Studyspark Study Document

Computer Science Legislative, Ethical, and Term Paper

Pages:5 (1588 words)

Sources:5

Subject:Technology

Topic:Computer Science

Document Type:Term Paper

Document:#53195111


One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012).

The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws, or regulations. Gathering the necessities of an organization will permit one to define a fitting security process (Capability: Security Process, 2012).

Throughout the identify phase, an organization will look at the tools and procedures presently in place and decide what the security requirements are for their organization. During this phase, one will gather security policies that are presently implied or enforced, in addition to technology components already in use or at their disposal. They will also gather any outside requirements, based on laws or regulations for their region or industry (Capability: Security Process, 2012).

The evaluate and plan phase moves toward the standardized level of optimization and highlights specific areas of improvement. In order to set up a successful set of security policies and controls one needs to figure out the vulnerabilities that exist in their computer systems and evaluate the security policies and controls that guard them. This review should include all areas where policies are lacking, in addition to looking at the current policies that are already in place (Capability: Security Process, 2012).

References

Capability: Security Process. (2012). Retrieved from http://technet.microsoft.com/library/bb821260.aspx


Sample Source(s) Used

bibliography of select resources. Retrieved from http://www.llrx.com/features/idtheftguide.htm

Stevens, G. (2012). Data security breach notification laws. Retrieved from http://www.fas.org/sgp/crs/misc/R42475.pdf

Part 2

The preponderance organizations know that it is significant to guard their data and resources from loss or damage due to theft, human or computer error or malicious intent. There are numerous steps that can be taken to limit the occasions for loss or damage to take place. One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012).

The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws, or regulations. Gathering the necessities of an organization will permit one to define a fitting security process (Capability: Security Process, 2012).

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Information System on Ethical and

Pages: 15 (6479 words) Sources: 25 Subject: Economics Document: #96967103

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Studyspark Study Document

Ethics of Computing

Pages: 20 (6467 words) Sources: 1+ Subject: Law - Legal Issues Document: #8503701

Copyright Infringement & the Digital Millennium Copyright Act (DMCA) of 1998 This paper looks into the issues of copyright infringement and circumvention of technology with reference to Digital Millennium Copyright Act of 1998. The author of this paper has carefully studied the law in question and has focused on various issues connected with this legislation. DMCA is a highly controversial law that has been staunchly opposed and actively supported by different

Studyspark Study Document

Equal Employment Opportunity and Anti-Discrimination Laws

Pages: 25 (6496 words) Sources: 1+ Subject: Sociology Document: #52089066

features of a major area of law. The second part of the scholarly paper presents a thorough review of an organizational problem based on the rules and regulations presented in the first part of the research paper. The reference page appends twelve sources in APA format. Equal Employment Opportunity and Anti-discrimination Laws The academic world as well as the world of profession and occupation offers uncountable options in the form of innumerable

Studyspark Study Document

Nursing Informatics and Patient Care Nursing Education

Pages: 9 (2645 words) Sources: 7 Subject: Nursing Document: #63332329

Key Issues in Nursing Informatics
Since as early as the 1980s, information technology, computer science, and nursing science have all been integrated under the rubric of nursing informatics: with the goal of improving patient care and quantifiable outcomes (Kaminski, 2015). Nursing informatics has also enabled the entrenchment of evidence-based practice in healthcare. Key issues in nursing informatics include the ongoing changes to hardware and software, the need to align various

Studyspark Study Document

Public Health Care Agency and Contribution to

Pages: 4 (1211 words) Sources: 3 Subject: Disease Document: #75206333

Public Health Care Agency and Contribution to Core Functions of Public Health The objective of this study is to examine a public health agency and its contribution to the core functions of public health. The public health agency chosen in this study is the Centers for Disease Control and Prevention. The Centers for Disease Control and Prevention also known as the CDC for short states its mission as being that of collaborating

Studyspark Study Document

Geolocation Technology and Privacy Issues

Pages: 12 (3759 words) Sources: 10 Subject: Education - Computers Document: #71359176

Geolocation of the user based on the user's Internet protocol (IP) address. Location-based service companies that specialize in identity protection use this approach, and IP addresses, blocks of IP addresses and credit card billing addresses can all be used to develop a location profile. 2. Personal computer/web browser identification examines the hypertext transfer protocol (HTTP) browser header and other information from the user's computer or device, and compares them to

Join thousands of other students and

"spark your studies".