical specifications of the goods to be procured? ......................................................................................................... 10 What is the “Approved Budget for the Contract” or the ABC? ....................................... 11 What are the factors that should be considered in determining the ABC? ...................... 11 PREPARING THE BIDDING DOCUMENTS ..........................................

Words: 51228 - Pages: 205

Premium Essay

Au2 Blueprint

...weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. The learning objectives have been designed to ensure that the competencies are met. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Candidates should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, candidates are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide candidates with a greater depth of understanding of auditing concepts. Examination Objectives The objective of the 4-hour comprehensive examination is to test CGA candidates on the prerequisite knowledge required for advancement into PA1 and PA2, so as to ensure that the candidates have the broad-based knowledge in assurance needed to function properly in the association’s capstone courses. Examination Guidelines for Questions i) Question Type The following are guidelines on the type of questions and their approximate weightings: Percentage Weighting 20-30% 70-80% Question Item Multiple-choice questions Short-answer and/or short case-type problems...

Words: 7165 - Pages: 29

Free Essay

Boss

...Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 3.2 April 2016 Document Changes Date October 2008 Version 1.2 Description Pages To introduce PCI DSS v1.2 as “PCI DSS Requirements and Security Assessment Procedures,” eliminating redundancy between documents, and make both general and specific changes from PCI DSS Security Audit Procedures v1.1. For complete information, see PCI Data Security Standard Summary of Changes from PCI DSS Version 1.1 to 1.2. Add sentence that was incorrectly deleted between PCI DSS v1.1 and v1.2. Correct “then” to “than” in testing procedures 6.3.7.a and 6.3.7.b. 1.2.1 32 Remove grayed-out marking for “in place” and “not in place” columns in testing procedure 6.5.b. 33 For Compensating Controls Worksheet – Completed Example, correct wording at top of page to say “Use this worksheet to define compensating controls for any requirement noted as ‘in place’ via compensating controls.” July 2009 5 64 October 2010 2.0 Update and implement changes from v1.2.1. See PCI DSS – Summary of Changes from PCI DSS Version 1.2.1 to 2.0. November 2013 3.0 Update from v2.0. See PCI DSS – Summary of Changes from PCI DSS Version 2.0 to 3.0. April 2015 3.1 Update from PCI DSS v3.0. See PCI DSS – Summary of Changes from PCI DSS Version 3.0 to 3.1 for details of changes. April 2016 3.2 Update from PCI DSS v3.1. See PCI DSS...

Words: 57566 - Pages: 231

Free Essay

Shinepukur

...INTERNSHIP REPORT ON ACCOUNTING INFORMATIONSYSTEM OF REAL ESTATE BUSINESS IN BANGLADESH”-AN EMPIRICAL STUDY OF [pic] PREPARED FOR Farzana Afrin Internship Supervisor & Lecturer Dept. of Business Studies Stamford University Bangladesh. PREPARED BY Mahmood Hossain Id: 02707400 Section: 27(Q) Date: LATTER OF TRANSMITTAL April Ms Farzana Afrin Lecturer Stamford University Dhanmondi, Dhaka Dear Madam, I feel myself fortunate enough for having the scope to conclude the study on “The Accounting information System of Real Estate Business in Bangladesh”-An Empirical study of Building For Future Ltd, Which you assigned me to do as a part of the study. Obviously, this type of practical work made me acquainted with “Real Estate Finance” in real life situation. Here, I can’t deny the help that I got from the staff of Building For Future Ltd. who ensured me a full congenial atmosphere to access over a plenty of information with relevant papers and a practical survey. I am thankful to them for showing their highest degree of tolerance in answering my inexorable questions, sometimes repeated. I would enthusiastically provide you related information depending on your queries. The report was prepared under your able leadership and I do respectfully appreciate guidance to me to learn about...

Words: 27403 - Pages: 110

Premium Essay

Credit Risk Management

...Credit Risk Management CHAPTER: ONE ORIENTATION TO THE REPORT CHAPTER-1 Orientation to the Report 1.1 THE AUTHORIZATION FACT Internship is a compulsory requirement for everybody pursuing a BBA degree at University of Dhaka. The Internship program includes organizational attachment period of 12 weeks and report writing period of 4 weeks. I am working with the Operations Divisions of IDLC Finance Limited. After consultation with my faculty advisor Mr. Md. Nazim Uddin Bhuiyan and my supervisor in the host organization Mr. Md. Abdul Hannan, I decided to work on the policies and practices of credit risk management and appraisal process of IDLC. I strongly believe that, this study will enrich my knowledge in the very crucial area of the financial institutions (FIs): Credit Risk Management. 1.2 OBJECTIVES OF THE REPORT • MAIN OBJECTIVE: The main focus of the report is on credit risk management practices and credit appraisal procedure of IDLC Finance Limited. • SPECIFIC OBJECTIVES: The specific objectives are: ❖ To look at the portfolio of sectors financed by IDLC ❖ To evaluate the norms and rules practiced in assessing the borrower ❖ To compare the credit policy of IDLC with the credit policy guideline for the financial institutions (non-bank) of Bangladesh Bank and to identify the extent to which IDLC follows this guideline. ❖ To compare the credit risk management practices of IDLC Finance Limited with that of Industrial Promotion and Development Company...

Words: 20597 - Pages: 83

Free Essay

Credit Risk Management

...CHAPTER: ONE ORIENTATION TO THE REPORT CHAPTER-1 Orientation to the Report 1.1 THE AUTHORIZATION FACT Internship is a compulsory requirement for everybody pursuing a BBA degree at University of Dhaka. The Internship program includes organizational attachment period of 12 weeks and report writing period of 4 weeks. I am working with the Operations Divisions of IDLC Finance Limited. After consultation with my faculty advisor Mr. Md. Nazim Uddin Bhuiyan and my supervisor in the host organization Mr. Md. Abdul Hannan, I decided to work on the policies and practices of credit risk management and appraisal process of IDLC. I strongly believe that, this study will enrich my knowledge in the very crucial area of the financial institutions (FIs): Credit Risk Management. 1.2 OBJECTIVES OF THE REPORT • MAIN OBJECTIVE: The main focus of the report is on credit risk management practices and credit appraisal procedure of IDLC Finance Limited. • SPECIFIC OBJECTIVES: The specific objectives are: ❖ To look at the portfolio of sectors financed by IDLC ❖ To evaluate the norms and rules practiced in assessing the borrower ❖ To compare the credit policy of IDLC with the credit policy guideline for the financial institutions (non-bank) of Bangladesh Bank and to identify the extent to which IDLC follows this guideline. ❖ To compare the credit risk management practices of IDLC Finance Limited with that of Industrial Promotion and Development Company of Bangladesh...

Words: 20723 - Pages: 83