Premium Essay

You Have Been Hired as the Chief Security Officer for a Local University. for This Role You Will Be Responsible for Establishing and Maintaining an Enterprise Wide Information Security Program to Ensure That All

In:

Submitted By kennethcs
Words 432
Pages 2
You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders.

Write a 8-10 page paper in which you:

Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions.
Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring.
Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required.
Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes.
Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations.
Research the internet for computer forensics technology that can be used by the University.
Identify the types and determine the costs of technology that can be used for gathering electronic evidence, evidence from hardware, evidence from Firewalls, or cell phones.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch

Similar Documents

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer...

Words: 317 - Pages: 2

Free Essay

Management Function Performing the Financial Institution (Brac, Epl)

...COMILLA UNIVERSITY DEPARTMENT OF MARKETING Prepared By: Easir al Newaz (Arif) Phone: 01717520085(zero one seven one seven five two zero zero eight five ) Term Paper Subject Management Function performing the Financial Institution (BRAC, EPL) Md. Solayman Assistant Professor Department of Marketing Comilla University Supervised By: Submitted Group: SL.No | ID NO | Name | 1. | 12020745 | Md. Wasim(Group Leader) | 2. | 12020701 | Md.Iqbal Hossain Patwary | 3. | 12020702 | Md. Badiul Alam | 4. | 12020703 | Imtiaz Bulbul Sakey | 5. | 12020704 | Didarul Alam | 6. | 12020709 | Abu Yusuf | 7. | 12020715 | Md. Asif Zaman | 8. | 12020718 | Easir Al Newaz | 9. | 12020730 | Md. Manjur Hossain | 10 | 12020746 | Md. Nasir Uddin | Date of Submission: 10.08.2012 Reference of Task Sl. No. | ID No. | Name | Responsible Task | 1. | 12020745 | Md. Wasim (Group Leader) | Planning and Organizing the Task. | 2. | 12020701 | Md. Iqbal Hossain Patwary | Design and Preparing Title Page, Letter of Transmission, Executive Summery. | 3. | 12020702 | Md. Badiul Alam (Faisal) | Preparing Management Function. | 4. | 12020703 | Imtiaz Bulbul Sakey | Preparing Management Process. | 5. | 12020704 | Didarul Alam | Case study and Data Collection with the help of group leader. | 6. | 12020709 | Abu Yusuf | | 7. | 12020715 | Md. Asif Zaman | | 8. | 12020730 | Md. Manjur Hossain | | 9. | 12020718 | Easir Al Newaz | Compose, Printing, Binding and So on. | 10. | 12020746 | Md. Nasir...

Words: 21097 - Pages: 85

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks...

Words: 229697 - Pages: 919

Premium Essay

Prisons

...Office of Justice Programs N BJ A C E I OF F Bureau of Justice Assistance Understanding Community Policing A Framework for Action MONOGRAPH August 1994 NCJ 148457 Bureau of Justice Assistance This document was prepared by the Community Policing Consortium, supported by grant number 93–DD–CX–K005, awarded by the Bureau of Justice Assistance, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. Bureau of Justice Assistance Response Center 633 Indiana Avenue NW., Washington, DC 20531 800–421–6770 The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. ii Monograph Acknowledgments The Bureau of Justice Assistance wishes to thank Stephen J. Gaffigan, Director of Operations, Community Policing Consortium for supervising and coordinating the preparation of this document with the Consortium Management Team. BJA also acknowledges the members of the Executive Board and Advisory Board, who provided a wealth of expertise and information essential to the content of the document. Executive Board Richard Ward Director, Discretionary Grant Programs Division Bureau...

Words: 27445 - Pages: 110

Premium Essay

Huawei Inc

...stakeholder inclusiveness, sustainability context, and completeness, were used in this report to analyze key sustainability-related issues in business operations and identify major stakeholders. Huawei Investment & Holding Co., Ltd. (hereinafter referred to as “the company” or “Huawei”) hired a third-party organization to survey stakeholders and collect information on stakeholder expectations and requirements. Huawei’s CSR Committee studied, assessed, and selected the key items and indicators disclosed in this report. The performance indicators and management approaches discussed in this report cover all entities that Huawei either has control of or a significant influence over in terms of financial and operational policies and measures. These same performance indicators and management approaches are also consistent with the scope of Huawei’s annual financial report. Report Assurance Method Core indicators and additional indicators from the GRI G3.0 Guidelines were applied to compile the report and the application level is B+. To ensure the reliability, fairness, and transparency of this report, Huawei engaged TÜV Rheinland to verify the report. The verification statement is included in Appendix III. Boundary of the Report Unless otherwise specified, this report covers the economic, environmental, and social performance of Huawei and all its subsidiaries during the reporting period. This report is available online and in print. The online report can be obtained at: http://www...

Words: 29212 - Pages: 117

Premium Essay

Dddd

...Thulin Chairman of the Board, President and Chief Executive Officer 9MAR200510093546 March 25, 2015 Dear Stockholder: We are pleased to invite you to attend 3M’s Annual Meeting of Stockholders, which will be held on Tuesday, May 12, 2015, at 10:00 a.m., Central Daylight Time at a new location at the Palmer Events Center, 900 Barton Springs Road, Austin, Texas 78704. Our Electronics and Energy Business Group is headquartered in Austin, Texas and we are excited about having our Annual Meeting in Austin for the second time. We will also provide a live webcast of the meeting. Details regarding admission to the meeting and the business to be conducted are provided in the accompanying Notice of Annual Meeting and Proxy Statement. We will report on Company operations and discuss our future plans. There will also be time for your questions and comments. We sincerely hope you will be able to join us at the Annual Meeting. The fine attendance of our stockholders at annual meetings over the years has been very helpful in maintaining good communication. For information on how to attend the Annual Meeting, or listen to the live webcast, please read ‘‘Annual Meeting Admission’’ on page 1 of the accompanying Proxy Statement. Your vote is important. Whether or not you plan to attend the Annual Meeting, please vote as soon as possible. You may vote your proxy on the Internet, by telephone, or, if this Proxy Statement was mailed to you, by completing and mailing the enclosed...

Words: 39073 - Pages: 157

Premium Essay

Canhan

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Business and Management

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Mis Book

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition This book is printed on acid-free paper. Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please...

Words: 175167 - Pages: 701

Premium Essay

Disaster Management

...Background 6 Scope of this guideline 6 Related Documents 6 Reference to the Adequate Records Management Standard 7 Variation to this guideline 7 Records and Disasters 7 Disasters affecting records 8 Disasters affecting Australian organisations 8 Counter disaster management for records 9 Disaster review of your agency 10 Risk Assessment 10 Establish the context 11 Identify the risks 11 Critical needs determination 13 Analyse the risks 14 Assess the risks 15 Treat the risks 15 Monitor and review 16 Planning 16 Project Planning 17 Project team responsibilities 18 Content of the plan 18 How to prepare the response and recovery plan 19 Components of the response and recovery plan 20 Lists and supplies 22 Insurance and emergency funding arrangements 23 On-site equipment 23 Implementing the plan 24 Maintaining the plan 24 Distribution issues 25 Plan maintenance responsibilities 25 Training and testing 25 Post disaster analysis 27 Vital Records Protection 28 Identifying vital records 29 Protecting vital records 31 Preventative measures 31 Recovery and restoration 33 Critical data protection 34 Response 35 Recognising a disaster and contacting the right people 35 Activating the plan 35 Assessment of damage 36 Security activities 37 ...

Words: 16993 - Pages: 68

Premium Essay

Risk Management

...MAKING ENTERPRISE RISK MANAGEMENT PAY OFF Thomas L. Barton William G. Shenkir Paul L. Walker Prentice Hall PTR One Lake Street Upper Saddle River, NJ 07458 www.phptr.com Editorial/Production Supervision: KATHLEEN M. CAREN Executive Editor: JIM BOYD Marketing Manager: BRYAN GAMBREL Manufacturing Manager: MAURA ZALDIVAR Cover Design: TALAR BOORUJY ©2002 Financial Executives Research Foundation, Inc. Published by Financial Times/Prentice Hall PTR Pearson Education, Inc. Upper Saddle River, NJ 07458 Prentice Hall books are widely used by corporations and government agencies for training, marketing, and resale. The publisher offers discounts on this book when ordered in bulk quantities. For more information, contact: Corporate Sales Department, Phone: 800-382-3419; Fax: 201-236-7141; E-mail: corpsales@prenhall.com; or write: Prentice Hall PTR, Corp. Sales Dept., One Lake Street, Upper Saddle River, NJ 07458. All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 ISBN 0-13-008754-8 Pearson Education LTD. Pearson Education Australia PTY, Limited Pearson Education Singapore, Pte. Ltd. Pearson Education North Asia Ltd. Pearson Education Canada, Ltd. Pearson Educación de Mexico, S.A. de C.V. Pearson Education—Japan Pearson Education Malaysia, Pte. Ltd. Pearson Education, Upper Saddle River, New Jersey A D V I S O R Y C O...

Words: 73678 - Pages: 295

Premium Essay

Iba Report on Banking Sector Report

...Swot banking The rise of retail lending in emerging economies like India has been of recent origin. Asia Pacific’s vast population, combined with high savings rates, explosive economic growth, and underdeveloped retail banking services, provide the most significant growth opportunities for banks. Banks will have to serve the retail banking segment effectively in order to utilize the growth opportunity. Banking strategies are presently undergoing various transformations, as the overall scenario has changed over the last couple of years. Till the recent past, most of the banks had adopted fierce costcutting measures to sustain their competitiveness. This strategy however has become obsolete in the new light of immense growth opportunities for banking industry. Most bankers are now confident about their high performance in terms of organic growth and in realising high returns. Nowadays, the growth strategies of banks revolve around customer satisfaction. Improved customer relationship management can only lead to fulfilment of long-term, as well as, short-term objectives of the bankers. This requires, efficient and accurate customer database management and development of well-trained sales force to develop and sustain long-term profitable customer relationship. The banking system in India is significantly different from that of the other Asian nations, because of the country’s unique geographic, social, and economic characteristics. Though the sector opened up quite...

Words: 30252 - Pages: 122

Premium Essay

Word

...Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. It also applies to Department of the Army civilian employees. During mobilization, the proponent may modify the policies and procedures contained in this regulation. Proponent...

Words: 129456 - Pages: 518

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

It Systems Technician

...org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. ITGI offers original research, electronic resources and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities. Disclaimer ITGI (the “Owner”) has designed and created this publication, titled COBIT® 4.1 (the “Work”), primarily as an educational resource for chief information officers (CIOs), senior management, IT management and control professionals. The Owner makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of any proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, CIOs, senior management, IT management and control professionals should apply their own professional judgement to the specific circumstances presented by the particular systems or IT environment. Disclosure Copyright © 2007 by the IT Governance Institute. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system, or transmitted...

Words: 85189 - Pages: 341