Industry Comments on Proposed Cyber Standards - Information Systems
Project 3: Industry Comments on Proposed Cyber Standards Start Here All organizations rely on information technology to manage their data, operations, and resources. Most enterprises have a cybersecurity plan in place to handle cyberattacks, exploitations, and natural calamities, as well as damage that people cause either deliberately or accidentally. This is the third of six sequential projects in this course. In this project, you will examine your knowledge and familiarity with managerial decisions, policies, and regulations for the workplace. More importantly, it will make you reflect on how policies should grow and evolve in tandem with newer technologies and challenges in the workplace, especially when a new regulatory environment can affect your industry. There are six steps in this project. Begin below to review your project scenario. Step 1: Selection of Industry and Cyber Issues Throughout this project, you will assume the perspective from an organization in a particular industry. In order to prepare your perspective, you will complete the following: · Select a specific industry from one of the following areas: health care, finance, telecommunications, automotive, or retail upon which you will focus your oral statement. For example, you may choose to research the industry of grocery stores (retail) or hospitals (health care). Do not select a specific company; focus on the industry. · Research and write a short paragraph about the cybersecurity issues you discover for your particular industry. Once you select your industry and identify its cyber issues, submit your findings to the discussion board to get feedback from your instructor. Step 2: Project Practice - SIMTRAY Adius: Day 1 Before you begin to develop your oral statement, it is important to understand how laws and regulations can affect a particular industry. Begin by exploring the SIMTRAY titled, Adius: Find Your Way in Three Days. SIMTRAY is a simulation that presents you with scenarios that will provide insight into the origins of issues affected by major regulatory/legal concerns facing every organization or industry. While this simulation focuses specifically on the financial industry, you will find that this exercise will help you examine the regulatory concerns for your chosen industry. Some of the issues and topics addressed in this exercise include cybersecurity policies, countermeasures, SQL injection, digital evidence, cyberattacks and cyberthreats, mobile technologies, outsourcing - security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA). The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation. Cybersecurity Policies The development and enforcement of cybersecurity policies are critical for the ability to protect networks and data. Such policies can be developed locally based on an organizations unique mission or requirements, or they can be broadly developed to accommodate a general audience. There are organizations that develop cybersecurity standards, which are then implemented via policies. The International Organization for Standardization (ISO) is such an organization. While cybersecurity policies focus specifically on data and networks, management policies are also required, in order to guide the activities of personnel, identify responsibilities and accountabilities, and ensure the effective operation of the organization. Often, an organization establishes a central policy structure to oversee the development and management of policies. Cybersecurity policies should be synchronized with the organizations mission and vision. Countermeasures Countermeasures are actions taken to minimize, mitigate, or eliminate threats to and vulnerabilities of computer systems. Countermeasures can take several forms depending on the nature and characteristics of the particular threats and how susceptible the system is to vulnerabilities. Information technology (IT) controls are a type of countermeasure that focuses on actions that can be taken to mitigate or eliminate vulnerabilities, for example, using good programming practices or restricting queries to only specific inputs. Technical countermeasures, also known as technical surveillance countermeasures (TSCMs), focus on the ability to identify or detect unauthorized electronic emanations as well as physical security vulnerabilities that put infrastructures (physical and electronic) at risk. Digital Evidence The predominance of digitization in all aspects of modern civilization has had a profound effect on evidence in criminal and civil cases—its collection, preservation, storage, and presentation. Today, investigators (and others who may intentionally or incidentally uncover digital evidence) must take a broad view of evidence to ensure its admissibility in courts of law. Law enforcement has always used systems to tightly control the chain of custody of physical evidence, and those systems remain in effect today. Using those processes, law enforcement officials can devise and implement systems for similarly protecting digital forms of data and evidence against loss, theft, sabotage, and other damage that would jeopardize the use of the evidence for prosecution of the guilty parties. Beyond simply collecting the data or other evidence in specified ways, investigators must consider the presentation of that information, assessing the likelihood of, for instance, new software rendering a particular file type unreadable. To guard against loss of usable evidence, then, requires forethought and planning. The resource below explores in depth the many factors at play for finding, collecting, evaluating, and storing evidence for criminal cases. Because digital data is virtually everywhere, in innumerable devices and contexts, current and future forensic investigators must possess a solid understanding of the concepts described here. Cyberattacks and Cyberthreats Unaddressed cyberthreats have the potential to become cyberattacks. Understanding the nature of cyberthreats, the potential to disrupt or damage networks or systems, or alter or steal data, is important to developing and implementing measures to thwart cyberattacks, which come in many forms. Many cyberattacks are carried out through the use of malware, which is malicious code designed to alter computer networks or systems. A virus is a type of malware that can infect computers, propagating to other computers to perform malicious and unauthorized acts. One way that malware is introduced into computers is through phishing and other forms of social engineering. Social engineering is the process by which actors develop and tailor communications to unwitting victims, usually via email, so that the victim believes the communications are authentic. In such cases, the victim either reveals information (i.e., passwords) that enables an actor to gain access, or the victim clicks on a hyperlink in an email that launches malware to gain access to or control of the victims computer. Denial of service is another type of attack—one that is accomplished in several different ways. One method is to use distributed denial-of-service (DDoS) attacks, which occur when an actor gains access to a group of computers and uses them to flood a victims computer so that it is unable to handle the volume of communications, disabling the computer. A SYN (synchronization) flood is another type of denial-of-service attack in which large volumes of SYN requests are sent to a victims system, consuming so much of the systems resources that the system can not respond to legitimate communications. Finally, large volumes of spam can be used to consume computer space and processing capacity, affecting the computers ability to function as intended. While there are different types of cyberattacks, there are also different motives for attacks. Attackers could be criminals, could be focused on making political statements, could be consumed with the thrill of hacking, or could be interested in stealing data for financial gain. Cyberthreat actors can also be disgruntled or motivated insiders with accesses that could be used to alter or steal data, or provide unauthorized access to others. The insider threat is real, and with the uptick in instances of insiders causing significant damages, it is important to consider all potential avenues of threats and potential attacks. Mobile Technologies The past few years have seen an explosion in the range of devices used to wirelessly access the internet. In addition to forever altering the landscape for users, this revolution has had tremendous implications for network administrators and other computing professionals. Easy and frequent access to the internet arrives with a price: a marked increase in threats and vulnerabilities. To ensure acceptable levels of security and privacy, policies must reflect the realities of the current situation. Now more than ever, users are bringing their own digital devices into the workplace and using them on enterprise networks. Rather than restricting users to a limited set of devices—an approach that inevitably results in reduced compliance—administrators must successfully anticipate and accommodate the various sets of challenges presented by the wide range of current and future options. Complicating matters is the fact that there is no longer a clear distinction between personal and workplace devices. Today, it is infeasible to implement a policy that allows only company-owned devices to access internal networks, particularly since companies no longer issue cell phones and other mobile devices on a regular basis. The attached resources provide some perspective by summarizing the recent past and the near future of mobile technologies. They also outline a general approach network experts should adopt to analyze and accommodate the rapid pace of change while protecting the assets of enterprises and their users. Cloud Computing Cloud Computing Source: Microsoft Cloud computing refers to the use of remote servers over the internet (instead of via local servers or devices) for the purpose of sharing resources. According to the National Institute of Standards and Technology (Mell & Grance, 2011): Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (p. 2) There are several advantages to cloud computing, including ease of use and upgrades, low capital expenditure, remote access capabilities from several locations, higher security/better data recovery, and optimized use of resources. Cloud computing servers offer three models: software as a service, or SaaS (use of Internet-based applications through web browsers); platform as a service, or PaaS (use of cloud platforms that can be used to develop applications); and infrastructure as a service, or IaaS (use of remote infrastructure to create platforms and applications). Cloud computing is a general term for the delivery of hosted services over the internet. The use of cloud computing can increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Just a few examples of cloud services are: · Dropbox · Evernote · Mozy · Carbonite · Google Docs · Runescape References Mell, P., & Grance, T. (2011). Special publication 800-145: The NIST definition of cloud computing: Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology.  nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf Gramm-Leach-Bliley Act (GLBA) Enacted in November 1999, the Gramm-Leach-Bliley Act (GLBA) establishes a requirement for financial institutions to protect the sensitive personal information of their customers. Also known as the Financial Services Modernization Act of 1999, GLBA ...requires financial institutions—companies that offer consumers financial products or services like loans, financial or investment advice, or insurance—to explain their information-sharing practices to their customers and to safeguard sensitive data (Federal Trade Commission, n.d.a). The act was authored by Senator Phil Gramm and Representatives Thomas J. Bliley, Jr. and Jim Leach. GLBA contains the Safeguards Rule, which establishes the requirement for financial institutions to protect the information they collect from their consumers. GLBA has several requirements regarding privacy protection. The first is an annual requirement for customers to receive the financial institutions privacy notice. This notice must clearly state opt-out instructions for sharing personal financial information. GLBA also puts limits on the use or redisclosure of nonpublic personal information acquired from a financial institution. And GLBA establishes requirements for securely storing personal financial information. Institutions subject to GLBA include nonbank mortgage lenders, loan brokers, some financial or investment advisors, tax preparers, providers of real estate settlement services, and debt collectors (Federal Trade Commission, n.d.b). References Federal Trade Commission. (n.d.a). Gramm-Leach-Bliley Act. https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act Federal Trade Commission. (n.d.b). In brief: The financial privacy requirements of the Gramm-Leach-Bliley Act. https://www.ftc.gov/tips-advice/business-center/guidance/brief-financial-privacy-requirements-gramm-leach-bliley-act Step 3: Project Practice - SIMTRAY Adius: Day 2 In the previous step, you started to examine the SIMTRAY, Adius: Find Your Way in Three Days. In this step, continue to focus on SIMTRAY, but document the specific type of regulatory issues you encounter in your scenario since these same issues may be relevant to the industry you chose to examine for your oral presentation. Some of the issues and topics addressed in this exercise include cybersecurity policies, countermeasures, SQL injection, digital evidence, cyberattacks and cyberthreats, mobile technologies, outsourcing - security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA). The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation. Step 4: Project Practice - SIMTRAY Adius: Day 3 In this step, you should continue to explore the scenarios within the SIMTRAY, Adius: Find Your Way in Three Days. If you have not already, you will most likely encounter the following topics in this exercise: cybersecurity policies, countermeasures, SQL injection, digital evidence, cyberattacks and cyberthreats, mobile technologies, outsourcing - security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA). Document events that you experience in the exercise that might affect the following industries: · health care · finance · telecommunications · automotive · retail Think about how these issues will be affected by proposed regulation and begin to explore how you might be able to influence agencies to formulate appropriate standards favorable to a particular industry. The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned, and documented industry issues into a one-page report. Step 5: Assess Industry Cyber Posture and Create a Relevant Standard Now that you have chosen your industry and you are aware of the cyber issues affecting it, it is time to identify a standard to address one of the cyber issues you identified. For example, in response to the credit card fraud in the retail industry, the bank card industry adopted the chip and PIN standard for credit cards. Using feedback you received from your instructor in previous steps, create a cybersecurity standard relevant to your chosen industry. Refer to industry-specific regulations for additional background on existing regulations. Create a relevant standard and write a one-page summary documenting the standard and evaluating the impact it would have on your selected issues and business operations in your industry. This summary will be included in your written comments in the following step. Industry-Specific Regulations Industry Regulations All Cybersecurity Information Sharing Act; CISPA; CSA; EO Executive Order 13636 – Improving Critical Infrastructure Cybersecurity; Executive Order -- Promoting Private Sector Cybersecurity Information Sharing; PDD-21 Presidential Policy Directive – Critical Infrastructure Security and Resilience Telecommunications Telecommunications Act of 1996; Telecommunications Consumer Protection Act of 1991; 1 Implementing Executive Order 13616: Progress on Accelerating Broadband  Infrastructure Deployment Automotive Security and Privacy in Your Car Act; http://www.autoalliance.org/auto-issues/ Cybersecurity Retail Privacy Act of 1974, CSA Health care HIPAA, Cybersecurity Act of 2015, HITECH Finance SOX, GLBA One-Page Summary Research existing cybersecurity standards relevant to your chosen industry and issue from Step 1 as well as industry-specific regulations. Consider the feedback you received from your instructor in previous steps. Select a relevant standard and write a one-page summary identifying the standard that you are reviewing and evaluating the impact it has on your selected issues and business operations in your industry. In your summary, make sure to do the following: · Apply key points and principles in government and industry cybersecurity standards to policy recommendations. · Analyze the technologies, uses, and roles of information assurance and software protection technologies. · Prioritize current cybertechnological threats faced at the enterprise, national, and international levels. · Evaluate the procedures, policies, and guidelines used to protect the confidentiality, integrity, and availability (CIA) of information. Step 6: Submit Written Comments Develop your final written comments for presentation at the next standards body meeting. These comments should be between two and three pages, and it should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulation/standard, etc. Update the Standards Summary from the previous step according to the feedback you received. Attach the Standards Summary to your written comments. (The Standards Summary should not be included in the length requirement of the written comments.)
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident